Cis 442 chapter 2
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

CIS 442: Chapter 2 PowerPoint PPT Presentation


  • 76 Views
  • Uploaded on
  • Presentation posted in: General

CIS 442: Chapter 2. Viruses. Malewares. Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware. Operating systems tasks. Booting and resetting Managing volumes and files Managing executable programs and processes

Download Presentation

CIS 442: Chapter 2

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


CIS 442: Chapter 2

Viruses


Malewares

  • Maleware classifications and types

  • Viruses

  • Logical and time bombs

  • Trojan horses and backdoors

  • Worms

  • Spam

  • Spyware


Operating systems tasks

  • Booting and resetting

  • Managing volumes and files

  • Managing executable programs and processes

  • Managing memory

  • Handling interrupts


Viruses

  • Definition and history

  • Viruses for mainframe and PCs

  • Propagation or infection

  • Payload or damage

  • Trigger

  • Replication

  • Virus polymorphism


Virus writers

  • Reasons for writing, using or distributing viruses

  • General profile


Virus propagation

  • From file to file and from computer to another.

  • Looking for executable, and similar files

  • Memory resident viruses

  • Infected software, email attachement


Macro viruses

  • Differences from typical viruses

  • Document files


Virus classification methods

  • By Infection

  • By Damage

  • By trigger

  • By Platform


Classification

  • File infector viruses

  • Shell viruses

  • Non-overwriting viruses

  • Overwriting viruses

  • Intrusive viruses

  • Boot sector viruses

  • Multipartitie viruses


  • Memory resident viruses

  • BSI Boot sector viruses

  • Differences between BSI and file infectors

  • Bootstrap loader and virus hiding methods


File infector viruses infection methods

  • Shell viruses

  • Overwriting

  • Non-overwriting

  • Intrusive

  • File attributes: Size, CRC(hash), MAC, code inside, access permissions


Companion-multipartitie Viruses

  • File association

  • DOS execution sequence (com, bat, exe).

  • Multi-File infector and BSI viruses: advantages and challenges


Macro and Script Viruses

  • Macros programs, examples

  • Examples and characteristics of Macro Viruses

  • Protection against Macro viruses.


Infected images and acrobat

  • Buffer overflow problems


Virus life cycle

  • Signature

  • Infection

  • Damage

  • Trigger or Activation: Bombs


Virus Payloads

  • Types and levels of payloads


Virus organization

  • Infection marker

  • Infector

  • Trigger check

  • Manipulation


Virus naming

  • Based on type

  • Based on creator

  • Macro viruses

  • Based on environment


Virus hiding methods

  • Hiding methods

  • Stealth techniques


Interrupts and viruses

  • Relation between interrupts and viruses – trigger and activation

  • Trapdoors


  • Login