Malicious software and software security

19. Aug 2019
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
Malicious software and software  security
1 von 76

Más contenido relacionado

Was ist angesagt?

Virus and malware presentationVirus and malware presentation
Virus and malware presentationAmjad Bhutto
Malware pptMalware ppt
Malware pptFaiz Khan
Network security (vulnerabilities, threats, and attacks)Network security (vulnerabilities, threats, and attacks)
Network security (vulnerabilities, threats, and attacks)Fabiha Shahzad
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
VULNERABILITY ( CYBER SECURITY )VULNERABILITY ( CYBER SECURITY )
VULNERABILITY ( CYBER SECURITY )Kashyap Mandaliya
IntrudersIntruders
IntrudersALOK KUMAR

Similar a Malicious software and software security

Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet
Introduction to Virus,Worms,Trojans & Malwares - NullAhm pre-meet Pranjal Vyas
HOW HACKERS CONDUCT CYBER WARFAREHOW HACKERS CONDUCT CYBER WARFARE
HOW HACKERS CONDUCT CYBER WARFAREUK Defence Cyber School
Network and Security | by M.Hassaan AnjumNetwork and Security | by M.Hassaan Anjum
Network and Security | by M.Hassaan AnjumHassaan Anjum
anti_virusanti_virus
anti_virussharq university
Virus and its types 2Virus and its types 2
Virus and its types 2Saud G
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch Pruthvi Monarch

Más de G Prachi

The trusted computing architectureThe trusted computing architecture
The trusted computing architectureG Prachi
Security risk managementSecurity risk management
Security risk managementG Prachi
Mobile platform security modelsMobile platform security models
Mobile platform security modelsG Prachi
Network defensesNetwork defenses
Network defensesG Prachi
Network protocols and vulnerabilitiesNetwork protocols and vulnerabilities
Network protocols and vulnerabilitiesG Prachi
Web application security part 02Web application security part 02
Web application security part 02G Prachi

Último

Data Formats: Reading and writing JSON – XML - YAMLData Formats: Reading and writing JSON – XML - YAML
Data Formats: Reading and writing JSON – XML - YAMLCSUC - Consorci de Serveis Universitaris de Catalunya
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
Navigating the FutureNavigating the Future
Navigating the FutureOnBoard
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23Easy Salesforce CI/CD with Open Source Only - Dreamforce 23
Easy Salesforce CI/CD with Open Source Only - Dreamforce 23NicolasVuillamy1
Announcing InfluxDB ClusteredAnnouncing InfluxDB Clustered
Announcing InfluxDB ClusteredInfluxData
sap.pptxsap.pptx
sap.pptxSAP

Malicious software and software security

Hinweis der Redaktion

  1. P1- eg includes virus, spyware, worm, etc P2- fake transaction site, fake facebook, etc P3- Similar to Phishing site but difference being that here data which is downloaded on device is harmful eg: Drive by Download attacks
  2. The example is explanation of how Trojan horse works
  3. P1- The user is unaware of such files mostly because lack of knowledge of existence of such attacks
  4. If there is a bug in chrome which lets web page admin access data of other cookies when the url is opened then this is not a malware but a vulnerability. As the data which is stolen is not collected by chrome but by the malicious admin. Thus malware in this case can be the data which the website is downloading on your device
  5. Bot net examples are Storm, Conficker, Zeus, Flashback, Windigo, etc. these are zombie botnets A zombie is a machine which has been infected by some sort of remotely controlled malware Virus can spread through script files, documents,XSS vulnerability, etc
  6. Worms Worms cause ham to the host network by eating up bandwidth and overloading web servers Worms can also contain payloads that damage host machines Worms can also be classifies as a computer virus but with a major difference Difference is that worms can self replicate independently whereas virus depends on human activity for the same Ransomware The malware restricts the user from accessing the computer files by either encrypting files on harddrive or locking the system Ransomware spreads like a worm either by a downloadable file or by through some other vulnerability in the network
  7. Scareware is a type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software It generates popup similar to windows system messages and usually purpots to be a antivirus or antispyware software, a firewall or a registery cleaner The message typically says large number of problems such as infected files are found on the system and user is prompted to purchase software to solve the so called issue
  8. Trojan Horse The create backdoor in the system giving access of your system to the malicious user Unlike virus and worms they do not reproduce by infecting other files and do not self replicate Keylogger Keylogger spreads like virus or worms and often causes financial loss because of stealing sensitive data like net banking passwords
  9. In major cases botnets are used to cause denial of service attacks Famous example include Estonia and Russia war of 2007-2008
  10. Eg of Phishing attacks Deactivation scares: your purchase is about to expire Lookalike sites: Copy of facebook Nigerian fee scams: advances fee to perform some tasks which are never done Go directly to jail: Fake messages to pay tax via the link provided or we’ll send your tax stealing data to the Income Tax Department
  11. Infection mechanism generally targets files and infects those which are most likely to be used by user: E.g. My compute shortcut on desktop Trigger is mostly user clicking on files, sometimes it can be things like when a specific process is executed , when the time is xyz, etc. Payload: This is the actual virus packet. Payload contains harmful instruction which may cause temporary or permanent loss to the user
  12. Dormant phase is when the virus waits for user to trigger and does no harm to the system Propagation Phase: Here the virus begins to spread and gets attached to more and more files
  13. Adware: Generally is not very harmful but causes ads to popup on the system and can often be a front for viruses to execute which requires command line access. Depending on ads which you close and their response time, analysis about user can be made System Monitors: they generally log user activities based on the programs which user uses and their duration Tracking cookies: they track user footprints on web and send reports to the attacker