seminar maddy

Category: Entertainment

Presentation Description

No description available.


Presentation Transcript

Threat to Computers : 

Threat to Computers Manjunath R Belgal (2KL08MCA17) SEMINAR on

Slide 2: 

Contents : Malware & Spyware Types of Malwares: Viruses Trojans Worms Others Hacking Threats

Slide 3: 

Malwares & Spywares : Viruses, Worms, Trojans & other such class of programs & Softwares are called Malware. Malware  Malicious Software. Spyware :Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect.

Slide 4: 

Malware can be classified based on whether and how it replicates and spreads. Viruses Trojans Worms Others

Slide 5: 

Viruses : A computer virus is a program which runs when a program it attaches itself to is run. When the virus copies or attaches itself to another program in such a manner that when the other program is run, the virus code is also run, the other program is considered to be infected. They need Human action to execute.

Slide 6: 

Viruses : The Creeper virus was first detected on ARPANET. Creeper gained access via the ARPANET and copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed. Viruses are Self- Replicating.

Slide 7: 

loc Unaffected program memory Infected program Virus

Slide 11: 

Worms : Worms are insidious because they rely less (or not at all) upon human behavior in order to spread themselves from one computer to others. The computer worm is a program that is designed to copy itself from one computer to another, everaging some network medium: e-mail, TCP/IP, etc.

Slide 12: 

Trojans : A Trojan Horse is a one which pretend to be useful programs but do some unwanted action. The name Trojan Horse.

Slide 13: 

Others : Logic Bombs: A logic bomb is a programmed malfunction of a legitimate application. Time Bombs : A time bomb is a programmed malfunction that is set to execute on certain time. day/date := check (clock)if day = 5 and date = 13 then bombcheckbomb 

Slide 14: 

Denial of Service Attack.

Slide 16: 

Bot Attacker’s Program Bot program runs silently in the background, awaiting instructions from the attacker

Slide 17: 

Hacking Threats : password cracking: Dictionary attack A simple dictionary attack is by far the fastest way to break into a machine. y file is loaded into a cracking application which is run against user accounts located by the application. Hybrid attack A hybrid attack will add numbers or symbols to the filename to successfully crack a password. Many people change their passwords by simply adding a number to the end of their current password.

Slide 18: 

Brute force attack A brute force attack is the most comprehensive form of attack, though it may often take a long time to work depending on the complexity of the password. Some brute force attacks can take a week depending on the complexity of the password.

Slide 19: 

They say Prevention is better than cure !!!!! Being Software Professionals certain steps are needed to be followed. Image Back up Registry Shot Firewall, etc

Slide 20: 

Open for Queries !! ?

Slide 21: 

Thank You

authorStream Live Help