SlideShare a Scribd company logo
K.M Riajul Islam
1
University of Rajshahi
Chapter-19
Malicious Software
2
Malicious Program?
3
• A Malicious Program is a set of instructions
that run on your computer and make your
system do something that an attacker wants to
do.
Taxonomy of Malicious Programs
4
Malicious
Programs
Needs host
program
Independent
Trap door Logic bombs Trojan horse Viruses Worm Zombie
Replicate
Trap Doors
• Single entry point into a program.
• Allows those who know access bypassing usual
security procedures.
• Have been commonly used by developers.
• The backdoor is code that recognizes some special
sequence of input or is triggered by being run from a
certain user ID or by an unlikely sequence of events.
• Backdoors become threats when unscrupulous
programmers use them to gain unauthorized access.
Logic Bomb
• One of oldest types of malicious software.
• Code embedded in legitimate program.
• Activated when specified conditions met.
• Presence/absence of some file.
• Particular date/time.
• Particular user.
• When triggered typically damage system.
• Modify/delete files/disks, halt machine etc.
Trojan Horse
• Program with hidden side-effects.
• Which is usually superficially attractive.
• For example, game, s/w upgrade etc.
• When run performs some additional tasks.
• Allows attacker to indirectly gain access which they do
not have directly.
• Often used to propagate a virus/worm or to
install a backdoor.
• Or simply to destroy data.
Zombie
• Program which secretly takes over another
networked computer.
• Then uses it to indirectly launch attacks.
• Often used to launch distributed denial of service
(DDoS) attacks.
• Exploits known flaws in network systems.
Virus
• A virus is a program that can infect other
programs by modifying them.
• A computer virus carries in its instructional
code the recipe for making perfect copies of
itself like biological virus.
• Lodged in a host computer, the typical virus
takes temporary control of the computer’s
disk operating system.
• Whenever the infected computer comes into
contact with an uninfected piece of
software, a fresh copy of the virus passes
into the new program.
Phases of Virus Lifetime
• The virus
is idle
and
waiting
Dormant
• The virus
places a
copy of
itself into
other
programs
Propagation
• Virus is
activated to
perform
function for
which it
was
intended
Trigger
• Virus function
is performed
Execution
Types of Virus
• Parasitic virus: Attaches itself to executable files and replicates
when the infected program is executed.
• Memory-resident virus: Resides in main memory as part of a
resident system program. This virus infects every program that
executes.
• Boot-sector virus: Infects a master boot record or boot record and
spreads when a system is booted from the disk containing virus.
• Stealth virus: A form of virus that hides itself from detection by
antivirus software.
• Polymorphic virus: A virus that mutates with every infection,
making detection by the “signature: of the virus impossible
Worms
 A worm is a program that can replicate itself
and send copies from computer to computer
across network connections but not infecting
program.
 Can run independently.
 Self replicating – usually very quickly.
 Usually performs some unwanted function.
 Actively seeks out more machines to infect.
Network Vehicles of Worms
Electronic mail facility
A worm mails a copy of itself to another
systems.
Remote execution capability
A worm executes a copy of itself on
another system remotely.
Remote login capability
Logs onto a remote system as a user and
then uses commands to copy itself from
one system to the other.
Thank You
14

More Related Content

PPT
Isys20261 lecture 05
PPTX
Malicious Software Identification
PPT
Malicious
PPT
Malicious software
PPTX
Anti virus
PPT
Security
DOCX
Logic bomb virus
ODP
Virus and antivirus final ppt
Isys20261 lecture 05
Malicious Software Identification
Malicious
Malicious software
Anti virus
Security
Logic bomb virus
Virus and antivirus final ppt

What's hot (20)

PPTX
Computer virus
PPTX
PPT
Computer virus
PDF
What is virus and methods to recover from different types of viruses
PPTX
Program security
PPT
Computer viruses
PPT
Trojan Horse Presentation
PPTX
Final malacious softwares
PPTX
Presentation Virus (salami attack and trojan horse)
PPTX
Computer Virus
PPTX
Trojan horse and salami attack
PPT
Trojan horse
PPT
Trojan Horse Virus
PPTX
Trojan ppt pianca
PPT
PPTX
computer software
DOCX
Different types of computer viruses
PPTX
Torjan horse virus
PPT
Application'sand security
Computer virus
Computer virus
What is virus and methods to recover from different types of viruses
Program security
Computer viruses
Trojan Horse Presentation
Final malacious softwares
Presentation Virus (salami attack and trojan horse)
Computer Virus
Trojan horse and salami attack
Trojan horse
Trojan Horse Virus
Trojan ppt pianca
computer software
Different types of computer viruses
Torjan horse virus
Application'sand security
Ad

Similar to Cryptography presentation (20)

PDF
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
PPT
Computer Virus
PPTX
Malicious software and software security
PPT
6unit1 virus and their types
PPTX
Kinds of Viruses
PPT
Rajul computer presentation
PPT
Lecture 12 malicious software
PPTX
Compter virus and its solution
PPTX
Viruses and virus countetmeasures
PPTX
Virus and its types 2
PDF
Lecture malicious software
PPTX
MALWARE UNIT 1 PPT.pptx...This covers about Malware Nomenclature and its types
PPT
virus,worms & analysis
PPTX
Lecture_11_Malware_information_Security.pptx
ODP
Viruses andthreats@dharmesh
PDF
Malicious software
PPTX
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
PPTX
Virus and malware presentation
PPTX
Chapter 11 Malicious Software - HCMUT.pptx
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Computer Virus
Malicious software and software security
6unit1 virus and their types
Kinds of Viruses
Rajul computer presentation
Lecture 12 malicious software
Compter virus and its solution
Viruses and virus countetmeasures
Virus and its types 2
Lecture malicious software
MALWARE UNIT 1 PPT.pptx...This covers about Malware Nomenclature and its types
virus,worms & analysis
Lecture_11_Malware_information_Security.pptx
Viruses andthreats@dharmesh
Malicious software
CHAPTER 5 - COMPUTER VIRUSERS & MALWARE.pptx
Virus and malware presentation
Chapter 11 Malicious Software - HCMUT.pptx
Virus and its CounterMeasures -- Pruthvi Monarch
Ad

Recently uploaded (20)

PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
advance database management system book.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PPTX
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
PDF
Hazard Identification & Risk Assessment .pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
IGGE1 Understanding the Self1234567891011
PPTX
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
PDF
Indian roads congress 037 - 2012 Flexible pavement
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Empowerment Technology for Senior High School Guide
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
Chinmaya Tiranga quiz Grand Finale.pdf
LNK 2025 (2).pdf MWEHEHEHEHEHEHEHEHEHEHE
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
advance database management system book.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Tissue processing ( HISTOPATHOLOGICAL TECHNIQUE
Hazard Identification & Risk Assessment .pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Weekly quiz Compilation Jan -July 25.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
IGGE1 Understanding the Self1234567891011
Chinmaya Tiranga Azadi Quiz (Class 7-8 )
Indian roads congress 037 - 2012 Flexible pavement
History, Philosophy and sociology of education (1).pptx
Empowerment Technology for Senior High School Guide
Final Presentation General Medicine 03-08-2024.pptx
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
UNIT III MENTAL HEALTH NURSING ASSESSMENT
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf

Cryptography presentation

  • 3. Malicious Program? 3 • A Malicious Program is a set of instructions that run on your computer and make your system do something that an attacker wants to do.
  • 4. Taxonomy of Malicious Programs 4 Malicious Programs Needs host program Independent Trap door Logic bombs Trojan horse Viruses Worm Zombie Replicate
  • 5. Trap Doors • Single entry point into a program. • Allows those who know access bypassing usual security procedures. • Have been commonly used by developers. • The backdoor is code that recognizes some special sequence of input or is triggered by being run from a certain user ID or by an unlikely sequence of events. • Backdoors become threats when unscrupulous programmers use them to gain unauthorized access.
  • 6. Logic Bomb • One of oldest types of malicious software. • Code embedded in legitimate program. • Activated when specified conditions met. • Presence/absence of some file. • Particular date/time. • Particular user. • When triggered typically damage system. • Modify/delete files/disks, halt machine etc.
  • 7. Trojan Horse • Program with hidden side-effects. • Which is usually superficially attractive. • For example, game, s/w upgrade etc. • When run performs some additional tasks. • Allows attacker to indirectly gain access which they do not have directly. • Often used to propagate a virus/worm or to install a backdoor. • Or simply to destroy data.
  • 8. Zombie • Program which secretly takes over another networked computer. • Then uses it to indirectly launch attacks. • Often used to launch distributed denial of service (DDoS) attacks. • Exploits known flaws in network systems.
  • 9. Virus • A virus is a program that can infect other programs by modifying them. • A computer virus carries in its instructional code the recipe for making perfect copies of itself like biological virus. • Lodged in a host computer, the typical virus takes temporary control of the computer’s disk operating system. • Whenever the infected computer comes into contact with an uninfected piece of software, a fresh copy of the virus passes into the new program.
  • 10. Phases of Virus Lifetime • The virus is idle and waiting Dormant • The virus places a copy of itself into other programs Propagation • Virus is activated to perform function for which it was intended Trigger • Virus function is performed Execution
  • 11. Types of Virus • Parasitic virus: Attaches itself to executable files and replicates when the infected program is executed. • Memory-resident virus: Resides in main memory as part of a resident system program. This virus infects every program that executes. • Boot-sector virus: Infects a master boot record or boot record and spreads when a system is booted from the disk containing virus. • Stealth virus: A form of virus that hides itself from detection by antivirus software. • Polymorphic virus: A virus that mutates with every infection, making detection by the “signature: of the virus impossible
  • 12. Worms  A worm is a program that can replicate itself and send copies from computer to computer across network connections but not infecting program.  Can run independently.  Self replicating – usually very quickly.  Usually performs some unwanted function.  Actively seeks out more machines to infect.
  • 13. Network Vehicles of Worms Electronic mail facility A worm mails a copy of itself to another systems. Remote execution capability A worm executes a copy of itself on another system remotely. Remote login capability Logs onto a remote system as a user and then uses commands to copy itself from one system to the other.

Editor's Notes

  • #2: AA. This is SM. I welcome all of you for being here.
  • #3: Today my presentation topic is about Malicious Software. This is a chapter from CANSPP book written by William stallings.
  • #4: Now lets see the first topic …what is malicious program?
  • #6: A backdoor, or trapdoor, is a secret entry point into a program that allows someone that is aware of it to gain access without going through the usual security access procedures. Have been used legitimately for many years to debug and test programs, but become a threat when left in production programs, allowing intruders to gain unauthorized access. It is difficult to implement operating system controls for backdoors. Security measures must focus on the program development and software update activities.
  • #7: legal
  • #8: A Trojan horse is a useful, or apparently useful, program or command procedure containing hidden code that, when invoked, performs some unwanted or harmful function.