Lecture 7
Lecture 7
Lecture 7
Malicious Software
Trigger
The event or condition that determines when the payload is activated or delivered
Also called logic bomb
Payload
What the virus does, besides spreading
This involves damage or any activity
Virus Classification by concealment strategy
❑ Trojan looks for your personal information and sends it to the Trojan writer
(hacker). It can also allow the hacker to take full control of your system.
❑ Attacks of Worms:
❑ Deleting files and other malicious actions on systems.
❑ Communicate information back to attacker e.g., passwords, other
proprietary information.
❑ Disrupt normal operation of system, thus denial of service attack (DoS) –
due to re-infecting infected system.
❑ Worms may carry viruses with them.
Means of spreading Infection by Worms :
▪ Boot sector
▪ Memory resident
▪ Disk – Applications and data stored on disk.
▪ Libraries – stored procedures and classes.
▪ Compiler
▪ Virus checking program infected by virus – unable to
detect that particular virus signature.
Effect of Virus attack on computer system