SlideShare a Scribd company logo
Malicious Code 
Presented by: 
Niki Patel 
Hiralkumar Bhimani 
Khyati Rajput 
UVPCE, Ahmedabad 
Guide: Prof. Ketan Savarkar
Contents 
• Malicious Program 
• Viruses 
• Worms 
• Trojan 
• Logic Bombs 
• Spywares 
• Adwares
Malicious Program 
• Malicious programs refers to a broad 
category of programs that can cause 
damage or undesirable effects to computer 
networks. 
• The other words for this is Malware 
(Malicious Software), Badware, Rouge 
Program (a form of internet fraud using 
internet) 
• Besides malicious programs there are 
non-malicious programs as well.
Malicious program cont… 
• Malicious program is not a new concept, it 
was officially defined by Cohen in 1984, 
but the behaviour of the viruses was first 
observed in 1970. 
• The damages caused because of 
malicious code are: 
Potential damage can include modifying. 
Destroying or stealing data.
Gaining or allowing unauthorised access to 
a system 
Executing functions that a user never 
intended.
Malicious Programs
Viruses: 
• Viruses: A hidden self-replicating 
section of computer software, 
usually malicious code that 
propagates by infecting (i.e. 
inserting a copy into becoming a 
part of) another program or 
system memory. 
The viruses can damage your 
hardware, software or files and 
replicate themselves.
Categories of Viruses 
1. Boot sector virus : 
• infect boot sector of systems. 
• become resident. 
• activate while booting machine 
2. File virus : 
• infects program files. 
• activates when program is run.
Types of Viruses 
• Can classify on basis of how they 
attack 
• Parasitic virus 
• Memory-resident virus 
• Boot sector virus 
• Stealth 
• Polymorphic virus 
• Macro virus
Transient Virus is active only when its host 
program is active. 
Resident virus establishes itself in the computer’s 
memory & can remain active without its host. 
Macro Virus attached to some data file 
Email Virus spread using email with attachment 
containing a macro virus
Properties of Viruses 
 Virus program should be hard to detect by 
anti-virus software. 
 Viruses should be hard to destroy or deactivate. 
 Spread infection widely. 
 Should be easy to create. 
 Be able to re-infect. 
 Should be machine / platform independent, so 
that it can spread on different hosts.
Example: Melissa virus
Worms: 
• Worms: Reproducing programs that run 
independently and travel across network 
connections. 
• “Famous” worms are: 
- Morris Internet Worm(1988) 
- Code Red : had triggered time for Denial of 
Service attacks. 
- Code Red 2 : had backdoor installed to allow 
remote control. 
- Nimba : use multiple infection i.e.email,share, 
web clients, etc.
Pikachu Worm: A K-12 Nightmare
This dialog box appears 
after the 
PIKACHUPOKEMON.EXE 
file has been activated. Worm: 
• Accesses Outlook Address Book 
• Embeds code to delete Windows 
and Windows Subfolders upon 
Restart. 
• +: Does ask for permission to 
delete files with a “Y” command.
Virus v/s. Worms: 
• Viruses require interaction whereas 
worms act on there own. 
• Viruses has to relay on users 
transferring to infect files / programs 
while worms can use a network to 
replicate itself . 
• Speed of worms is more 
than viruses.
Trojan Horse: 
• Trojan Horse: 
– A Trojan horse is a program in 
which malicious or harmful code is 
present in such a way that it can 
get a control over the system & use 
to do its chosen form of damage. 
─Trojans are not viruses since they do 
not replicate, but Trojan horse 
programs can be just as destructive.
Continued… 
• Trojan Horses appear to be useful or 
interesting to an unsuspecting user, but 
are actually harmful. 
• A Trojan horse can be attached to any 
useful software by a cracker & can be 
spread by tricking users into believing that 
it is a useful program.
Damages caused by Trojans 
• Erasing or overwriting data on a computer. 
• Corrupting files. 
• Installing a backdoor on a computer. 
• Spreading other malware, such as viruses, 
hence they are also known as “dropper”. 
• Logging keystrokes to steal information 
such as passwords & credit card numbers 
(known as key loggers).
Attack of Trojan Horse 
• Trojan horse attacks any system in the 
following manner.
Situation of user after attack
Logic Bomb: 
• Logic Bomb: A logic bomb is a 
type of Trojan Horse that executes 
when specific conditions occur. 
– Triggers for logic bombs can include 
change in a file, by a particular series of 
keystrokes, or at a specific time or date. 
– Suppose a programmer may hide a 
piece of code that starts deleting files.
Spyware 
• A spyware is a computer 
software which is installed 
automatically when you surf 
internet or when you install 
free software. 
• Spyware is known to 
change computer settings.
• Spyware collects various types of 
information like: 
Internet surfing habits. 
Visited sites. 
Interfere in installing additional software. 
Redirect web browser activity.
Spyware is a legal program….. 
• Here it is in the form of virus alerts.
Adware 
• Adware is any software package which 
automatically plays, displays or downloads 
advertisements to a computer after the 
software is installed on it or while the 
application is being used. 
• It’s a legal program. 
• Well known adware program is 
“123 Messenger”
123 Messenger…. 
• Is in the form of popups & unexplained 
advertising programs in your computer.
• Advertising companies 
hope to generate 
money from customers 
who receive the popups 
or unexplained programs 
on their computers
How to detect that your computer has a 
spyware or adware?? 
Continuous popups. 
Persistent change 
in your homepage. 
Slower computer 
processing, takes 
the computer longer 
to process or startup.
Software Security 
• Only install necessary and trusted 
software. 
• Beware of *free* games, screen savers, 
and graphics. 
• Keep a hard copy of the copyright 
release for all “free” products! 
• Run and UPDATE anti-virus software!!
Thank you….

More Related Content

PPTX
DoS or DDoS attack
stollen_fusion
 
PPTX
Denial of Service Attack
Dhrumil Panchal
 
PPTX
Basics of Denial of Service Attacks
Hansa Nidushan
 
PPTX
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
PPT
Computer Worms
sadique_ghitm
 
PPTX
Denial of service
garishma bhatia
 
PDF
Malicious software
Dr.Florence Dayana
 
PPTX
Denial of service attack
Kaustubh Padwad
 
DoS or DDoS attack
stollen_fusion
 
Denial of Service Attack
Dhrumil Panchal
 
Basics of Denial of Service Attacks
Hansa Nidushan
 
Denial of Service Attacks (DoS/DDoS)
Gaurav Sharma
 
Computer Worms
sadique_ghitm
 
Denial of service
garishma bhatia
 
Malicious software
Dr.Florence Dayana
 
Denial of service attack
Kaustubh Padwad
 

What's hot (20)

PPTX
Session Hijacking ppt
Harsh Kevadia
 
PPTX
Malware
Anoushka Srivastava
 
PPTX
Password Cracking
Sagar Verma
 
PPTX
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
PPTX
Types of malware
techexpert2345
 
PDF
Malware and security
Gurbakash Phonsa
 
PPTX
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
PPTX
BackDoors Seminar
Chaitali Patel
 
PPTX
Ddos attacks
communication-eg
 
PPTX
Cross-Site Scripting (XSS)
Daniel Tumser
 
PPTX
MALWARE AND ITS TYPES
daniyalqureshi712
 
PPTX
Dos attack
Manjushree Mashal
 
PPTX
Cross Site Scripting ( XSS)
Amit Tyagi
 
PPTX
Spyware and rootkit
Nikhil Pandit
 
PPTX
Basic concepts in computer security
Arzath Areeff
 
PPTX
Spyware powerpoint
galaxy201
 
PDF
Introduction to Web Application Penetration Testing
Netsparker
 
PPTX
Web application attacks
hruth
 
PPTX
Ransomware
Nick Miller
 
Session Hijacking ppt
Harsh Kevadia
 
Password Cracking
Sagar Verma
 
DDoS - Distributed Denial of Service
Er. Shiva K. Shrestha
 
Types of malware
techexpert2345
 
Malware and security
Gurbakash Phonsa
 
Destributed denial of service attack ppt
OECLIB Odisha Electronics Control Library
 
BackDoors Seminar
Chaitali Patel
 
Ddos attacks
communication-eg
 
Cross-Site Scripting (XSS)
Daniel Tumser
 
MALWARE AND ITS TYPES
daniyalqureshi712
 
Dos attack
Manjushree Mashal
 
Cross Site Scripting ( XSS)
Amit Tyagi
 
Spyware and rootkit
Nikhil Pandit
 
Basic concepts in computer security
Arzath Areeff
 
Spyware powerpoint
galaxy201
 
Introduction to Web Application Penetration Testing
Netsparker
 
Web application attacks
hruth
 
Ransomware
Nick Miller
 
Ad

Viewers also liked (20)

PDF
Malicious software
rajakhurram
 
PPT
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
PPT
Lecture 12 malicious software
rajakhurram
 
PPTX
Computer virus
Ra Bia
 
PPT
Malicious Code
Yahya Electone
 
PPT
Lecture 3
Education
 
PPTX
23 network security threats pkg
Umang Gupta
 
PPTX
Presentation Slide: Computer Virus
Yo Maruf
 
PPTX
Presentation on Computer Viruses
Mohak Jain
 
PPTX
Malware ppt
Faiz Khan
 
PPT
Computer Virus
izzul
 
PPTX
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
PPT
Ppt on different types of computer viruses
jnnj
 
PPT
Malicious software
msdeepika
 
PPT
Malware
Tuhin_Das
 
PPTX
Access Controls Attacks
Hafiza Abas
 
PPT
Computer Malware
aztechtchr
 
PPT
TYPES OF HACKING
SHERALI445
 
PPTX
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
PPTX
Ethical hacking presentation
Suryansh Srivastava
 
Malicious software
rajakhurram
 
Virus and Malicious Code Chapter 5
AfiqEfendy Zaen
 
Lecture 12 malicious software
rajakhurram
 
Computer virus
Ra Bia
 
Malicious Code
Yahya Electone
 
Lecture 3
Education
 
23 network security threats pkg
Umang Gupta
 
Presentation Slide: Computer Virus
Yo Maruf
 
Presentation on Computer Viruses
Mohak Jain
 
Malware ppt
Faiz Khan
 
Computer Virus
izzul
 
COMPUTER SECURITY AND OPERATING SYSTEM
faraz hussain
 
Ppt on different types of computer viruses
jnnj
 
Malicious software
msdeepika
 
Malware
Tuhin_Das
 
Access Controls Attacks
Hafiza Abas
 
Computer Malware
aztechtchr
 
TYPES OF HACKING
SHERALI445
 
Computer virus (Microsoft Powerpoint)
ainizbahari97
 
Ethical hacking presentation
Suryansh Srivastava
 
Ad

Similar to Malicious (20)

PPTX
Malicious software and software security
Prachi Gulihar
 
PPTX
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
PPTX
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PapillonHonoxVejeh
 
PPTX
Malware ppt final.pptx
LakshayNRReddy
 
PPTX
Virus and malware presentation
Amjad Bhutto
 
PPTX
Information Security (Malicious Software)
Zara Nawaz
 
PPTX
Virus and its types 2
Saud G
 
PPTX
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
nascramaprabhacs1
 
PPTX
MALWARE / VIRUS AND WORMS CHARACTERISTICS
nascramaprabhacs1
 
PPTX
Computer virus
sajeena81
 
PPTX
Lecture_11_Malware_information_Security.pptx
homecooking511
 
PPTX
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
DivyanshGupta505488
 
PPTX
Computer-vIRUS-malicious software and worm.pptx
KennethMorales26
 
PPT
Malwares
Ishaq Ticklye
 
PPTX
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
abdumujeeb2007
 
PDF
Cyber security:Tools used in cyber crime
nidhidgowda185
 
PPTX
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
PPT
anti_virus
sharq university
 
PPTX
PowerPoint presentation about computer virus
KennethMorales26
 
PPS
Computer Security threat
Azri Abdin
 
Malicious software and software security
Prachi Gulihar
 
lecture-11-30052022-103626am.pptx
Zarwashgulrez
 
Lect 3 INFORMATION SYSTEMS SECURITY THREATS.pptx
PapillonHonoxVejeh
 
Malware ppt final.pptx
LakshayNRReddy
 
Virus and malware presentation
Amjad Bhutto
 
Information Security (Malicious Software)
Zara Nawaz
 
Virus and its types 2
Saud G
 
MALWARE UNIT II PPT .pptx ..The unit covers about virus and worms and its fu...
nascramaprabhacs1
 
MALWARE / VIRUS AND WORMS CHARACTERISTICS
nascramaprabhacs1
 
Computer virus
sajeena81
 
Lecture_11_Malware_information_Security.pptx
homecooking511
 
malwarepatchsedhdjdjrkvjdndbtigktbgifjridj
DivyanshGupta505488
 
Computer-vIRUS-malicious software and worm.pptx
KennethMorales26
 
Malwares
Ishaq Ticklye
 
NETWORK SECURITY THREATS - POWERPOINT PRESENTATION
abdumujeeb2007
 
Cyber security:Tools used in cyber crime
nidhidgowda185
 
Malware program by mohsin ali dahar khairpur
Mohsin Dahar
 
anti_virus
sharq university
 
PowerPoint presentation about computer virus
KennethMorales26
 
Computer Security threat
Azri Abdin
 

Recently uploaded (20)

PDF
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
PPTX
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
PPTX
quantum computing transition from classical mechanics.pptx
gvlbcy
 
PDF
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
PDF
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
PDF
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
PDF
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PPTX
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
DOCX
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PPTX
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
PPTX
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 
EVS+PRESENTATIONS EVS+PRESENTATIONS like
saiyedaqib429
 
Module2 Data Base Design- ER and NF.pptx
gomathisankariv2
 
quantum computing transition from classical mechanics.pptx
gvlbcy
 
Construction of a Thermal Vacuum Chamber for Environment Test of Triple CubeS...
2208441
 
Natural_Language_processing_Unit_I_notes.pdf
sanguleumeshit
 
CAD-CAM U-1 Combined Notes_57761226_2025_04_22_14_40.pdf
shailendrapratap2002
 
STUDY OF NOVEL CHANNEL MATERIALS USING III-V COMPOUNDS WITH VARIOUS GATE DIEL...
ijoejnl
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
FUNDAMENTALS OF ELECTRIC VEHICLES UNIT-1
MikkiliSuresh
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
Unit I Part II.pdf : Security Fundamentals
Dr. Madhuri Jawale
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
business incubation centre aaaaaaaaaaaaaa
hodeeesite4
 
SAR - EEEfdfdsdasdsdasdasdasdasdasdasdasda.docx
Kanimozhi676285
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
MT Chapter 1.pptx- Magnetic particle testing
ABCAnyBodyCanRelax
 
sunil mishra pptmmmmmmmmmmmmmmmmmmmmmmmmm
singhamit111
 

Malicious

  • 1. Malicious Code Presented by: Niki Patel Hiralkumar Bhimani Khyati Rajput UVPCE, Ahmedabad Guide: Prof. Ketan Savarkar
  • 2. Contents • Malicious Program • Viruses • Worms • Trojan • Logic Bombs • Spywares • Adwares
  • 3. Malicious Program • Malicious programs refers to a broad category of programs that can cause damage or undesirable effects to computer networks. • The other words for this is Malware (Malicious Software), Badware, Rouge Program (a form of internet fraud using internet) • Besides malicious programs there are non-malicious programs as well.
  • 4. Malicious program cont… • Malicious program is not a new concept, it was officially defined by Cohen in 1984, but the behaviour of the viruses was first observed in 1970. • The damages caused because of malicious code are: Potential damage can include modifying. Destroying or stealing data.
  • 5. Gaining or allowing unauthorised access to a system Executing functions that a user never intended.
  • 7. Viruses: • Viruses: A hidden self-replicating section of computer software, usually malicious code that propagates by infecting (i.e. inserting a copy into becoming a part of) another program or system memory. The viruses can damage your hardware, software or files and replicate themselves.
  • 8. Categories of Viruses 1. Boot sector virus : • infect boot sector of systems. • become resident. • activate while booting machine 2. File virus : • infects program files. • activates when program is run.
  • 9. Types of Viruses • Can classify on basis of how they attack • Parasitic virus • Memory-resident virus • Boot sector virus • Stealth • Polymorphic virus • Macro virus
  • 10. Transient Virus is active only when its host program is active. Resident virus establishes itself in the computer’s memory & can remain active without its host. Macro Virus attached to some data file Email Virus spread using email with attachment containing a macro virus
  • 11. Properties of Viruses  Virus program should be hard to detect by anti-virus software.  Viruses should be hard to destroy or deactivate.  Spread infection widely.  Should be easy to create.  Be able to re-infect.  Should be machine / platform independent, so that it can spread on different hosts.
  • 13. Worms: • Worms: Reproducing programs that run independently and travel across network connections. • “Famous” worms are: - Morris Internet Worm(1988) - Code Red : had triggered time for Denial of Service attacks. - Code Red 2 : had backdoor installed to allow remote control. - Nimba : use multiple infection i.e.email,share, web clients, etc.
  • 14. Pikachu Worm: A K-12 Nightmare
  • 15. This dialog box appears after the PIKACHUPOKEMON.EXE file has been activated. Worm: • Accesses Outlook Address Book • Embeds code to delete Windows and Windows Subfolders upon Restart. • +: Does ask for permission to delete files with a “Y” command.
  • 16. Virus v/s. Worms: • Viruses require interaction whereas worms act on there own. • Viruses has to relay on users transferring to infect files / programs while worms can use a network to replicate itself . • Speed of worms is more than viruses.
  • 17. Trojan Horse: • Trojan Horse: – A Trojan horse is a program in which malicious or harmful code is present in such a way that it can get a control over the system & use to do its chosen form of damage. ─Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.
  • 18. Continued… • Trojan Horses appear to be useful or interesting to an unsuspecting user, but are actually harmful. • A Trojan horse can be attached to any useful software by a cracker & can be spread by tricking users into believing that it is a useful program.
  • 19. Damages caused by Trojans • Erasing or overwriting data on a computer. • Corrupting files. • Installing a backdoor on a computer. • Spreading other malware, such as viruses, hence they are also known as “dropper”. • Logging keystrokes to steal information such as passwords & credit card numbers (known as key loggers).
  • 20. Attack of Trojan Horse • Trojan horse attacks any system in the following manner.
  • 21. Situation of user after attack
  • 22. Logic Bomb: • Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. – Triggers for logic bombs can include change in a file, by a particular series of keystrokes, or at a specific time or date. – Suppose a programmer may hide a piece of code that starts deleting files.
  • 23. Spyware • A spyware is a computer software which is installed automatically when you surf internet or when you install free software. • Spyware is known to change computer settings.
  • 24. • Spyware collects various types of information like: Internet surfing habits. Visited sites. Interfere in installing additional software. Redirect web browser activity.
  • 25. Spyware is a legal program….. • Here it is in the form of virus alerts.
  • 26. Adware • Adware is any software package which automatically plays, displays or downloads advertisements to a computer after the software is installed on it or while the application is being used. • It’s a legal program. • Well known adware program is “123 Messenger”
  • 27. 123 Messenger…. • Is in the form of popups & unexplained advertising programs in your computer.
  • 28. • Advertising companies hope to generate money from customers who receive the popups or unexplained programs on their computers
  • 29. How to detect that your computer has a spyware or adware?? Continuous popups. Persistent change in your homepage. Slower computer processing, takes the computer longer to process or startup.
  • 30. Software Security • Only install necessary and trusted software. • Beware of *free* games, screen savers, and graphics. • Keep a hard copy of the copyright release for all “free” products! • Run and UPDATE anti-virus software!!