0% found this document useful (0 votes)
14 views9 pages

CSCL

The document discusses malware, viruses, worms, and how they spread. It provides details on viruses, worms, and how they replicate and infect systems. It then discusses defenses against malware like installing antivirus software, firewalls, and keeping systems patched. It also covers denial of service attacks using rapidly replicating programs like bacteria or rabbits.

Uploaded by

Ne Pali
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
Download as pptx, pdf, or txt
0% found this document useful (0 votes)
14 views9 pages

CSCL

The document discusses malware, viruses, worms, and how they spread. It provides details on viruses, worms, and how they replicate and infect systems. It then discusses defenses against malware like installing antivirus software, firewalls, and keeping systems patched. It also covers denial of service attacks using rapidly replicating programs like bacteria or rabbits.

Uploaded by

Ne Pali
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1/ 9

Malicious programs and Protection

Presentors : Prajina Khadka


Sushmita Shrestha
Anisha Gautam
Binita Humagain
MALWARE

• Malware (short for “malicious software”) is a file or code, typically


delivered over a network, that infects, explores, steals or conducts virtually
any behavior an attacker wants.
WHAT IS A COMPUTER VIRUS?

• A computer virus is a piece of software that can “infect” other programs by


modifying them; the modification includes injecting the original program
with a routine to make copies of the virus program, which can then go on
to infect other programs.
• It continues to replicate and spread by attaching replicas of itself to other
files and applications in the system.
WHAT’S A COMPUTER WORM?

• A worm is a program that can replicate itself and send copies from
computer to computer across network connections.
• Because of this, worms can propagate themselves and spread very quickly
not only locally, but have the potential to disrupt systems worldwide.
• Instead, they slither and enter computers through a vulnerability in the
network, self-replicating and spreading before you’re able to remove the
worm.
HOW DO VIRUSES AND WORMS SPREAD?

• Email: Carried inside files sent as email attachments.


• P2P/Filesharing: Spread via P2P file sharing networks, as well as any
other shared drive or files, such as a USB stick or network server.
• Malvertising: Websites, even legitimate ones, can contain infected ads in
the form of banners or pop-ups. If you click on them, you can unwittingly
download a virus or worm. Even if you don’t click, some of these ads can
execute a drive-by-download that infects you anyway.
HOW TO PROTECT ALL YOUR DEVICES FROM
VIRUSES AND WORMS?
• Install anti-virus software and firewall
• Track potential data exfiltration at theedgeand attacks at the point of entry
• Remember to regularly install security patches
• Set up alerts to notify you automatically and immediately when an
anomaly occurs
RABBITS AND BACTERIA

• Some malicious logic multiplies so rapidly that resources become


exhausted. This creates a denial of service attack.
• A bacterium or a rabbit is a program that absorbs all of some class of
resource.
• Bacteria, or rabbit programs, make copies of themselves to overwhelm a
computer system's resources.
DEFENSES

• Defending against malicious logic takes advantage of several different


characteristics of malicious logic to detect, or to block, its execution.
• The defenses hamper the suspect behavior.
• They may allow malicious logic that does not expose the given
characteristic to proceed, and they may prevent programs that are not
malicious but do affect the given characteristic from proceeding.

You might also like