Lecture 10
Lecture 10
Lecture 10
Spyware:
Some of the most common ways for computers to become infected include the
following:
Adware:
Rootkits:
Rootkits are software programs that have the ability to hide certain things
from the operating system.
With a rootkit, there may be a number of processes running on a system
that do not show up in Task Manager or connections established or
available that do not appear in a netstat display
Trojan Horses:
Trojan horses are programs that enter a system or network under the guise of
another program.
Trojan horses can be used to compromise the security of your system, and they
can exist on a system for years before they’re detected.
One of the most important measures you can take to combat software attacks
proactively is to know common fi le extensions and the applications with which
they’re associated.
Logic Bombs:
Logic bombs are programs or code snippets that execute when a certain
predefined event occurs.
A bomb may send a note to an attacker when a user is logged on to the Internet
and is using a word processor. This message informs the attacker that the user
is ready for an attack.
a logic bomb in operation. Notice that this bomb doesn’t begin the attack, but it
tells the attacker that the victim has met the needed criteria or state for an
attack to begin. Logic bombs may also be set to go off on a certain date or when
a specified set of circumstances occurs.
Backdoors:
The program may allow a certain user ID to log on without a password or to gain
administrative privileges.
Two popular ones are Back Orifice and NetBus. Fortunately, most conventional
antivirus software will detect and block these types of attacks.
Botnets:
Ransomware:
Viruses:
a virus may do nothing more than reside on the computer, but it may also
damage the data on your hard disk drive (HDD), destroy your operating system,
and possibly spread to other systems.
Viruses get into your computer in one of three ways: ■On contaminated media
(DVD, USB drive, or CD-ROM)■Through email and social networking sites■As part
of another program
The programs on your system start to load more slowly. This happens because
the virus is spreading to other files in your system or is taking over system
resources.
■Unusual files appear on your hard drive, or files start to disappear from your
system. Many viruses delete key files in your system to render it inoperable.
■Program sizes change from the installed versions. This occurs because the virus
is attaching itself to these programs on your disk.
Antivirus Software
The primary method of preventing the propagation of malicious code
involves the use of antivirus software.
Antivirus software is an application that is installed on a system to protect
it and to scan for viruses as well as worms and Trojan horses. Most
viruses have characteristics that are common to families of virus.
Thousands of known viruses, worms, logic bombs, and other malicious
code have been defi ned. New ones are added all the time. Your antivirus
software manufacturer will usually work very hard to keep the definition
database fi les current.
The second method of preventing viruses is user education. Teach your
users not to open suspicious fi les and to open only those fi les that
they’re reasonably sure are virus-free. They need to scan every disk,
email, and document they receive before they open them.