System Threats

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View System Threats as PDF for free.

More details

  • Words: 319
  • Pages: 8
Good morning  

12/10/08

My name is Vinayak. My topic for today is system threats

1

system threats Is my system secure???

12/10/08

2

Introduction  

12/10/08

To know what is system threats To combat system threats

3

The Programs that attack computer 

 





 

    

 

12/10/08

Resident Viruses Examples include: Randex, CMJ, Meve, and MrKlunky. Direct Action Viruses Overwrite Viruses Examples of this virus include: Way, Trj.Reboot, Trivial.88.D. Boot Virus Examples of boot viruses include: Polyboot.B, AntiEXE. Macro Virus Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K. Directory Virus Polymorphic Virus Examples include: Elkern, Marburg, Satan Bug, and Tuareg. File Infectors Companion Viruses Some examples include: Stator, Asimov.1539, and Terrax.1069 FAT Virus Worms Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson. Trojans or Trojan Horses Logic Bombs 4

Worms 





12/10/08

Most operating systems provide the facility of spawning of processes to other processes A worm is the program that uses the spawn mechanism to clobber system resources Worm reproduces itself in such a environment and refrains other processes to co exist or work by eating up all the resources of the computer 5

Case study of worm attack 



12/10/08

At the closing of the workday on November Robert Tappan Morris Jr. a first year Cornell graduate student, unleashed a worm program on one or more hosts connected to the internet. Targeting sun Microsystems and VAX computers Although Robert designed the self replicating program but UNIX environment given it the propagating nature through the network 6

Details of the worm 





12/10/08

The worm consisted of two routines GRAPPING HOOK and MAIN The beautiful thing about this virus was it was written in C language This worm use to attack with Three main strategies 1) rsh attack 2) finger attack 3)send mail attack 7

Thank you...!

12/10/08

8

Related Documents

System Threats
November 2019 24
Threats
June 2020 17
Threats
June 2020 14
Threats
November 2019 14
Future Threats
November 2019 21
Future Threats
October 2019 20