Cis 442 chapter 2
Download
1 / 21

CIS 442: Chapter 2 - PowerPoint PPT Presentation


  • 98 Views
  • Uploaded on

CIS 442: Chapter 2. Viruses. Malewares. Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware. Operating systems tasks. Booting and resetting Managing volumes and files Managing executable programs and processes

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' CIS 442: Chapter 2' - sharne


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Malewares
Malewares

  • Maleware classifications and types

  • Viruses

  • Logical and time bombs

  • Trojan horses and backdoors

  • Worms

  • Spam

  • Spyware


Operating systems tasks
Operating systems tasks

  • Booting and resetting

  • Managing volumes and files

  • Managing executable programs and processes

  • Managing memory

  • Handling interrupts


Viruses
Viruses

  • Definition and history

  • Viruses for mainframe and PCs

  • Propagation or infection

  • Payload or damage

  • Trigger

  • Replication

  • Virus polymorphism


Virus writers
Virus writers

  • Reasons for writing, using or distributing viruses

  • General profile


Virus propagation
Virus propagation

  • From file to file and from computer to another.

  • Looking for executable, and similar files

  • Memory resident viruses

  • Infected software, email attachement


Macro viruses
Macro viruses

  • Differences from typical viruses

  • Document files


Virus classification methods
Virus classification methods

  • By Infection

  • By Damage

  • By trigger

  • By Platform


Classification
Classification

  • File infector viruses

  • Shell viruses

  • Non-overwriting viruses

  • Overwriting viruses

  • Intrusive viruses

  • Boot sector viruses

  • Multipartitie viruses


  • Memory resident viruses

  • BSI Boot sector viruses

  • Differences between BSI and file infectors

  • Bootstrap loader and virus hiding methods


File infector viruses infection methods
File infector viruses infection methods

  • Shell viruses

  • Overwriting

  • Non-overwriting

  • Intrusive

  • File attributes: Size, CRC(hash), MAC, code inside, access permissions


Companion multipartitie viruses
Companion-multipartitie Viruses

  • File association

  • DOS execution sequence (com, bat, exe).

  • Multi-File infector and BSI viruses: advantages and challenges


Macro and script viruses
Macro and Script Viruses

  • Macros programs, examples

  • Examples and characteristics of Macro Viruses

  • Protection against Macro viruses.


Infected images and acrobat
Infected images and acrobat

  • Buffer overflow problems


Virus life cycle
Virus life cycle

  • Signature

  • Infection

  • Damage

  • Trigger or Activation: Bombs


Virus payloads
Virus Payloads

  • Types and levels of payloads


Virus organization
Virus organization

  • Infection marker

  • Infector

  • Trigger check

  • Manipulation


Virus naming
Virus naming

  • Based on type

  • Based on creator

  • Macro viruses

  • Based on environment


Virus hiding methods
Virus hiding methods

  • Hiding methods

  • Stealth techniques


Interrupts and viruses
Interrupts and viruses

  • Relation between interrupts and viruses – trigger and activation

  • Trapdoors


ad