2
Most read
4
Most read
7
Most read
Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
VirusCode fragment embedded in legitimate program.
How do viruses work ?
Very specific to CPU architecture, operating system, applications.
Usually borne via email or as a macro.5/10/20104
Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
5/10/20109
Example for :Wreak havoc5/10/201010
MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
Viruses for freeAntivirus withMillions $$5/10/201012
Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
5/10/201014
PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus,                  was a stealth virus5/10/201017
TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018

More Related Content

PPTX
Program and System Threats
DOCX
Foundry technology note
PPTX
Business Process Management
PPTX
Ict policies and issues
PPTX
Electrical tools
PPT
Marking out tools ppt
PPTX
Figures of speech
PPTX
Loop(for, while, do while) condition Presentation
Program and System Threats
Foundry technology note
Business Process Management
Ict policies and issues
Electrical tools
Marking out tools ppt
Figures of speech
Loop(for, while, do while) condition Presentation

What's hot (20)

PPTX
Context model
PPTX
File Management in Operating System
PPTX
Operating system security
PDF
operating system structure
PPTX
File Protection
PPTX
First fit , Best fit, Worst fit
PPTX
Cohesion and coupling
PPTX
INTER PROCESS COMMUNICATION (IPC).pptx
PDF
Object oriented software engineering concepts
PPTX
PPTX
Block Level and File Level
PPTX
Vision of cloud computing
PPT
Operating system.ppt (1)
PPT
Secondary storage management in os
PDF
Distributed Operating System_4
PPT
Process Management-Process Migration
PPT
Operating system services 9
PDF
Chapter 2 program-security
PDF
Web technology
DOCX
VIRTUALIZATION STRUCTURES TOOLS.docx
Context model
File Management in Operating System
Operating system security
operating system structure
File Protection
First fit , Best fit, Worst fit
Cohesion and coupling
INTER PROCESS COMMUNICATION (IPC).pptx
Object oriented software engineering concepts
Block Level and File Level
Vision of cloud computing
Operating system.ppt (1)
Secondary storage management in os
Distributed Operating System_4
Process Management-Process Migration
Operating system services 9
Chapter 2 program-security
Web technology
VIRTUALIZATION STRUCTURES TOOLS.docx
Ad

Similar to Program Threats (20)

PDF
Computer viruses
PPTX
(Training) Malware - To the Realm of Malicious Code
PPT
Computer Viruses and Classification lecture slides ppt
PPTX
Malware: To The Realm of Malicious Code (Training)
PPTX
Viruses & Malware
PPT
Software security
PPT
Chapter-10 key management and distribution.ppt
PPTX
Virus and antivirus
PPT
Ne Course Part One
PPTX
PPTX
Types of Virus & Anti-virus
PPT
PDF
Information security
PDF
Computer viruses
PPTX
Computer viruses and prevention techniques
PPT
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
ODP
Virus&malware
PPT
Malicious software
PPT
computervirus.ppt
Computer viruses
(Training) Malware - To the Realm of Malicious Code
Computer Viruses and Classification lecture slides ppt
Malware: To The Realm of Malicious Code (Training)
Viruses & Malware
Software security
Chapter-10 key management and distribution.ppt
Virus and antivirus
Ne Course Part One
Types of Virus & Anti-virus
Information security
Computer viruses
Computer viruses and prevention techniques
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Virus&malware
Malicious software
computervirus.ppt
Ad

Recently uploaded (20)

PDF
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
PPTX
UNIT_2-__LIPIDS[1].pptx.................
PDF
English Textual Question & Ans (12th Class).pdf
PPTX
Module on health assessment of CHN. pptx
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
Comprehensive Lecture on the Appendix.pdf
PDF
0520_Scheme_of_Work_(for_examination_from_2021).pdf
PDF
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
PDF
plant tissues class 6-7 mcqs chatgpt.pdf
PPTX
2025 High Blood Pressure Guideline Slide Set.pptx
PDF
Literature_Review_methods_ BRACU_MKT426 course material
PPTX
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
PDF
Civil Department's presentation Your score increases as you pick a category
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PDF
International_Financial_Reporting_Standa.pdf
PDF
The TKT Course. Modules 1, 2, 3.for self study
PDF
Compact First Student's Book Cambridge Official
PPTX
Education and Perspectives of Education.pptx
PDF
Journal of Dental Science - UDMY (2021).pdf
fundamentals-of-heat-and-mass-transfer-6th-edition_incropera.pdf
UNIT_2-__LIPIDS[1].pptx.................
English Textual Question & Ans (12th Class).pdf
Module on health assessment of CHN. pptx
Cambridge-Practice-Tests-for-IELTS-12.docx
Comprehensive Lecture on the Appendix.pdf
0520_Scheme_of_Work_(for_examination_from_2021).pdf
MICROENCAPSULATION_NDDS_BPHARMACY__SEM VII_PCI Syllabus.pdf
plant tissues class 6-7 mcqs chatgpt.pdf
2025 High Blood Pressure Guideline Slide Set.pptx
Literature_Review_methods_ BRACU_MKT426 course material
Integrated Management of Neonatal and Childhood Illnesses (IMNCI) – Unit IV |...
Civil Department's presentation Your score increases as you pick a category
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
International_Financial_Reporting_Standa.pdf
The TKT Course. Modules 1, 2, 3.for self study
Compact First Student's Book Cambridge Official
Education and Perspectives of Education.pptx
Journal of Dental Science - UDMY (2021).pdf

Program Threats

  • 1. Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
  • 2. Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
  • 3. Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
  • 4. VirusCode fragment embedded in legitimate program.
  • 6. Very specific to CPU architecture, operating system, applications.
  • 7. Usually borne via email or as a macro.5/10/20104
  • 8. Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
  • 9. Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
  • 10. FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
  • 11. BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
  • 13. Example for :Wreak havoc5/10/201010
  • 14. MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
  • 15. Viruses for freeAntivirus withMillions $$5/10/201012
  • 16. Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
  • 18. PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
  • 19. EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
  • 20. StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus, was a stealth virus5/10/201017
  • 21. TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018
  • 22. MultipartiteInfect multiple parts of the system.Including boot sector, memory, and files.So it’s difficult to be detected by the antivirus scanner.5/10/201019
  • 23. ArmoredThe most dangerous type. The virus may use methods to make tracing, disassembling, and reverse engineering its code more difficult.Virus droppers and other full files which are part of a virus infestation are hidden.5/10/201020