Vous êtes sur la page 1sur 8

Good morning

 My name is Vinayak.
 My topic for today is system
threats

12/10/08 1
system
threats
Is my system secure???

12/10/08 2
Introduction
 To know what is system threats
 To combat system threats

12/10/08 3
The Programs that
attack computer
 Resident Viruses
Examples include: Randex, CMJ, Meve, and MrKlunky.
 Direct Action Viruses
 Overwrite Viruses
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
 Boot Virus
Examples of boot viruses include: Polyboot.B, AntiEXE.
 Macro Virus
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
 Directory Virus
 Polymorphic Virus
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
 File Infectors
 Companion Viruses
 Some examples include: Stator, Asimov.1539, and Terrax.1069
 FAT Virus
 Worms
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson.
 Trojans or Trojan Horses
 Logic Bombs

12/10/08 4
Worms
 Most operating systems provide the
facility of spawning of processes to other
processes
 A worm is the program that uses the
spawn mechanism to clobber system
resources
 Worm reproduces itself in such a
environment and refrains other
processes to co exist or work by eating
up all the resources of the computer

12/10/08 5
Case study of worm
attack
 At the closing of the workday on
November Robert Tappan Morris Jr. a first
year Cornell graduate student, unleashed
a worm program on one or more hosts
connected to the internet. Targeting sun
Microsystems and VAX computers
 Although Robert designed the self
replicating program but UNIX environment
given it the propagating nature through
the network
12/10/08 6
Details of the
worm
 The worm consisted of two
routines GRAPPING HOOK and
MAIN
 The beautiful thing about this virus
was it was written in C language
 This worm use to attack with Three
main strategies 1) rsh attack
2) finger attack
3)send mail attack

12/10/08 7
Thank you...!

12/10/08 8

Vous aimerez peut-être aussi