SlideShare una empresa de Scribd logo
1 de 31
Malicious Code 
Presented by: 
Niki Patel 
Hiralkumar Bhimani 
Khyati Rajput 
UVPCE, Ahmedabad 
Guide: Prof. Ketan Savarkar
Contents 
• Malicious Program 
• Viruses 
• Worms 
• Trojan 
• Logic Bombs 
• Spywares 
• Adwares
Malicious Program 
• Malicious programs refers to a broad 
category of programs that can cause 
damage or undesirable effects to computer 
networks. 
• The other words for this is Malware 
(Malicious Software), Badware, Rouge 
Program (a form of internet fraud using 
internet) 
• Besides malicious programs there are 
non-malicious programs as well.
Malicious program cont… 
• Malicious program is not a new concept, it 
was officially defined by Cohen in 1984, 
but the behaviour of the viruses was first 
observed in 1970. 
• The damages caused because of 
malicious code are: 
Potential damage can include modifying. 
Destroying or stealing data.
Gaining or allowing unauthorised access to 
a system 
Executing functions that a user never 
intended.
Malicious Programs
Viruses: 
• Viruses: A hidden self-replicating 
section of computer software, 
usually malicious code that 
propagates by infecting (i.e. 
inserting a copy into becoming a 
part of) another program or 
system memory. 
The viruses can damage your 
hardware, software or files and 
replicate themselves.
Categories of Viruses 
1. Boot sector virus : 
• infect boot sector of systems. 
• become resident. 
• activate while booting machine 
2. File virus : 
• infects program files. 
• activates when program is run.
Types of Viruses 
• Can classify on basis of how they 
attack 
• Parasitic virus 
• Memory-resident virus 
• Boot sector virus 
• Stealth 
• Polymorphic virus 
• Macro virus
Transient Virus is active only when its host 
program is active. 
Resident virus establishes itself in the computer’s 
memory & can remain active without its host. 
Macro Virus attached to some data file 
Email Virus spread using email with attachment 
containing a macro virus
Properties of Viruses 
 Virus program should be hard to detect by 
anti-virus software. 
 Viruses should be hard to destroy or deactivate. 
 Spread infection widely. 
 Should be easy to create. 
 Be able to re-infect. 
 Should be machine / platform independent, so 
that it can spread on different hosts.
Example: Melissa virus
Worms: 
• Worms: Reproducing programs that run 
independently and travel across network 
connections. 
• “Famous” worms are: 
- Morris Internet Worm(1988) 
- Code Red : had triggered time for Denial of 
Service attacks. 
- Code Red 2 : had backdoor installed to allow 
remote control. 
- Nimba : use multiple infection i.e.email,share, 
web clients, etc.
Pikachu Worm: A K-12 Nightmare
This dialog box appears 
after the 
PIKACHUPOKEMON.EXE 
file has been activated. Worm: 
• Accesses Outlook Address Book 
• Embeds code to delete Windows 
and Windows Subfolders upon 
Restart. 
• +: Does ask for permission to 
delete files with a “Y” command.
Virus v/s. Worms: 
• Viruses require interaction whereas 
worms act on there own. 
• Viruses has to relay on users 
transferring to infect files / programs 
while worms can use a network to 
replicate itself . 
• Speed of worms is more 
than viruses.
Trojan Horse: 
• Trojan Horse: 
– A Trojan horse is a program in 
which malicious or harmful code is 
present in such a way that it can 
get a control over the system & use 
to do its chosen form of damage. 
─Trojans are not viruses since they do 
not replicate, but Trojan horse 
programs can be just as destructive.
Continued… 
• Trojan Horses appear to be useful or 
interesting to an unsuspecting user, but 
are actually harmful. 
• A Trojan horse can be attached to any 
useful software by a cracker & can be 
spread by tricking users into believing that 
it is a useful program.
Damages caused by Trojans 
• Erasing or overwriting data on a computer. 
• Corrupting files. 
• Installing a backdoor on a computer. 
• Spreading other malware, such as viruses, 
hence they are also known as “dropper”. 
• Logging keystrokes to steal information 
such as passwords & credit card numbers 
(known as key loggers).
Attack of Trojan Horse 
• Trojan horse attacks any system in the 
following manner.
Situation of user after attack
Logic Bomb: 
• Logic Bomb: A logic bomb is a 
type of Trojan Horse that executes 
when specific conditions occur. 
– Triggers for logic bombs can include 
change in a file, by a particular series of 
keystrokes, or at a specific time or date. 
– Suppose a programmer may hide a 
piece of code that starts deleting files.
Spyware 
• A spyware is a computer 
software which is installed 
automatically when you surf 
internet or when you install 
free software. 
• Spyware is known to 
change computer settings.
• Spyware collects various types of 
information like: 
Internet surfing habits. 
Visited sites. 
Interfere in installing additional software. 
Redirect web browser activity.
Spyware is a legal program….. 
• Here it is in the form of virus alerts.
Adware 
• Adware is any software package which 
automatically plays, displays or downloads 
advertisements to a computer after the 
software is installed on it or while the 
application is being used. 
• It’s a legal program. 
• Well known adware program is 
“123 Messenger”
123 Messenger…. 
• Is in the form of popups & unexplained 
advertising programs in your computer.
• Advertising companies 
hope to generate 
money from customers 
who receive the popups 
or unexplained programs 
on their computers
How to detect that your computer has a 
spyware or adware?? 
Continuous popups. 
Persistent change 
in your homepage. 
Slower computer 
processing, takes 
the computer longer 
to process or startup.
Software Security 
• Only install necessary and trusted 
software. 
• Beware of *free* games, screen savers, 
and graphics. 
• Keep a hard copy of the copyright 
release for all “free” products! 
• Run and UPDATE anti-virus software!!
Thank you….

Más contenido relacionado

La actualidad más candente

Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security Sanguine_Eva
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018Will Adams
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime typeskiran yadav
 
Network defenses
Network defensesNetwork defenses
Network defensesG Prachi
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityDipesh Waghela
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber SecurityDominic Rajesh
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's typesAakash Baloch
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Network security
Network securityNetwork security
Network securityfatimasaham
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And AntivirusLokesh Kumar N
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafeCheapSSLsecurity
 

La actualidad más candente (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Two factor authentication 2018
Two factor authentication 2018Two factor authentication 2018
Two factor authentication 2018
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
Virus and worms
Virus and wormsVirus and worms
Virus and worms
 
Phishing
PhishingPhishing
Phishing
 
Malware
MalwareMalware
Malware
 
Network defenses
Network defensesNetwork defenses
Network defenses
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Network security
Network securityNetwork security
Network security
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Phishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You SafePhishing Scams: 8 Helpful Tips to Keep You Safe
Phishing Scams: 8 Helpful Tips to Keep You Safe
 

Destacado

Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Computer virus
Computer virusComputer virus
Computer virusRa Bia
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkgUmang Gupta
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer VirusYo Maruf
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses Mohak Jain
 
Computer Virus
Computer VirusComputer Virus
Computer Virusizzul
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer virusesjnnj
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls AttacksHafiza Abas
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKINGSHERALI445
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)ainizbahari97
 
Customer ordering system
Customer ordering systemCustomer ordering system
Customer ordering systemSuriey Tafar
 

Destacado (20)

Malicious software
Malicious softwareMalicious software
Malicious software
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malicious Code
Malicious  CodeMalicious  Code
Malicious Code
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
23 network security threats pkg
23 network security threats pkg23 network security threats pkg
23 network security threats pkg
 
Presentation Slide: Computer Virus
Presentation Slide: Computer VirusPresentation Slide: Computer Virus
Presentation Slide: Computer Virus
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
Malware ppt
Malware pptMalware ppt
Malware ppt
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
Ppt on different types of computer viruses
Ppt on different types of computer virusesPpt on different types of computer viruses
Ppt on different types of computer viruses
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 
TYPES OF HACKING
TYPES OF HACKINGTYPES OF HACKING
TYPES OF HACKING
 
Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)Computer virus (Microsoft Powerpoint)
Computer virus (Microsoft Powerpoint)
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Customer ordering system
Customer ordering systemCustomer ordering system
Customer ordering system
 

Similar a Malicious

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxZarwashgulrez
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)Zara Nawaz
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimenidhidgowda185
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMohsin Dahar
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virusKennethMorales26
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threatsAzri Abdin
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threatAzri Abdin
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measuresDnyaneshwar Beedkar
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
 

Similar a Malicious (20)

lecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptxlecture-11-30052022-103626am.pptx
lecture-11-30052022-103626am.pptx
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Computer virus
Computer virusComputer virus
Computer virus
 
Malwares
MalwaresMalwares
Malwares
 
Cyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crimeCyber security:Tools used in cyber crime
Cyber security:Tools used in cyber crime
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
anti_virus
anti_virusanti_virus
anti_virus
 
PowerPoint presentation about computer virus
PowerPoint presentation about computer virusPowerPoint presentation about computer virus
PowerPoint presentation about computer virus
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Computer Security threat
Computer Security threatComputer Security threat
Computer Security threat
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Network and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan Anjum
 

Último

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoordharasingh5698
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 

Último (20)

Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 

Malicious

  • 1. Malicious Code Presented by: Niki Patel Hiralkumar Bhimani Khyati Rajput UVPCE, Ahmedabad Guide: Prof. Ketan Savarkar
  • 2. Contents • Malicious Program • Viruses • Worms • Trojan • Logic Bombs • Spywares • Adwares
  • 3. Malicious Program • Malicious programs refers to a broad category of programs that can cause damage or undesirable effects to computer networks. • The other words for this is Malware (Malicious Software), Badware, Rouge Program (a form of internet fraud using internet) • Besides malicious programs there are non-malicious programs as well.
  • 4. Malicious program cont… • Malicious program is not a new concept, it was officially defined by Cohen in 1984, but the behaviour of the viruses was first observed in 1970. • The damages caused because of malicious code are: Potential damage can include modifying. Destroying or stealing data.
  • 5. Gaining or allowing unauthorised access to a system Executing functions that a user never intended.
  • 7. Viruses: • Viruses: A hidden self-replicating section of computer software, usually malicious code that propagates by infecting (i.e. inserting a copy into becoming a part of) another program or system memory. The viruses can damage your hardware, software or files and replicate themselves.
  • 8. Categories of Viruses 1. Boot sector virus : • infect boot sector of systems. • become resident. • activate while booting machine 2. File virus : • infects program files. • activates when program is run.
  • 9. Types of Viruses • Can classify on basis of how they attack • Parasitic virus • Memory-resident virus • Boot sector virus • Stealth • Polymorphic virus • Macro virus
  • 10. Transient Virus is active only when its host program is active. Resident virus establishes itself in the computer’s memory & can remain active without its host. Macro Virus attached to some data file Email Virus spread using email with attachment containing a macro virus
  • 11. Properties of Viruses  Virus program should be hard to detect by anti-virus software.  Viruses should be hard to destroy or deactivate.  Spread infection widely.  Should be easy to create.  Be able to re-infect.  Should be machine / platform independent, so that it can spread on different hosts.
  • 13. Worms: • Worms: Reproducing programs that run independently and travel across network connections. • “Famous” worms are: - Morris Internet Worm(1988) - Code Red : had triggered time for Denial of Service attacks. - Code Red 2 : had backdoor installed to allow remote control. - Nimba : use multiple infection i.e.email,share, web clients, etc.
  • 14. Pikachu Worm: A K-12 Nightmare
  • 15. This dialog box appears after the PIKACHUPOKEMON.EXE file has been activated. Worm: • Accesses Outlook Address Book • Embeds code to delete Windows and Windows Subfolders upon Restart. • +: Does ask for permission to delete files with a “Y” command.
  • 16. Virus v/s. Worms: • Viruses require interaction whereas worms act on there own. • Viruses has to relay on users transferring to infect files / programs while worms can use a network to replicate itself . • Speed of worms is more than viruses.
  • 17. Trojan Horse: • Trojan Horse: – A Trojan horse is a program in which malicious or harmful code is present in such a way that it can get a control over the system & use to do its chosen form of damage. ─Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.
  • 18. Continued… • Trojan Horses appear to be useful or interesting to an unsuspecting user, but are actually harmful. • A Trojan horse can be attached to any useful software by a cracker & can be spread by tricking users into believing that it is a useful program.
  • 19. Damages caused by Trojans • Erasing or overwriting data on a computer. • Corrupting files. • Installing a backdoor on a computer. • Spreading other malware, such as viruses, hence they are also known as “dropper”. • Logging keystrokes to steal information such as passwords & credit card numbers (known as key loggers).
  • 20. Attack of Trojan Horse • Trojan horse attacks any system in the following manner.
  • 21. Situation of user after attack
  • 22. Logic Bomb: • Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. – Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date. – Suppose a programmer may hide a piece of code that starts deleting files.
  • 23. Spyware • A spyware is a computer software which is installed automatically when you surf internet or when you install free software. • Spyware is known to change computer settings.
  • 24. • Spyware collects various types of information like: Internet surfing habits. Visited sites. Interfere in installing additional software. Redirect web browser activity.
  • 25. Spyware is a legal program….. • Here it is in the form of virus alerts.
  • 26. Adware • Adware is any software package which automatically plays, displays or downloads advertisements to a computer after the software is installed on it or while the application is being used. • It’s a legal program. • Well known adware program is “123 Messenger”
  • 27. 123 Messenger…. • Is in the form of popups & unexplained advertising programs in your computer.
  • 28. • Advertising companies hope to generate money from customers who receive the popups or unexplained programs on their computers
  • 29. How to detect that your computer has a spyware or adware?? Continuous popups. Persistent change in your homepage. Slower computer processing, takes the computer longer to process or startup.
  • 30. Software Security • Only install necessary and trusted software. • Beware of *free* games, screen savers, and graphics. • Keep a hard copy of the copyright release for all “free” products! • Run and UPDATE anti-virus software!!