- Ako Cee Jae SunTNMAA FinesT
- Posts : 1034
Points : 105747
Coins : 14700
Join date : 2013-05-01
Warning Level :
Member's Awards :
[Did you Know?] Lesson 1 : System Security
Mon Dec 02, 2013 9:51 pm
System Security
- means not only securing sensitive data against unauthorized access, but also protecting the integrity & existence of that data from malicious user of software.
Various System Security Threats
- Virus - A program or piece of code that is loaded onto your computer w/o your knowledge & runs against your wishes
Types of Virus- Boot Sector Virus:
Boot Sector Virus - infects the BOOT SECTOR or PARTITION table of a DISK
- Companion Virus:
Companion Virus - Disguises itself as a Legitimate program using the name of a legitimate program but w/ Different Extension.
- File Infector Virus:
File Infector Virus - Generally infect files that have the extensions .com & .exe.
- Macro Virus:
Macro Virus - uses the internal workings of the application to perform malicious operations.
- Memory Resident Virus:
Memory Resident Virus - from the name itself it affects the Random Access Memory also known as RAM
- Polymorphic Virus:
Polymorphic Virus - Change themselves w/ each infection
- Metamorphic Virus:
Metamorphic Virus - is capable of recompiling itself into a new form & the code keeps changing from generation to generation , in short he revive itself
- Stealth Virus:
Stealth Virus - A virus that hides from virus protection / anti-virus software's by encrypting its codes.
Files types that commonly carry Viruses - .exe
- .html
- .src (PC Screensaver)
- .com
- .zip/.rar
- .bat
- .dll
- .vbs (visual basic)
- .xls (Microsoft Excel)
- .doc (Microsoft Word)
- .mdb (Microsoft Access)
Example : You're an IT Programmer in your company and your boss is planning to kicked you out . You can modify the database and put a virus which trigger if you're name will be deleted in employees list (database)
Now , we already how deadly or dangerous virus be.
How can we prevent them ?
To be Continued . !
NEXT : [Did you Know?] Lesson 2 : TOP 10 List of Good Computer Security Practices
This Lesson are based on my copies / knowledge and what we discuss in our class
no Copyright Infringement Intended
Permissions in this forum:
You cannot reply to topics in this forum
|
|