1 / 6

PIS Unit 5- Malicious Software

PIS Unit 5- Malicious Software. Sanjay Rawat Sanjay_r@vnrvjiet.in. Overview. Malicious Software Virus/Worms etc. Types of Virus Virus Detection (AV softwares /techniques) Text Book: W. Stallings “Cryptography & Network Security”, Chapter 19. Malicious Software.

dava
Download Presentation

PIS Unit 5- Malicious Software

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. PISUnit 5- Malicious Software Sanjay Rawat Sanjay_r@vnrvjiet.in PIS Unit5 Sanjay Rawat

  2. Overview • Malicious Software • Virus/Worms etc. • Types of Virus • Virus Detection (AV softwares/techniques) Text Book: W. Stallings “Cryptography & Network Security”, Chapter 19. PIS Unit5 Sanjay Rawat

  3. Malicious Software • software that is intentionally included or inserted in a system for a harmful purpose. • Aka Malware. • Malware can be a virus, worm, trojan, adware, spyware, root kit, etc. • Most malware requires the user to initiate it's operation. Well… what about Windows Metafile vulnerability? PIS Unit5 Sanjay Rawat

  4. Types of Malware • Based on Existence • Requires host program, e.g. virus, trojans. • Independent, e.g. backdoor, worms. • Based on Propagation • Replication, e.g. virus/worms • non-replication, e.g. bots(zombies), trojans PIS Unit5 Sanjay Rawat

  5. Backdoors • Secret entry (door) to a system that is compromised by some technique. • Aka trapdoor; e.g. subseven, BackOrifice • leftover of maintenance code, sometimes intentional! • Often assisted by rootkit, e.g. Sony BMG CD PIS Unit5 Sanjay Rawat

  6. Other Malware • Logic Bomb – piece of code embedded in another program, s.t. it starts functioning under certain conditions, e.g. date/time, presence of files, computer names. • Trojan Horse- a program that has some hidden functionalities, not known to users. E.g. a malicious compiler can insert code in login program! • Zombies- programs to serve a master. PIS Unit5 Sanjay Rawat

More Related