SlideShare a Scribd company logo
Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
VirusCode fragment embedded in legitimate program.
How do viruses work ?
Very specific to CPU architecture, operating system, applications.
Usually borne via email or as a macro.5/10/20104
Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
5/10/20109
Example for :Wreak havoc5/10/201010
MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
Viruses for freeAntivirus withMillions $$5/10/201012
Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
5/10/201014
PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus,                  was a stealth virus5/10/201017
TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018

More Related Content

PPTX
Program and System Threats
PDF
Computer viruses
PPT
Network virus detection & prevention
PPTX
Viruses & Malware
PPTX
Malicious Software
PPTX
Computer virus !!!!!
PPTX
Network security and viruses
PPT
Antivirus!!
Program and System Threats
Computer viruses
Network virus detection & prevention
Viruses & Malware
Malicious Software
Computer virus !!!!!
Network security and viruses
Antivirus!!

What's hot (20)

PPTX
Spyware and rootkit
PPTX
PPTX
Virus and Anti virus
PPTX
ODP
Virus&malware
PPTX
Antivirus - Virus detection and removal methods
PPTX
Virus soran university
PPT
Computer viruses and antiviruses PPT
PDF
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
PPS
Virus & Computer security threats
PPTX
Viruspresentacion10
PDF
Codigo Malicioso
PDF
Remote File Inclusion
PPTX
Malware and Anti-Malware Seminar by Benny Czarny
PPT
Ahmad Pussycat Dolls
PPTX
Anti Virus Software
PPTX
Firewall , Viruses and Antiviruses
PPT
Technical Report Writing Presentation
PPT
N U R S Y A H I R A R O S L A N
PPTX
Virus and malware presentation
Spyware and rootkit
Virus and Anti virus
Virus&malware
Antivirus - Virus detection and removal methods
Virus soran university
Computer viruses and antiviruses PPT
"Viruses Exploits Rootkits the Dilemma of a Linux Product Manager" by Alexand...
Virus & Computer security threats
Viruspresentacion10
Codigo Malicioso
Remote File Inclusion
Malware and Anti-Malware Seminar by Benny Czarny
Ahmad Pussycat Dolls
Anti Virus Software
Firewall , Viruses and Antiviruses
Technical Report Writing Presentation
N U R S Y A H I R A R O S L A N
Virus and malware presentation
Ad

Similar to Program threats (20)

PPTX
(Training) Malware - To the Realm of Malicious Code
PPT
Computer Viruses and Classification lecture slides ppt
PPTX
Malware: To The Realm of Malicious Code (Training)
PPT
Software security
PPT
Chapter-10 key management and distribution.ppt
PPTX
Virus and antivirus
PPT
Ne Course Part One
PPTX
PPTX
Types of Virus & Anti-virus
PPT
PDF
Information security
PDF
Computer viruses
PPTX
Computer viruses and prevention techniques
PPT
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
 
PPT
Malicious software
PPT
computervirus.ppt
PPT
Computer Virus And Antivirus-Sumon Chakraborty
PDF
Chapter 5 information assurance and security
PPT
Unit - 5.ppt
(Training) Malware - To the Realm of Malicious Code
Computer Viruses and Classification lecture slides ppt
Malware: To The Realm of Malicious Code (Training)
Software security
Chapter-10 key management and distribution.ppt
Virus and antivirus
Ne Course Part One
Types of Virus & Anti-virus
Information security
Computer viruses
Computer viruses and prevention techniques
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Malicious software
computervirus.ppt
Computer Virus And Antivirus-Sumon Chakraborty
Chapter 5 information assurance and security
Unit - 5.ppt
Ad

More from Medhat Dawoud (13)

PDF
Real time web
PPTX
Using Git and BitBucket
PDF
Introduction to linux
PPTX
Select your career
PPTX
Intro to t sql – 3rd session
PPTX
Intro to T-SQL - 1st session
PPTX
Intro to T-SQL – 2nd session
PPTX
Mesh cloud (road to mongoDB)
PPTX
Before start
PPTX
DevMix Startup
PPTX
Threading in C#
PPTX
How to python
PPTX
Unusual C# - OOP
Real time web
Using Git and BitBucket
Introduction to linux
Select your career
Intro to t sql – 3rd session
Intro to T-SQL - 1st session
Intro to T-SQL – 2nd session
Mesh cloud (road to mongoDB)
Before start
DevMix Startup
Threading in C#
How to python
Unusual C# - OOP

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Unlocking AI with Model Context Protocol (MCP)
Advanced methodologies resolving dimensionality complications for autism neur...
20250228 LYD VKU AI Blended-Learning.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25 Week I
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
MIND Revenue Release Quarter 2 2025 Press Release
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf

Program threats

  • 1. Program ThreatsVirus & logic bombPrepared and presented by :Medhat Dawoud5/10/20101
  • 2. Program threatsStack and BufferoverflowTrojan horseWorms Trap doorLogic BombVirus 5/10/20102
  • 3. Logic BombProgram that initiates a security incident under certain circumstances.Known by the Mentor Programmers (or any other one want to be professional in IT world).5/10/20103
  • 4. VirusCode fragment embedded in legitimate program.
  • 6. Very specific to CPU architecture, operating system, applications.
  • 7. Usually borne via email or as a macro.5/10/20104
  • 8. Virus Con."payload" of a virus is the part of the software that actually does the damage; the rest of the virus is used to break the security.Virus dropper inserts virus onto the system.virus signature is a pattern (a series of bytes) that can be used to identify the virus .5/10/20105
  • 9. Virus CategoriesMany categories of viruses, literally many thousands of viruses so that you can find a virus in two or more categories:FileBootMacroSource codePolymorphicEncryptedStealthTunnelingMultipartiteArmored5/10/20106
  • 10. FileAppend itself to a file.Change the start of the program to its code.Known as parasitic viruses.usually with extensions .BIN, .COM, .EXE, .OVL, .DRV.5/10/20107
  • 11. BootThe boot sector carries the Mater Boot Record (MBR) which read and load the operating system.Boot-sector viruses infect computer systems by copying code either to the boot sector on a floppy disk or the partition table on a hard disk.Executed every time the system is booting.Known as memory viruses.5/10/20108
  • 13. Example for :Wreak havoc5/10/201010
  • 14. MacroWritten in a high-level language.macros start automatically when a document is opened or closed (word – Excel).can be spread through e-mail attachments, discs, networks, modems, and the Internet.5/10/201011
  • 15. Viruses for freeAntivirus withMillions $$5/10/201012
  • 16. Source codeLooks for a source code and modifies it to include the virus and to help spread the virus.5/10/201013
  • 18. PolymorphicChange virus’s signature each time.It’s designed to avoid detection by antivirus software.A polymorphic virus acts like a chameleon.5/10/201015
  • 19. EncryptedEncrypted virus to avoid detection.It has a decryption code along with the encrypted virus.5/10/201016
  • 20. StealthIt use some tactics to avoid detection such as altering its file size, concealing itself in memory, and Modifies parts of the system that can be used to detect it. in fact, the first computer virus, was a stealth virus5/10/201017
  • 21. TunnelingInstall itself in the interrupt-handler chain or in device drivers attempting to bypass detection.Try to  intercept the actions before the anti-virus software can detect the malicious code.5/10/201018
  • 22. MultipartiteInfect multiple parts of the system.Including boot sector, memory, and files.So it’s difficult to be detected by the antivirus scanner.5/10/201019
  • 23. ArmoredThe most dangerous type. The virus may use methods to make tracing, disassembling, and reverse engineering its code more difficult.Virus droppers and other full files which are part of a virus infestation are hidden.5/10/201020