Good morning
12/10/08
My name is Vinayak. My topic for today is system threats
1
system threats Is my system secure???
12/10/08
2
Introduction
12/10/08
To know what is system threats To combat system threats
3
The Programs that attack computer
12/10/08
Resident Viruses Examples include: Randex, CMJ, Meve, and MrKlunky. Direct Action Viruses Overwrite Viruses Examples of this virus include: Way, Trj.Reboot, Trivial.88.D. Boot Virus Examples of boot viruses include: Polyboot.B, AntiEXE. Macro Virus Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K. Directory Virus Polymorphic Virus Examples include: Elkern, Marburg, Satan Bug, and Tuareg. File Infectors Companion Viruses Some examples include: Stator, Asimov.1539, and Terrax.1069 FAT Virus Worms Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson. Trojans or Trojan Horses Logic Bombs 4
Worms
12/10/08
Most operating systems provide the facility of spawning of processes to other processes A worm is the program that uses the spawn mechanism to clobber system resources Worm reproduces itself in such a environment and refrains other processes to co exist or work by eating up all the resources of the computer 5
Case study of worm attack
12/10/08
At the closing of the workday on November Robert Tappan Morris Jr. a first year Cornell graduate student, unleashed a worm program on one or more hosts connected to the internet. Targeting sun Microsystems and VAX computers Although Robert designed the self replicating program but UNIX environment given it the propagating nature through the network 6
Details of the worm
12/10/08
The worm consisted of two routines GRAPPING HOOK and MAIN The beautiful thing about this virus was it was written in C language This worm use to attack with Three main strategies 1) rsh attack 2) finger attack 3)send mail attack 7
Thank you...!
12/10/08
8