SE Chapter06 Oriented Software Engineering
SE Chapter06 Oriented Software Engineering
INTRODUCTION AND
SECURITY THREATS
3. Difference between Virus and
Worm
Virus Worm
A virus is a piece of code that attaches itself to legitimate program A worm is a malicious program that spread automatically.
Virus modifies the code. Worm does not modifies the code
Aim of virus is to infect the code or program stored on computer Aim of worm is to make computer or network unusable
system
Virus can infect other files Worm does not infect other files but it occupies memory space
replication.
Virus may need a trigger for execution Worm does not need any trigger
4. Difference Intruders & Insiders
INTRUDERS INSIDERS
Intruders are authorized or unauthorized users who are trying to Insiders are authorized users who try to access system or
access the system or network. network for which he is unauthorized.
Intruders are less dangerous than Insiders Insiders are more dangerous than Intruders.
Intruders do not have access to system Insiders have easy access to the system because they are
authorized users
Many security mechanisms are used to protect system from Intruders. There is no such mechanism to protect system from Insider
5. Avenue of Attack
A particular computer system is attacked: either it is specifically targeted by the attacker, or
it is an opportunistic target.
In the first case, the attacker has chosen the target not because of the hardware or software
the organization is running but for another reason, perhaps a political reason
Second type of attack, an attack against a target of opportunity, is conducted against a site
that has software that is vulnerable to a specific exploit.
6. The steps in attack (General Process)
Phishing Attack - This type of attack use social engineering techniques to steal confidential
information - the most common purpose of such attack targets victim's banking account
details and credentials.
– Phishing attacks tend to use schemes involving spoofed emails send to users that
lead them to malware infected websites designed to appear as real on-line banking
websites.
Malware : Viruses and Logic Bombs
■ Malware includes computer viruses, computer worms, ransomware, Trojan-
horses, keyloggers, most rootkits, spyware, dishonest adware, and other malicious software.
■ Viruses can be divided into two types based on their behavior when they are executed:
Nonresident viruses
■ Nonresident viruses can be thought of as consisting of a finder module and a replication
module. The finder module is responsible for finding new files to infect. For each new
executable file the finder module encounters, it calls the replication module to infect that file
Resident viruses
■ Resident viruses contain a replication module that is similar to the one that is employed by
nonresident viruses. The virus loads the replication module into memory when it is executed
instead and ensures that this module is executed each time the operating system is called to
perform a certain operation.
Malware: contd…
■ Viruses can be classified according to their origin, techniques, types of files they infect,
where they hide, the kind of damage they cause, the type of operating system, or
platform they attack.
Memory Resident Virus
■ These viruses fix themselves in the computer memory and get activated whenever the
OS runs and infects all the files that are then opened.
■ It can corrupt files and programs that are opened, closed, copied, renamed, etc
■ Protection is possible due by installing an antivirus program.
Direct Action Viruses
■ located in the root directory of the hard disk
■ When a specific condition is met, the virus will go into action and infect files in the
directory or folder that are specified in the AUTOEXEC.BAT file path.
Malware: contd…
Boot Sector Virus - affects the boot sector of a hard disk. This is a crucial
part of the disk, in which information of the disk itself is stored along with a
program that makes it possible to boot (start) the computer from the disk.
– It hides in the memory until DOS accesses the floppy disk
Macro Virus - Macro viruses infect files that are created using certain
applications or programs that contain macros, like .doc, .xls, .pps, .mdb, etc.
These mini-programs make it possible to automate series of operations so
that they are performed as a single action, thereby saving the user from
having to carry them out one by one
– automatically infect the file that contains macros, and also infects the
templates and documents that the file contains.
– It is referred to as a type of e-mail virus.
Malware: contd…
■ Logic Bombs - are small programs or sections of a program triggered by some event
such as a certain date or time, a certain percentage of disk space filled, the removal of a
file, and so on.
– For example, a programmer could establish a logic bomb to delete critical sections
of code if he/she is terminated from the company.
– are most commonly installed by insiders with access to the system.
– undetected until launched, the results can be destructive, and your entire data can
be deleted!