VIRUSES and RELATED THREATS. Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors.

Slides:



Advertisements
Presentasi serupa
Materi 4 resiko sistem Berbasis komputer
Advertisements

Kuliah :Keamanan Komputer Dosen : Tata Sumitra M.Kom
Virus Komputer Kenali dan Hindari.
Pengantar Sistem Komputer
Introduction to The Design & Analysis of Algorithms
File System & Security MUHAMMAD MISBAHUL ILMI ( )
PERTEMUAN KE-13 PERKULIAHAN KEAMANAN KOMPUTER
Ancaman Sistem Keamanan Komputer
Modul-8 : Algoritma dan Struktur Data
Pemrograman Berorientasi Objek Bab 1 – Pemrograman Terstruktur.
Keamanan Sistem dan Proteksi
2. Introduction to Algorithm and Programming
Bina Sarana Informatika
Program-program perusak
PERTEMUAN IV PENGANTAR APLIKASI KOMPUTER
Keamanan Komputer Sistem Informasi STMIK “BINA NUSANTARA JAYA”
Malicious Software By Kustanto.
STRUCTURAL CONTROL STATEMENT  If  If…..else….  If ….elseif…else.
Chapter 1-a FLOW CHART.
Algoritma Umum untuk Masalah Bisnis
Lanjutan Virus 20 September 2011.
Langkah Awal Modularisasi
Pertemuan Operasi Seleksi
Malicious Code/Vandalware
1 Pertemuan 17 Input / Output Matakuliah: T0316/sistem Operasi Tahun: 2005 Versi/Revisi: 5.
Keamanan Virus Komputer dan Firewall
By : Yudi Rahmat Pratama ( ) Farid Hendra P( ) Jobit Parapat( )
Pengenalan dan Penanggulangan Virus, Trojan dan Worm
Viruses and Other Wild Life
MATERI III KEAMANAN KOMPUTER
Fakultas Ilmu Komputer – TI Udinus Defri Kurniawan, M.Kom
Konsep Pemrograman 3
Kuliah Pengaman Jaringan
Pengenalan dan Penanggulangan Virus, Trojan dan Worm
Keamanan Virus Komputer dan Firewall
Pengenalan dan Penanggulangan Virus,Trojan, & Worm
KEAMANAN DARI DEVIL PROGRAM
Pemrograman Terstruktur
KEAMANAN SISTEM.
Dasar-Dasar Pemrograman
KEAMANAN DARI DEVIL PROGRAM
Program-program perusak
Security SISTEM OPERASI Slide perkuliahan
KEAMANAN SISTEM KOMPUTER PERTEMUAN 6
MATERI III KEAMANAN JARINGAN KOMPUTER
Security SISTEM OPERASI Slide perkuliahan
MATERI II KEAMANAN KOMPUTER
Organisasi Komputer II STMIK – AUB Surakarta
Keamanan Informasi Week 11. Virus, Malware.
Latihan Soal Sistem Operasi
Pengenalan dan Penanggulangan Virus, Trojan dan Worm
STRUKTUR CONTROL program
Operasi Unit Kontrol STMIK – AUB Surakarta.
ANDROID ACTIVITY.
Virus Komputer.
Rekursif By Serdiwansyah N. A..
Keamanan Sistem Operasi
VIRUS 20 September 2011.
PENGAMANAN SISTEM PERTEMUAN - 7.
PENGETAHUAN KRIMINALITAS KOMPUTER
How to Set Up AT&T on MS Outlook ATT is a multinational company headquartered in Texas. ATT services are used by many people widely across.
Program-program perusak
KEAMANAN SISTEM.
Algoritma & Pemrograman 1 Achmad Fitro The Power of PowerPoint – thepopp.com Chapter 3.
Algoritma & Pemrograman 1 Achmad Fitro The Power of PowerPoint – thepopp.com Chapter 4.
Software Testing Strategies
CALL PC EXPERT How to Remove Adware, Pop- up Ads from Web Browser.
Right, indonesia is a wonderful country who rich in power energy not only in term of number but also diversity. Energy needs in indonesia are increasingly.
Keamanan Sistem Operasi dan Proteksi
Keamanan Virus Komputer dan Firewall
Transcript presentasi:

VIRUSES and RELATED THREATS

Malicious Programs Malicious Program Independent Need Host Programs WormsBacteria Viruses Trojan HorsesLogic BombsTrapdoors

Virus Adalah program yang mampu menginfeksi program lain dengan cara memodifikasinya. Adalah program yang mampu menginfeksi program lain dengan cara memodifikasinya.

Sifat Alamai Virus Dormant Phase (idle phase) Dormant Phase (idle phase) Propagation Phase (the virus places an identical copy of itself into other program or system area on disk) Propagation Phase (the virus places an identical copy of itself into other program or system area on disk) Triggering Phase (The Virus Activated to perform the function) Triggering Phase (The Virus Activated to perform the function) Execution Phase (The function is perform) Execution Phase (The function is perform)

Struktur Virus Algoritma virus Algoritma virus Program V:= {goto main; ; subroutin infect-executable-file:= {loop: file:=get-random-executable-file; file:=get-random-executable-file; if(first-line-of-file= ) if(first-line-of-file= ) then goto loop else prepend V to file} subroutin do-damage:= {whatever damage to be done} subroutin trigger-pulled:= {return true if some condition holds} Main :main-program:= {infect-executable; if trigger-pulled then do-damage; goto next;} Next:}

Proses Infeksi CV P1’ P2 P1’ P1 P2’ P2 CV

Jenis-Jenis Virus Parasitic Virus (tradisional and still most common form) Parasitic Virus (tradisional and still most common form) Memory-resident Virus (lodges in main memory) Memory-resident Virus (lodges in main memory) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted) Boot Sector Virus (Infect a master boot record (MBR) and spreads when a system is booted) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software) Stealth Virus (a Form a Virus explicite design to hide itself from detection by antivirus software) Polymorphics (A mutates with every infection, making detection by signature of the virus imposible Polymorphics (A mutates with every infection, making detection by signature of the virus imposible

Macro Virus A Macro virus is platform independent A Macro virus is platform independent Infect document, not executable portion of code Infect document, not executable portion of code Easy spread most by electronic mail Easy spread most by electronic mail

Antivirus Approach Solusi pertama untuk mencegah virus menempatkan dirinya pada sistem. Solusi pertama untuk mencegah virus menempatkan dirinya pada sistem. Langkah-langkahnya : - Detection - Identification - Removal