Presentasi sedang didownload. Silahkan tunggu

Presentasi sedang didownload. Silahkan tunggu

VIRUSES and RELATED THREATS. Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors.

Presentasi serupa


Presentasi berjudul: "VIRUSES and RELATED THREATS. Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors."— Transcript presentasi:

1 VIRUSES and RELATED THREATS

2 Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors

3 Virus Adalah program yang mampu menginfeksi program lain dengan cara memodifikasinya. Adalah program yang mampu menginfeksi program lain dengan cara memodifikasinya.

4 Sifat Alamai Virus Dormant Phase (idle phase) Dormant Phase (idle phase) Propagation Phase (the virus places an identical copy of itself into other program or system area on disk) Propagation Phase (the virus places an identical copy of itself into other program or system area on disk) Triggering Phase (The Virus Activated to perform the function) Triggering Phase (The Virus Activated to perform the function) Execution Phase (The function is perform) Execution Phase (The function is perform)

5 Struktur Virus Algoritma virus Algoritma virus Program V:= {goto main; 1234567; subroutin infect-executable-file:= {loop: file:=get-random-executable-file; file:=get-random-executable-file; if(first-line-of-file=1234567) if(first-line-of-file=1234567) then goto loop else prepend V to file} subroutin do-damage:= {whatever damage to be done} subroutin trigger-pulled:= {return true if some condition holds} Main :main-program:= {infect-executable; if trigger-pulled then do-damage; goto next;} Next:}

6 Proses Infeksi CV P1’ P2 P1’ P1 P2’ P2 CV

7 Jenis-Jenis Virus Parasitic Virus (tradisional and still most common form) Parasitic Virus (tradisional and still most common form) Memory-resident Virus (lodges in main memory) Memory-resident Virus (lodges in main memory) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software) Polymorphics (A mutates with every infection, making detection by signature of the virus imposible Polymorphics (A mutates with every infection, making detection by signature of the virus imposible

8 Macro Virus A Macro virus is platform independent A Macro virus is platform independent Infect document, not executable portion of code Infect document, not executable portion of code Easy spread most by electronic mail Easy spread most by electronic mail

9 Antivirus Approach Solusi pertama untuk mencegah virus menempatkan dirinya pada sistem. Solusi pertama untuk mencegah virus menempatkan dirinya pada sistem. Langkah-langkahnya : - Detection - Identification - Removal


Download ppt "VIRUSES and RELATED THREATS. Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors."

Presentasi serupa


Iklan oleh Google