160 likes | 279 Vues
Malicious Software. Network security Master:Mr jangjou Presented by:Mohsen Najafi November 2011. Malware. Virus. Propagation. Warm. Trojans. Concealment. Root kit. Malware Types. ADMIN. Root Kit. Logic bomb. Zombie. Warm. Backdoor. Keylogger. Virus. Trojan. Spyware. ADMIN
E N D
Malicious Software Network security Master:Mr jangjou Presented by:MohsenNajafi November 2011
Malware Virus Propagation Warm Trojans Concealment Root kit
Malware Types ADMIN Root Kit Logic bomb Zombie Warm Backdoor Keylogger Virus Trojan Spyware
ADMIN Power Root Kit Privileged Access Least powerful Monitoring Open source and integrate with other malware Help to Trojan Attack with Kernel or User mode
Logic bomb Behave like physical bomb Manual and Automatic Remove information in database
Warm Very Fast Spread Self Executable Carriage Other malware No change system and user file Propagation in Network connections
Keylogger Kernel base API base Form Grabbing base
Spyware Hidden form No self replicate Like adware A long with other software
Backdoor Remote Access Install with Worms Bypassing security
Zombie Connected to internet Under remote directions Active with spam Spammers controls
Trojan Steal informations Low performance system Change configuration Install and work hiddenly Crashing the computer
Viruses Boot sector Encrypted virus Polymorphic File infector Macro virus Metamorphic Oligomorphic Stealth virus
Symptoms of Malware System Crach always have Poor System Performance Your system has less available memorythan it should Unusual messages or displays on your monitor Settings have changed and I can't change them back to the way they were Some of your files become corrupted or suddenly don't work properly
Antivirus How to work How to choose (Full of Free) (Multi core) (File server) (30% faster) (Wi-Fi network) (P2P file sharing) (Heuristic & Rootkit) (Script and warm) (Virus removal) (Personal data & update)