18
MALICIOUS SOFTWARE Mr. Sukmono Bayu Adhi PROFIL MATERIAL CONCLUSIO N EXERCISES

Eng present Malware BSI

Embed Size (px)

Citation preview

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

MALICIOUS SOFTWARE

BINA SARANA INFORMATIKA

LOADING

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

Welcome To The Presentation12.2C.12About

Malicious Software

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

Group Members :

1. Nadia Asharaini (12128915)2. Atika Mardiati Khaulia (12129041)3. Astri Prasetiya Sari (12129377)4. Bella Natasya Putri (12129771)5. Ira Setyarini (12129921)

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

"Malware " is a type of software designed to harm computers. Malicious software can steal sensitive information from your computer, gradually slow down your computer, or even send a fake email from your email account without you knowing it.

Here is a display of products used by cyber criminals for deceive us in order to download their security software.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

Maybe all of you ask in the heart, why malicious programs were created? The answer can not just give one assumption. Cause, vary programs, vary purpose people who making it (usually called a hacker or hackers).

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

I want to start from the threat of software taxonomy or classification of malware :

1. Programs require a host program. Fragment program can not be independently of an application program, utility programs or system programs.

2. Programs do not require a host program.The program itself can be scheduled and run by the operating system.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

Types of malicious program :

1. Bacteria: programs that consume system resources by replicating himself. Bacteria are not explicitly damage any files. The purpose of this program is only one that is replicating itself. 2. Logic bomb: logic attached to a computer program that checks a set of conditions in the system. Once these conditions is met, logic execute a function that lead to actions not authorized.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

3. Trapdoor: secret undocumented entry point in a program for grant access without normal methods of authentication.

4. Trojan horse: Routine undocumented secrets embedded in one program useful. Useful program containing hidden code when executed perform a function that is not desired. Program execution routine causes execution of this secret.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

5. Virus: Code embedded within a program that causes the copying himself inserted into one or more other programs, by modifying those programs.

6. Worm: The program that can replicate itself and send copies-copies of computer to computer over a network connection. Once arrived, the worm turned for replicating and progasai back Besides just propagation, the worm usually performs unwanted functions.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

7. Spyware: is the application of data leaking information habits or behaviors of users in using the computer to an outside party without us knowing. Usually used by the advertisers.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

Characteristics of our computers are infected viruses :

- The computer is running slower than normal - Appear an error messages or odd - Changes in the appearance of the computer - Storage media such as floppy , flash copying files itself - The computer restarts itself or crashes when it is running - The computer hangs or stops responding - Hard disk can not be accessed (hard disk is blank, but I can not charge) - Printers and other devices can not be used even if there are no hardware problems and software drivers. - There is a menu or dialog box error or damaged - The loss of some of the basic functions of a computer - Files that we save on computer or storage media are disappear or hidden by viruses

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

"Malware “ or Malicious Program is a type of software designed to harm computers. There are some categories of malicious programs :

1. Bacteria 2. Logic bomb 3. Trapdoor 4. Trojan horse 5. Virus 6. Worm 7. Spyware

Every categories differently about their work to harm the computers.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

1.What is the meaning Malicious Software ? => In Indonesian Perangkat Lunak Jahat, "Malware " is a type of software designed to harm computers.2. What is the meaning Virus ?=> Malicious computer program that can copy itself and infect a computer.3. According to infect to other file, virus can be divided into three categories, mentioned that and explain ?=> 1. Overwriting : A type of computer virus that will copy its own code over the host computer system's file data, which destroys the original program. 2. Appending : A virus that inserts a copy of its malicious code at the end of the file. 3.Prepending : A virus defines the method it uses of infecting files by adding their code to the beginning of the file.

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

4. Wha the meaning Worm and give the examples ? => A worm is a software t is which replicates by creating its own copy. And without infecting other file. Example of Worm : ₰ ADMw0rm ₰ Code Red ₰ LoveLetter ₰ Nimda ₰ SQL-Slammer

5. What is the meaning Trojan Horse and give the examples ? => Trojan Horse is a program that looks like a good program but actually contains destructive code or destructive feature. Examples of trojan horse : Back Orifice, Back Orifice 2000, and SubSeven

MALICIOUS SOFTWARE

Mr. Sukmono Bayu Adhi

PROFIL

MATERIAL

CONCLUSION

EXERCISES

6. How to clean Virus, Malware, Worm, and TrojanHorse ! ( with your own words)=> To clean Virus, Malware, Worm, and Trojan Horse from your computer :

1. Always update your computer and software2. Use a non-administrator account when possible3. Consider carefully before clicking on a link or download anything4. Consider carefully before opening email attachments or pictures5. Do not trust pop-up window that asks you to download software6. Be careful about sharing files7. Use antivirus software