SlideShare a Scribd company logo
Viruses & Application Security
Agenda
• What Is Computer Virus
• Symptoms
• How does it spread
• Types Of Viruses
• Other Programs similar to Viruses
• Application Security
• Why Application Security Is Important
• Why Often Application Security Is Ignored
• Basic Security Concepts
• Securing the Application
• Conclusion
What is a computer virus?
• Computer viruses are a type of software program that is like a
biological virus, replicate and spread without the users
knowledge
• Some virus may display only a message on the screen, others
may slow down the Pc
• They can also erase files or even format your floppy or hard
disk and crash the system
Symptoms
• Letters looks like they are falling to the bottom of the screen.
• The computer system becomes slow.
• The size of available free memory reduces.
• The hard disk runs out of space.
• The computer does not boot.
How does it spread
• Computer viruses spread by attaching themselves to other
computer program files
• When you exchange a file from pen drive with virus into our Pc,
the virus spreads from one file to the another
• Viruses also spreads when a Computer Engineer comes to repair
your system and puts his/her diagnostics disks in your PC
Programs Effecting Computers

Computer Viruses

Malwares

Worms

Trojan horses

Spyware

Adware
Types of viruses

Resident

Direct Action

Overwrite

Boot

Macro

Directory
Polymorphic
File Infectors
Companion
Fat
Logic Bombs
Resident Virus
 A virus that takes up permanent residence in the RAM
memory. It can take over or interupt any operation executed
by the computer system. It can corrupt files and programs;
such as copy, open, close, rename and more.
 Examples: Randex, CMJ, Meve, and MrKlunky.
Direct Action Virus
 A batch file that resides in the root directory of the hard disk.
When executed it will infect files in the directory and also
directed to the batch file AUTOEXEC.BAT file PATH.
Overwrite Virus
 A virus that deletes of overwrites part or all of the information
in a file, making them partially or totally worthless. To get
rid of the virus, the file has to be deleted.
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
• A virus that affects the boot sector of the hard drive or a
floppy drive. The boot sector gives the computer information
on how to boot, if it is not functioning the computer won't
boot. To avoid a boot virus, don't boot your computer with an
unknown floppy disk in your floppy drive and make sure it is
write protected.
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
 A virus written in a macro language that infects the files that
were created with it. When the file is opened the macro virus
runs automatically. This may arrive on your computer by
email attachment.
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
Directory Virus

Directory viruses will replace an existing executable and
move the real file somewhere else, so when you run it you are
unknowingly running the virus program instead of the
original. It then becomes impossible to find the original file.
Polymorphic Virus
 Viruses that encode or encrypt themselves so that each new
version is different. This enables them to replicate and very
hard for virus scanners to track down.
File Infectors
 The majority of viruses are file infectors. This virus is
activated by running an executable file like .exe or .com
extension files. Once run, the virus does its damage
according to the program in the executable file.
Companion Virus
 Once the system is infected they accompany the files that
already exist. They can lay in wait or take action
immediately.
Some examples include: Stator, Asimov.1539, and
Terrax.1069
Fat Virus
 This virus will only infect a computer running a file
allocation table (FAT) file system. This virus will prevent
access to parts of the hard drive preventing files to be
accessed Newer windows computers use NTFS and don't
need to worry about this virus.
Computers Must Exist within a
Secure Infrastructure
 Harden systems
 Use concept of least-privilege
 Patch management
 Firewalls
 Using Anti Virus Programs
 Intrusion detection
 Virus protection
Application Security
 An application is a program or group of programs designed for
end users.
 Security is the degree of resistance to, or protection from, harm.
It applies to any vulnerable and valuable asset, such as a person,
dwelling, community, nation, or organization.
 Application security is the use of software, hardware, and
procedural methods to protect applications from external and
internal threats.
Why Is Application Security
Important?
• New threats emerge every day
• Some hackers are not satisfied with penetrating your
network, they seek information that resides in your
applications/databases
• Applications are often with poor designs, software bugs,
and poor programming practices
• Applications may be a fast and have an easy entry point into
a secure network
• Applications contain and process your most critical
(important and sensitive) information
• Programming logic may be exposed to the possibility of being
attacked just as troublesome as difficulties inherent with
certain technologies
Why Is Application Security
Often Ignored?
 Usually there are time and budget constraints in application
development that cause proper testing and secure programming
training to fall to the way aside
 Security is typically not prioritized by programming teams, they
are paid to deliver functionality first and foremost
 E-commerce initiatives are often rushed into production
 Organizations often expect the software manufacturer “build in”
security is 80% process driven, 20% software driven
Four Basic Security Concepts
Poor application security measures can lead to breaches in data:
 Data Integrity
 Confidentiality
 Availability
 Accountability
Data Integrity
• Data Integrity means having a secure and reliable data in the
database
• Protection of information from tampering, forgery, or accidental
changes.
Examples:
• January 2004, there were 13,654 known attacks on Linux
Servers
Confidentiality
 Ensures that applications and data is accessible to only the users
intended and authorized to have access.
 Examples : While Login in Providing Id’s and Passwords
Availability
 Ensures that authorized users have access to the application and
the data when required.
 Example: Microsoft Developer Store
 Checking PNR Status Indian Railway Systems
Accountability Within the
Application
 Ensure accuracy of data and guide against unauthorized
modifications
 Who did what with your data?
 Examples : Having Notification To Our Mobiles From Social
Networking Sites
Securing the Application
 Authentication & Identification
 Authorization & Access Control
 Logging & Auditing Procedures
 Managing User Sessions
 Cryptography
 Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
Conclusion
Every Application must be developed in Ethical hacking
perspective
Prevent the loss, modification, or misuse of application systems
“data” or application architecture. Here we are focusing on
web-enabled systems
Making an e-commerce application secure is much harder than
just adding a password protected login screen!
Thank You

More Related Content

PPS
Virus & Computer security threats
PPTX
Computer virus-and-antivirus
PPTX
computer virus and related legal issues
PPTX
Computer virus
PPTX
Computer virus
PPT
ODP
Computer virus
PPTX
Virus
Virus & Computer security threats
Computer virus-and-antivirus
computer virus and related legal issues
Computer virus
Computer virus
Computer virus
Virus

What's hot (20)

PPTX
Antivirus PPt
PPT
Virus project
PPTX
Computer virus
PPTX
Computer Virus
PPTX
Computer Virus 2017
PPTX
Antivirus ppt
PPTX
Computer virus !!!!!
PPTX
Computer viruses
PDF
Security and Viruses
PPTX
Computer virus
PPTX
Computer virus
PPT
Itc lec 15 Computer security risks
PPTX
Computer virus
PPTX
Computer virus
PPTX
Computer Virus
PPTX
Antivirus software
PPT
How Computer Viruses Work
PPTX
computer Virus
Antivirus PPt
Virus project
Computer virus
Computer Virus
Computer Virus 2017
Antivirus ppt
Computer virus !!!!!
Computer viruses
Security and Viruses
Computer virus
Computer virus
Itc lec 15 Computer security risks
Computer virus
Computer virus
Computer Virus
Antivirus software
How Computer Viruses Work
computer Virus
Ad

Viewers also liked (8)

PPT
Zika Virus-Epidemology and charecterisitics of zika virus
PDF
Replication of DNA Virus Genomes
PPTX
Epidemology and control of protozoan parasite
PPTX
Cultivation of Viruses
PPT
Chapter 2 classification of virus
PDF
Zika virus
PDF
Virus structure: classification: replication
PPTX
Bacteriophage vectors
Zika Virus-Epidemology and charecterisitics of zika virus
Replication of DNA Virus Genomes
Epidemology and control of protozoan parasite
Cultivation of Viruses
Chapter 2 classification of virus
Zika virus
Virus structure: classification: replication
Bacteriophage vectors
Ad

Similar to Application'sand security (20)

PPTX
Securing The Computer From Viruses ...
PPT
PPT
cyber security cyber security cyber security cyber security
ODP
Viruses andthreats@dharmesh
PPTX
Virus vs anti virus
PPTX
Firewall , Viruses and Antiviruses
PPTX
Computer virus !!!!!
PPTX
Types of Virus & Anti-virus
PPT
computer-viruses
PPT
Antiviruse.ppt
PPTX
Final malacious softwares
PPTX
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PPT
6unit1 virus and their types
PPT
computervirus.ppt
PPTX
Computer viruses and prevention techniques
PPTX
ANATOMY OF A COMPUTER VIRUS.pptx
PPTX
Antivirus programs
PPTX
Computer viruses
PPTX
Computer viruses - A daily harm
Securing The Computer From Viruses ...
cyber security cyber security cyber security cyber security
Viruses andthreats@dharmesh
Virus vs anti virus
Firewall , Viruses and Antiviruses
Computer virus !!!!!
Types of Virus & Anti-virus
computer-viruses
Antiviruse.ppt
Final malacious softwares
Ch-06 (ICS I) - Security, Copyright and the Law.pptx
Virus and its CounterMeasures -- Pruthvi Monarch
6unit1 virus and their types
computervirus.ppt
Computer viruses and prevention techniques
ANATOMY OF A COMPUTER VIRUS.pptx
Antivirus programs
Computer viruses
Computer viruses - A daily harm

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
A comparative analysis of optical character recognition models for extracting...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
MIND Revenue Release Quarter 2 2025 Press Release
Accuracy of neural networks in brain wave diagnosis of schizophrenia
SOPHOS-XG Firewall Administrator PPT.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Machine learning based COVID-19 study performance prediction
gpt5_lecture_notes_comprehensive_20250812015547.pdf
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation

Application'sand security

  • 2. Agenda • What Is Computer Virus • Symptoms • How does it spread • Types Of Viruses • Other Programs similar to Viruses • Application Security • Why Application Security Is Important • Why Often Application Security Is Ignored • Basic Security Concepts • Securing the Application • Conclusion
  • 3. What is a computer virus? • Computer viruses are a type of software program that is like a biological virus, replicate and spread without the users knowledge • Some virus may display only a message on the screen, others may slow down the Pc • They can also erase files or even format your floppy or hard disk and crash the system
  • 4. Symptoms • Letters looks like they are falling to the bottom of the screen. • The computer system becomes slow. • The size of available free memory reduces. • The hard disk runs out of space. • The computer does not boot.
  • 5. How does it spread • Computer viruses spread by attaching themselves to other computer program files • When you exchange a file from pen drive with virus into our Pc, the virus spreads from one file to the another • Viruses also spreads when a Computer Engineer comes to repair your system and puts his/her diagnostics disks in your PC
  • 6. Programs Effecting Computers  Computer Viruses  Malwares  Worms  Trojan horses  Spyware  Adware
  • 7. Types of viruses  Resident  Direct Action  Overwrite  Boot  Macro  Directory Polymorphic File Infectors Companion Fat Logic Bombs
  • 8. Resident Virus  A virus that takes up permanent residence in the RAM memory. It can take over or interupt any operation executed by the computer system. It can corrupt files and programs; such as copy, open, close, rename and more.  Examples: Randex, CMJ, Meve, and MrKlunky.
  • 9. Direct Action Virus  A batch file that resides in the root directory of the hard disk. When executed it will infect files in the directory and also directed to the batch file AUTOEXEC.BAT file PATH.
  • 10. Overwrite Virus  A virus that deletes of overwrites part or all of the information in a file, making them partially or totally worthless. To get rid of the virus, the file has to be deleted. Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
  • 11. Boot Virus • A virus that affects the boot sector of the hard drive or a floppy drive. The boot sector gives the computer information on how to boot, if it is not functioning the computer won't boot. To avoid a boot virus, don't boot your computer with an unknown floppy disk in your floppy drive and make sure it is write protected. Examples of boot viruses include: Polyboot.B, AntiEXE.
  • 12. Macro Virus  A virus written in a macro language that infects the files that were created with it. When the file is opened the macro virus runs automatically. This may arrive on your computer by email attachment. Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
  • 13. Directory Virus  Directory viruses will replace an existing executable and move the real file somewhere else, so when you run it you are unknowingly running the virus program instead of the original. It then becomes impossible to find the original file.
  • 14. Polymorphic Virus  Viruses that encode or encrypt themselves so that each new version is different. This enables them to replicate and very hard for virus scanners to track down.
  • 15. File Infectors  The majority of viruses are file infectors. This virus is activated by running an executable file like .exe or .com extension files. Once run, the virus does its damage according to the program in the executable file.
  • 16. Companion Virus  Once the system is infected they accompany the files that already exist. They can lay in wait or take action immediately. Some examples include: Stator, Asimov.1539, and Terrax.1069
  • 17. Fat Virus  This virus will only infect a computer running a file allocation table (FAT) file system. This virus will prevent access to parts of the hard drive preventing files to be accessed Newer windows computers use NTFS and don't need to worry about this virus.
  • 18. Computers Must Exist within a Secure Infrastructure  Harden systems  Use concept of least-privilege  Patch management  Firewalls  Using Anti Virus Programs  Intrusion detection  Virus protection
  • 19. Application Security  An application is a program or group of programs designed for end users.  Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization.  Application security is the use of software, hardware, and procedural methods to protect applications from external and internal threats.
  • 20. Why Is Application Security Important? • New threats emerge every day • Some hackers are not satisfied with penetrating your network, they seek information that resides in your applications/databases • Applications are often with poor designs, software bugs, and poor programming practices • Applications may be a fast and have an easy entry point into a secure network • Applications contain and process your most critical (important and sensitive) information • Programming logic may be exposed to the possibility of being attacked just as troublesome as difficulties inherent with certain technologies
  • 21. Why Is Application Security Often Ignored?  Usually there are time and budget constraints in application development that cause proper testing and secure programming training to fall to the way aside  Security is typically not prioritized by programming teams, they are paid to deliver functionality first and foremost  E-commerce initiatives are often rushed into production  Organizations often expect the software manufacturer “build in” security is 80% process driven, 20% software driven
  • 22. Four Basic Security Concepts Poor application security measures can lead to breaches in data:  Data Integrity  Confidentiality  Availability  Accountability
  • 23. Data Integrity • Data Integrity means having a secure and reliable data in the database • Protection of information from tampering, forgery, or accidental changes. Examples: • January 2004, there were 13,654 known attacks on Linux Servers
  • 24. Confidentiality  Ensures that applications and data is accessible to only the users intended and authorized to have access.  Examples : While Login in Providing Id’s and Passwords
  • 25. Availability  Ensures that authorized users have access to the application and the data when required.  Example: Microsoft Developer Store  Checking PNR Status Indian Railway Systems
  • 26. Accountability Within the Application  Ensure accuracy of data and guide against unauthorized modifications  Who did what with your data?  Examples : Having Notification To Our Mobiles From Social Networking Sites
  • 27. Securing the Application  Authentication & Identification  Authorization & Access Control  Logging & Auditing Procedures  Managing User Sessions  Cryptography  Examples: Ceaser Cipher Text Modification, RSAAlgorithms etc
  • 28. Conclusion Every Application must be developed in Ethical hacking perspective Prevent the loss, modification, or misuse of application systems “data” or application architecture. Here we are focusing on web-enabled systems Making an e-commerce application secure is much harder than just adding a password protected login screen!