Académique Documents
Professionnel Documents
Culture Documents
My name is Vinayak.
My topic for today is system
threats
12/10/08 1
system
threats
Is my system secure???
12/10/08 2
Introduction
To know what is system threats
To combat system threats
12/10/08 3
The Programs that
attack computer
Resident Viruses
Examples include: Randex, CMJ, Meve, and MrKlunky.
Direct Action Viruses
Overwrite Viruses
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
Boot Virus
Examples of boot viruses include: Polyboot.B, AntiEXE.
Macro Virus
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
Directory Virus
Polymorphic Virus
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
File Infectors
Companion Viruses
Some examples include: Stator, Asimov.1539, and Terrax.1069
FAT Virus
Worms
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson.
Trojans or Trojan Horses
Logic Bombs
12/10/08 4
Worms
Most operating systems provide the
facility of spawning of processes to other
processes
A worm is the program that uses the
spawn mechanism to clobber system
resources
Worm reproduces itself in such a
environment and refrains other
processes to co exist or work by eating
up all the resources of the computer
12/10/08 5
Case study of worm
attack
At the closing of the workday on
November Robert Tappan Morris Jr. a first
year Cornell graduate student, unleashed
a worm program on one or more hosts
connected to the internet. Targeting sun
Microsystems and VAX computers
Although Robert designed the self
replicating program but UNIX environment
given it the propagating nature through
the network
12/10/08 6
Details of the
worm
The worm consisted of two
routines GRAPPING HOOK and
MAIN
The beautiful thing about this virus
was it was written in C language
This worm use to attack with Three
main strategies 1) rsh attack
2) finger attack
3)send mail attack
12/10/08 7
Thank you...!
12/10/08 8