Академический Документы
Профессиональный Документы
Культура Документы
SECURITY
lesson
MALICIOUS CODE
Group 4
Mariano, Luz Marie
Cordova, Mohammad
MALICIOUS CODE
WORM/S
3 COMMON FORMS OF MALWARE
HARM
TRANSMISSION/PROPAGATION
ACTIVATION
STEALTH
HOW DOES VIRUS
WORK?
CLASSIFYING VIRUSES
Appending viruses
Surrounding viruses
Integrating viruses
Replacing viruses
PERFECT VIRUS
Characteristic
Hard to detect
not easily destroyed or deactivated
spreads infection widely
can re-infect programs
machine and OS independent
can infect windows, mac, linux, unix, mobile phones,
etc.
Hiding a Virus
• Complete mediation
• Memory separation