SlideShare una empresa de Scribd logo
1 de 31
Descargar para leer sin conexión
Stealth Virus
Would you believe if I say this is not
         entirely true?
So lets explore the world of stealth
virus  the mechanisms they use to
 conceal themselves in our systems
What is a virus?
• A virus is a computer program that was written to
  purposely damage computer systems .

• Initially it was a hobby, later research, now a profession.
• Frederick Cohen coined the term 'Virus'.

• Cohen's definition of virus: A virus is a program that is able
  to infect other programs by modifying them to include a
  possibly evolved copy of itself.”

• A piece of code to be called a virus should be able to
  replicate itself. Along with this it can cause damage the
  computer.
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus
Stealth Virus

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
DDoS Attack PPT by Nitin Bisht
DDoS Attack  PPT by Nitin BishtDDoS Attack  PPT by Nitin Bisht
DDoS Attack PPT by Nitin Bisht
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Icann presentation (general)
Icann presentation (general)Icann presentation (general)
Icann presentation (general)
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Nanotechnology overview final
Nanotechnology overview finalNanotechnology overview final
Nanotechnology overview final
 
Arp spoofing
Arp spoofingArp spoofing
Arp spoofing
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Abstractive Text Summarization
Abstractive Text SummarizationAbstractive Text Summarization
Abstractive Text Summarization
 
Ethical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and toolsEthical hacking : Its methodologies and tools
Ethical hacking : Its methodologies and tools
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
NANOTECHNOLOGY
NANOTECHNOLOGYNANOTECHNOLOGY
NANOTECHNOLOGY
 
Linux Operating System Vulnerabilities
Linux Operating System VulnerabilitiesLinux Operating System Vulnerabilities
Linux Operating System Vulnerabilities
 
Quantum computer ppt
Quantum computer pptQuantum computer ppt
Quantum computer ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 

Destacado

Fluorescent multilayer-disc-pdf-and-ppt
Fluorescent multilayer-disc-pdf-and-pptFluorescent multilayer-disc-pdf-and-ppt
Fluorescent multilayer-disc-pdf-and-pptsrikanth boga
 
Network virus
Network virusNetwork virus
Network virusA M
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting systemAj Maurya
 
Wisenet network
Wisenet networkWisenet network
Wisenet networkbhavithd
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the InternetYogi Schulz
 
Cybernetics - So much more than robots
Cybernetics - So much more than robotsCybernetics - So much more than robots
Cybernetics - So much more than robotsCatherine Novak, MA
 
extreme Programming
extreme Programmingextreme Programming
extreme ProgrammingBilal Shah
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data StorageLikan Patra
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Walletjolly9293
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)habib_786
 
Wireless networking
Wireless networkingWireless networking
Wireless networkingOnline
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000Akash Varaiya
 

Destacado (20)

The Future of eLearning
The Future of eLearningThe Future of eLearning
The Future of eLearning
 
wi fiber
wi fiberwi fiber
wi fiber
 
Fluorescent multilayer-disc-pdf-and-ppt
Fluorescent multilayer-disc-pdf-and-pptFluorescent multilayer-disc-pdf-and-ppt
Fluorescent multilayer-disc-pdf-and-ppt
 
Sandbox
SandboxSandbox
Sandbox
 
Network virus
Network virusNetwork virus
Network virus
 
Handheld operting system
Handheld operting systemHandheld operting system
Handheld operting system
 
Wisenet network
Wisenet networkWisenet network
Wisenet network
 
Future of the Internet
Future of the InternetFuture of the Internet
Future of the Internet
 
Cybernetics - So much more than robots
Cybernetics - So much more than robotsCybernetics - So much more than robots
Cybernetics - So much more than robots
 
extreme Programming
extreme Programmingextreme Programming
extreme Programming
 
Holographic Data Storage
Holographic Data StorageHolographic Data Storage
Holographic Data Storage
 
MoneyPad:The Future Wallet
MoneyPad:The Future WalletMoneyPad:The Future Wallet
MoneyPad:The Future Wallet
 
Computer Vision
Computer VisionComputer Vision
Computer Vision
 
blue ray ppt
blue ray pptblue ray ppt
blue ray ppt
 
3d internet
3d internet3d internet
3d internet
 
Voice Over IP (VoIP)
Voice Over IP (VoIP)Voice Over IP (VoIP)
Voice Over IP (VoIP)
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Productivity
ProductivityProductivity
Productivity
 
Information technology act 2000
Information technology act 2000Information technology act 2000
Information technology act 2000
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 

Similar a Stealth Virus (20)

Viruses and its History
Viruses and its HistoryViruses and its History
Viruses and its History
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
εργασια
εργασιαεργασια
εργασια
 
Isas
IsasIsas
Isas
 
computer viruses
computer virusescomputer viruses
computer viruses
 
How computer works against thevirus or any threat
How computer works against thevirus or any threatHow computer works against thevirus or any threat
How computer works against thevirus or any threat
 
Virus vs Anti-Virus
Virus vs Anti-VirusVirus vs Anti-Virus
Virus vs Anti-Virus
 
Virus
VirusVirus
Virus
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Viruses worms
Viruses wormsViruses worms
Viruses worms
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
virus
virusvirus
virus
 
Computer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon ChakrabortyComputer Virus And Antivirus-Sumon Chakraborty
Computer Virus And Antivirus-Sumon Chakraborty
 
Computer virus (sarthak)
Computer virus (sarthak)Computer virus (sarthak)
Computer virus (sarthak)
 
Virus and its types 2
Virus and its types 2Virus and its types 2
Virus and its types 2
 
Virus, Worms And Antivirus
Virus, Worms And AntivirusVirus, Worms And Antivirus
Virus, Worms And Antivirus
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Virus-Awareness
Virus-AwarenessVirus-Awareness
Virus-Awareness
 

Último

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Stealth Virus

  • 2. Would you believe if I say this is not entirely true?
  • 3. So lets explore the world of stealth virus the mechanisms they use to conceal themselves in our systems
  • 4. What is a virus? • A virus is a computer program that was written to purposely damage computer systems . • Initially it was a hobby, later research, now a profession. • Frederick Cohen coined the term 'Virus'. • Cohen's definition of virus: A virus is a program that is able to infect other programs by modifying them to include a possibly evolved copy of itself.” • A piece of code to be called a virus should be able to replicate itself. Along with this it can cause damage the computer.