Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
1Activity
0 of .
Results for:
No results containing your search query
P. 1
HHS_en06_Malware

HHS_en06_Malware

Ratings: (0)|Views: 477|Likes:
Published by Hafijulla Sheik

More info:

Published by: Hafijulla Sheik on May 08, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

05/08/2012

pdf

text

original

 
LESSON 6MALWARE
 
“License for Use” Information
The following lessons and workbooks are open and publicly available under the followingterms and conditions of ISECOM:All works in the Hacker Highschool project are provided for non-commercial use withelementary school students, junior high school students, and high school students whether in apublic institution, private institution, or a part of home-schooling. These materials may not bereproduced for sale in any form. The provision of any class, course, training, or camp withthese materials for which a fee is charged is expressly forbidden without a license includingcollege classes, university classes, trade-school classes, summer or computer camps, andsimilar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page atwww.hackerhighschool.org/license.The HHS Project is a learning tool and as with any learning tool, the instruction is the influenceof the instructor and not the tool. ISECOM cannot accept responsibility for how anyinformation herein is applied or abused.The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship.All works copyright ISECOM, 2004.
2
 
 
LESSON 6 – MALWARE
 
Table of Contents
“License for Use” Information..................................................................................................................2Contributors................................................................................................................................................46.0 Introduction..........................................................................................................................................56.1 Viruses (Virii)..........................................................................................................................................56.1.1 Introduction...................................................................................................................................56.1.2 Description....................................................................................................................................56.1.2.1 Boot Sector Viruses.............................................................................................................56.1.2.2 The Executable File Virus....................................................................................................56.1.2.3 The Terminate and Stay Resident (TSR) Virus...................................................................66.1.2.4 The Polymorphic Virus.........................................................................................................66.1.2.5 The Macro Virus...................................................................................................................66.2 Worms....................................................................................................................................................76.2.1 Introduction...................................................................................................................................76.2.2 Description....................................................................................................................................76.3 Trojans and Spyware...........................................................................................................................76.3.1 Introduction...................................................................................................................................76.3.2 Description....................................................................................................................................76.4 Rootkits and Backdoors......................................................................................................................86.4.1 Introduction...................................................................................................................................86.4.2 Description....................................................................................................................................86.5 Logicbombs and Timebombs............................................................................................................86.5.1 Introduction...................................................................................................................................86.5.2 Description....................................................................................................................................96.6 Countermeasures................................................................................................................................96.6.1 Introduction...................................................................................................................................96.6.2 Anti-Virus........................................................................................................................................96.6.3 NIDS................................................................................................................................................96.6.4 HIDS..............................................................................................................................................106.6.5 Firewalls........................................................................................................................................106.6.6 Sandboxes...................................................................................................................................106.7 Good Safety Advice.........................................................................................................................11Further Reading........................................................................................................................................12
3
 
LESSON 6 – MALWARE

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->