1 / 21

CIS 442: Chapter 2

CIS 442: Chapter 2. Viruses. Malewares. Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware. Operating systems tasks. Booting and resetting Managing volumes and files Managing executable programs and processes

sharne
Download Presentation

CIS 442: Chapter 2

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CIS 442: Chapter 2 Viruses

  2. Malewares • Maleware classifications and types • Viruses • Logical and time bombs • Trojan horses and backdoors • Worms • Spam • Spyware

  3. Operating systems tasks • Booting and resetting • Managing volumes and files • Managing executable programs and processes • Managing memory • Handling interrupts

  4. Viruses • Definition and history • Viruses for mainframe and PCs • Propagation or infection • Payload or damage • Trigger • Replication • Virus polymorphism

  5. Virus writers • Reasons for writing, using or distributing viruses • General profile

  6. Virus propagation • From file to file and from computer to another. • Looking for executable, and similar files • Memory resident viruses • Infected software, email attachement

  7. Macro viruses • Differences from typical viruses • Document files

  8. Virus classification methods • By Infection • By Damage • By trigger • By Platform

  9. Classification • File infector viruses • Shell viruses • Non-overwriting viruses • Overwriting viruses • Intrusive viruses • Boot sector viruses • Multipartitie viruses

  10. Memory resident viruses • BSI Boot sector viruses • Differences between BSI and file infectors • Bootstrap loader and virus hiding methods

  11. File infector viruses infection methods • Shell viruses • Overwriting • Non-overwriting • Intrusive • File attributes: Size, CRC(hash), MAC, code inside, access permissions

  12. Companion-multipartitie Viruses • File association • DOS execution sequence (com, bat, exe). • Multi-File infector and BSI viruses: advantages and challenges

  13. Macro and Script Viruses • Macros programs, examples • Examples and characteristics of Macro Viruses • Protection against Macro viruses.

  14. Infected images and acrobat • Buffer overflow problems

  15. Virus life cycle • Signature • Infection • Damage • Trigger or Activation: Bombs

  16. Virus Payloads • Types and levels of payloads

  17. Virus organization • Infection marker • Infector • Trigger check • Manipulation

  18. Virus naming • Based on type • Based on creator • Macro viruses • Based on environment

  19. Virus hiding methods • Hiding methods • Stealth techniques

  20. Interrupts and viruses • Relation between interrupts and viruses – trigger and activation • Trapdoors

More Related