SlideShare a Scribd company logo
2
Most read
4
Most read
7
Most read
Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
VirusCode fragment embedded in legitimate program.
How do viruses work ?
Very specific to CPU architecture, operating system, applications.
Usually borne via email or as a macro.5/10/20104
Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
5/10/20109
Example for :Wreak havoc5/10/201010
MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
Viruses for freeAntivirus withMillions $$5/10/201012
Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
5/10/201014
PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus,                  was a stealth virus5/10/201017
TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018

More Related Content

PPT
Ch02 System Threats and Risks
PPTX
System programming
PPTX
Programming for Problem Solving
PPT
Assembly language
PPTX
Virus and antivirus
PPT
introduction To Operating System
PPT
EVOLUTION OF SYSTEM
PPTX
Operating system 32 logical versus physical address
Ch02 System Threats and Risks
System programming
Programming for Problem Solving
Assembly language
Virus and antivirus
introduction To Operating System
EVOLUTION OF SYSTEM
Operating system 32 logical versus physical address

What's hot (20)

PPTX
Security & protection in operating system
PPT
Protection and Security in Operating Systems
PPTX
File system structure
PPTX
Deadlock Prevention
PPT
Network Security Threats and Solutions
PPT
Computer Worms
PPTX
Operating system security
PPS
Java rmi
PPTX
Firewall in Network Security
PPTX
Android Architecture.pptx
PPTX
Program and System Threats
PPTX
Malware ppt
PPTX
file system in operating system
PPTX
Operating System Security
PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Program security
PPTX
PPTX
Operators in java
PPT
Intrusion detection system ppt
PPT
Java-java virtual machine
Security & protection in operating system
Protection and Security in Operating Systems
File system structure
Deadlock Prevention
Network Security Threats and Solutions
Computer Worms
Operating system security
Java rmi
Firewall in Network Security
Android Architecture.pptx
Program and System Threats
Malware ppt
file system in operating system
Operating System Security
Network security (vulnerabilities, threats, and attacks)
Program security
Operators in java
Intrusion detection system ppt
Java-java virtual machine
Ad

Similar to Program Threats (20)

PPT
6unit1 virus and their types
PPT
Computer Viruses and Classification lecture slides ppt
PPT
PPTX
Virus.pptx
PPTX
Computer virus
PPTX
Virus
PPTX
Virus
PDF
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
PPTX
Kinds of Viruses
PPT
Virus and Malicious Code Chapter 5
PPTX
Chapter 11 Malicious Software - HCMUT.pptx
PPT
PPTX
Firewall , Viruses and Antiviruses
PPTX
Computer viruses
PPTX
Computer viruses
ODP
Viruses andthreats@dharmesh
ODP
Virus and antivirus final ppt
PPT
Information of Virus
PPTX
PPT on information technology laws description
PPTX
Compter virus and its solution
6unit1 virus and their types
Computer Viruses and Classification lecture slides ppt
Virus.pptx
Computer virus
Virus
Virus
CSC439-Sp2013-Module-9-Spring2013-Malware.pdf
Kinds of Viruses
Virus and Malicious Code Chapter 5
Chapter 11 Malicious Software - HCMUT.pptx
Firewall , Viruses and Antiviruses
Computer viruses
Computer viruses
Viruses andthreats@dharmesh
Virus and antivirus final ppt
Information of Virus
PPT on information technology laws description
Compter virus and its solution
Ad

Recently uploaded (20)

PDF
TR - Agricultural Crops Production NC III.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PPTX
Cell Structure & Organelles in detailed.
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Classroom Observation Tools for Teachers
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
TR - Agricultural Crops Production NC III.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Cell Structure & Organelles in detailed.
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Classroom Observation Tools for Teachers
FourierSeries-QuestionsWithAnswers(Part-A).pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPH.pptx obstetrics and gynecology in nursing
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Module 4: Burden of Disease Tutorial Slides S2 2025
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
01-Introduction-to-Information-Management.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
human mycosis Human fungal infections are called human mycosis..pptx
O5-L3 Freight Transport Ops (International) V1.pdf

Program Threats

  • 1. Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
  • 2. Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
  • 3. Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
  • 4. VirusCode fragment embedded in legitimate program.
  • 6. Very specific to CPU architecture, operating system, applications.
  • 7. Usually borne via email or as a macro.5/10/20104
  • 8. Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
  • 9. Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
  • 10. FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
  • 11. BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
  • 13. Example for :Wreak havoc5/10/201010
  • 14. MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
  • 15. Viruses for freeAntivirus withMillions $$5/10/201012
  • 16. Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
  • 18. PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
  • 19. EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
  • 20. StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus, was a stealth virus5/10/201017
  • 21. TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018
  • 22. MultipartiteInfect multiple parts of the system.Including boot sector, memory, and files.So it’s difficult to be detected by the antivirus scanner.5/10/201019
  • 23. ArmoredThe most dangerous type. The virus may use methods to make tracing, disassembling, and reverse engineering its code more difficult.Virus droppers and other full files which are part of a virus infestation are hidden.5/10/201020