Cis 442 chapter 2
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

CIS 442: Chapter 2 PowerPoint PPT Presentation


  • 74 Views
  • Uploaded on
  • Presentation posted in: General

CIS 442: Chapter 2. Viruses. Malewares. Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware. Operating systems tasks. Booting and resetting Managing volumes and files Managing executable programs and processes

Download Presentation

CIS 442: Chapter 2

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Cis 442 chapter 2

CIS 442: Chapter 2

Viruses


Malewares

Malewares

  • Maleware classifications and types

  • Viruses

  • Logical and time bombs

  • Trojan horses and backdoors

  • Worms

  • Spam

  • Spyware


Operating systems tasks

Operating systems tasks

  • Booting and resetting

  • Managing volumes and files

  • Managing executable programs and processes

  • Managing memory

  • Handling interrupts


Viruses

Viruses

  • Definition and history

  • Viruses for mainframe and PCs

  • Propagation or infection

  • Payload or damage

  • Trigger

  • Replication

  • Virus polymorphism


Virus writers

Virus writers

  • Reasons for writing, using or distributing viruses

  • General profile


Virus propagation

Virus propagation

  • From file to file and from computer to another.

  • Looking for executable, and similar files

  • Memory resident viruses

  • Infected software, email attachement


Macro viruses

Macro viruses

  • Differences from typical viruses

  • Document files


Virus classification methods

Virus classification methods

  • By Infection

  • By Damage

  • By trigger

  • By Platform


Classification

Classification

  • File infector viruses

  • Shell viruses

  • Non-overwriting viruses

  • Overwriting viruses

  • Intrusive viruses

  • Boot sector viruses

  • Multipartitie viruses


Cis 442 chapter 2

  • Memory resident viruses

  • BSI Boot sector viruses

  • Differences between BSI and file infectors

  • Bootstrap loader and virus hiding methods


File infector viruses infection methods

File infector viruses infection methods

  • Shell viruses

  • Overwriting

  • Non-overwriting

  • Intrusive

  • File attributes: Size, CRC(hash), MAC, code inside, access permissions


Companion multipartitie viruses

Companion-multipartitie Viruses

  • File association

  • DOS execution sequence (com, bat, exe).

  • Multi-File infector and BSI viruses: advantages and challenges


Macro and script viruses

Macro and Script Viruses

  • Macros programs, examples

  • Examples and characteristics of Macro Viruses

  • Protection against Macro viruses.


Infected images and acrobat

Infected images and acrobat

  • Buffer overflow problems


Virus life cycle

Virus life cycle

  • Signature

  • Infection

  • Damage

  • Trigger or Activation: Bombs


Virus payloads

Virus Payloads

  • Types and levels of payloads


Virus organization

Virus organization

  • Infection marker

  • Infector

  • Trigger check

  • Manipulation


Virus naming

Virus naming

  • Based on type

  • Based on creator

  • Macro viruses

  • Based on environment


Virus hiding methods

Virus hiding methods

  • Hiding methods

  • Stealth techniques


Interrupts and viruses

Interrupts and viruses

  • Relation between interrupts and viruses – trigger and activation

  • Trapdoors


  • Login