Programmed Threats

28
PROGRAMMED THREATS

Transcript of Programmed Threats

Page 1: Programmed Threats

PROGRAMMED THREATS

Page 2: Programmed Threats

What is Malicious Code

Page 3: Programmed Threats

What is Programmed Threats

Page 4: Programmed Threats
Page 5: Programmed Threats

Types of Programmed threats

Page 6: Programmed Threats

There are mainly two categories:• Independents: are self contained program that

can be scheduled and ran by the operating system.

• Needs host program: are essentially fragments of programs that can not exist independently of some actual application program, utility or system program.

Page 7: Programmed Threats

• Another dimension that can be used to categorize these threats is on the replication capability.

• Replication is a process that a code reproduces or duplicates itself.

Page 8: Programmed Threats

Types of Programmed Threats

• Types of Threats – Worms– Zombies– Viruses– Trap doors– Trojan horses– Logic Bombs– Salami

Page 9: Programmed Threats

Worms

Worms• An independent program that reproduces by

copying itself from one system to another.• The class was named for the way the worms

crawl from computer to computer, using networks and e-mail.

• This feature gives many worms a rather high speed in spreading themselves.

Page 10: Programmed Threats

Zombies• A program that secretly takes over another

internet-attached computer and then uses that computer to launch attacks that are difficult to trace to the zombie’s creator.

• Zombies are used in Denial of service attacks, typically against targeted web sites.

Page 11: Programmed Threats

Zombies• The zombie is planted on hundreds of

computers belonging to unsuspecting third parties and then used to overwhelm the target website by launching on overwhelming onslaught of internet traffic.

Page 12: Programmed Threats

Trap Door• A trap door is a secret entry point into a

program that allows someone that is aware at the trap door to gain access without going through the usual security access procedure.

• In many cases attacks using trap doors can give a great degree of access to the application, important data, or given the hosting system.

Page 13: Programmed Threats

• Trap doors have been used legitimately by programmers to debug and test programs, some of the legitimate reasons for trap doors are:– Intentionally leaves them for testing, and make

testing easier.– Intentionally leaves them for covert means of

access. In the other words, allows access in event of errors.

– Intentionally leaves them for fixing bugs.

Page 14: Programmed Threats

• But they may be used illegitimately, to provide future, illegal access. Trap doors become threats when they are used by unscrupulous programmers to gain unauthorized access.

• Back door is another name for a trap door, back doors provide immediate access to a system by passing employed authentication and security protocols, Attackers can use back doors to bypass security control and gain control at a system without time consuming hacking.

Page 15: Programmed Threats

Viruses• A virus is a piece of code that inserts itself into

another program and modifies it. • A virus is not an independent program, it

depends on the program it modifies and executes only when that program runs.

• It then reproduces and infects other programs.• Unlike a worm, a virus can not infect other

computers without assistance.

Page 16: Programmed Threats

Viruses• A virus can damage data directly or degrade

system performance by taking over system resources, which are then not available to authorized users

Page 17: Programmed Threats

Viruses• Viruses are classified according to how they

infect the computer system. They include the following categories:– Boot sector viruses– Program/File viruses– Macro viruses– Multipartite viruses

Page 18: Programmed Threats

Boot sector Viruses• These are transmitted when an infected disk

is left in the drive and the system is rebooted.• The virus is read from the infected boot sector

of the disk and written to the master boot block.

• The next time you reboot the virus is triggered.

Page 19: Programmed Threats

Program/File viruses• These attaach themselves to executable

programs or files. Once the infected progrma is run or the file is opened, the virus is transferred to the computer’s memory and may replicate further.

Page 20: Programmed Threats

Macro viruses• These infect files run by applications that use

macro languages.• The virus looks like a macro in the file.• When the file is opened, the virus can xecute

commands understood by the application’s macro language.

Page 21: Programmed Threats

Multipartite viruses• These have characteristics of both booot

sector and file viruses.• They may start out in the boot sector and

spread to applications, or vice versa.

Page 22: Programmed Threats

Memory – resident virus• Lodges in main memory as part of a resident

system program. From that point on, virus infects every program that executes.

Page 23: Programmed Threats

Polymorphic virus • Creates copies during replication that are

functionally equivalents but have distinctly different bit patterns.

• In this case the “signature “of the virus will vary with each copy.

Page 24: Programmed Threats

Stealth Virus• A format virus explicitly designed to hide itself

from detection by antivirus software. • When the virus is loaded into memory, it monitors

system calls to files and disk sectors, when a call is trapped the, virus modifies the information returned to the process making the call so that it sees the original uninfected information. This aids the virus in avoiding detection.

Page 25: Programmed Threats

Trojans horse• It is a piece of code that hides inside another

program and performs a concealed function.• It appears to perform a useful function but

hides another unauthorized program inside it.• When an authorized user tries to perform a

task with the program, the Trojan horse performs the unauthorized function as well.

Page 26: Programmed Threats

Salami• Salamis cut away tiny pieces of data. • They can be particularly dangerous as the

damage they do is small and can be attributed to some truncation of the system.

Page 27: Programmed Threats

Logic Bombs• This is a program, or a portion of a program,

which lies dormant until a specific piece of program logic is activated.

• It can be programmed to activate on a variety of variables such as system date, a message from the attacker, sizes of various objects and also the lack of an event.

Page 28: Programmed Threats

Logic Bombs• It does not replicate itself and does not

spread itself to unintended victims.