FIT3031 Lecture Notes - Lecture 10: Remote Shell, Boot Sector, Terminate And Stay Resident Program

72 views6 pages
L10: Malicious Software
Increase of incidents of malicious use of soware
Strong countermeasures are needed to protect computer systems and informaon
Have two categories:
Host dependent:
cannot exist independently
Exists in an applicaon or system program
Self contained program
Exists independently
Or can be placed in two other categories:
Replicating program
When executed it may produce one or more copies of itself to be acvated
later
Non-replicating program
Acvated when the host programs is invoked to perform a specific funcon
Does not make copies of itself
Types of Malicious soware
Trap Door
Le during soware development phase
Secret entry point into a program
Undocumented entry points wrien in code for debugging
Allow someone to gain access without going through security access procedures
Security
Focus on program development
Soware update acvies
Logic Bomb
Malicious code embedded into the program that acvates when certain condions are met
Dates
absence/presence of a file
Parcular user running the applicaon
Can alter/delete file, halt machine and other damage
Trojan Horse
Contain hidden code
Does undocumented things with the user won’t approve of
Acts as delivery vehicle
Disastrous consequences - sending data or passwords to aackers
Most anvirus programs can’t detect it
Security
Know and trust the source of program before running it
Unlock document

This preview shows pages 1-2 of the document.
Unlock all 6 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers