Viruses and Related Threats in Security
Viruses and Related Threats in Security
Viruses and Related Threats in Security
Threats
Intrusion Techniques
The objective of an intruder is to gain
access to a system or to increase the range
of privileges accessible on a system
This requires the intruder to acquire the
infor that should have been protected
In most cases this infor is in the form of a
user password
With the knowledge of some others
password , an intruder can log on to the
system and use all the privileges accorded
to the legitimate user
2.Propagation Phase
Here the virus places an identical copy of itself into
other pgms or system areas on disk
Each infected pgm will now contain the clone of
the virus, which itself enter into the propagation
phase
3.Triggering Phase
Here the virus is activates to perform the fun for
which it was intended
This phase can be caused by a variety of system
events including the no: of items that the virus has
made copies of itself
4.Execution Phase
Types Of Virus
1.Parasitic Virus
Traditional and most common form of virus
It attaches itself to executable files and
replicates
2.Memory resident Virus
Lodges in main memory as part of a
resident s/m pgm
From that point , the virus infects every
pgm that execute
3.Boot-sector Virus
Infects a master boot record and spreads
when a system is booted from the disk
containing the virus
4.Stealth Virus
It is explicitly designed to hide itself from
detection by antivirus s/w
5.Polymorphic Virus
A virus that mutates with every infection
making detection by the signature of the virus
impossible
It creates copies during replication that are
functionally equivalent but have diff bit patterns
Macro Virus
Macro virus is platform independent any h/w
platform and OS that supports word can be
infected by it
It infect documents, not executable portions of
code. Most of the info is the form of a doument
rather than a pgm
Trojan Horse
A Trojan horse is a pgm or command
procedure containing hidden code that
when invoked performs some unwanted or
harmful fun
Trojan horse pgms can be used to
accomplish funs indirectly that an
unauthorized user could not accomplish
directly
To gain access to the files of another user
on a shared s/m, a user could create a
Trojan horse pgm that when executed
changed the users file permissions so that
the files are readable by any user