0% found this document useful (0 votes)
111 views8 pages

Good Morning: My Name Is Vinayak. My Topic For Today Is System Threats

This document discusses system threats such as viruses, worms, and Trojans. It provides examples of different types of viruses like resident viruses, overwrite viruses, macro viruses, and polymorphic viruses. It also discusses worms and how they are programs that use system spawn mechanisms to consume resources. The document presents a case study of the 1988 Morris worm which affected Sun Microsystems and VAX computers using finger, rsh, and email exploits to propagate. It targeted UNIX systems and caused major disruptions.

Uploaded by

vinner
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views8 pages

Good Morning: My Name Is Vinayak. My Topic For Today Is System Threats

This document discusses system threats such as viruses, worms, and Trojans. It provides examples of different types of viruses like resident viruses, overwrite viruses, macro viruses, and polymorphic viruses. It also discusses worms and how they are programs that use system spawn mechanisms to consume resources. The document presents a case study of the 1988 Morris worm which affected Sun Microsystems and VAX computers using finger, rsh, and email exploits to propagate. It targeted UNIX systems and caused major disruptions.

Uploaded by

vinner
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 8

Good morning

 My name is Vinayak.
 My topic for today is system
threats

12/10/08 1
system
threats
Is my system secure???

12/10/08 2
Introduction
 To know what is system threats
 To combat system threats

12/10/08 3
The Programs that
attack computer
 Resident Viruses
Examples include: Randex, CMJ, Meve, and MrKlunky.
 Direct Action Viruses
 Overwrite Viruses
Examples of this virus include: Way, Trj.Reboot, Trivial.88.D.
 Boot Virus
Examples of boot viruses include: Polyboot.B, AntiEXE.
 Macro Virus
Examples of macro viruses: Relax, Melissa.A, Bablas,
O97M/Y2K.
 Directory Virus
 Polymorphic Virus
Examples include: Elkern, Marburg, Satan Bug, and Tuareg.
 File Infectors
 Companion Viruses
 Some examples include: Stator, Asimov.1539, and Terrax.1069
 FAT Virus
 Worms
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C,
Sobig.D, Mapson.
 Trojans or Trojan Horses
 Logic Bombs

12/10/08 4
Worms
 Most operating systems provide the
facility of spawning of processes to other
processes
 A worm is the program that uses the
spawn mechanism to clobber system
resources
 Worm reproduces itself in such a
environment and refrains other
processes to co exist or work by eating
up all the resources of the computer

12/10/08 5
Case study of worm
attack
 At the closing of the workday on
November Robert Tappan Morris Jr. a first
year Cornell graduate student, unleashed
a worm program on one or more hosts
connected to the internet. Targeting sun
Microsystems and VAX computers
 Although Robert designed the self
replicating program but UNIX environment
given it the propagating nature through
the network
12/10/08 6
Details of the
worm
 The worm consisted of two
routines GRAPPING HOOK and
MAIN
 The beautiful thing about this virus
was it was written in C language
 This worm use to attack with Three
main strategies 1) rsh attack
2) finger attack
3)send mail attack

12/10/08 7
Thank you...!

12/10/08 8

You might also like