SlideShare uma empresa Scribd logo
1 de 20
NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI
DEPARTMENT OF COMPUTER SCIENCE&INFORMATION
TECHNOLOGY
V.VANMATHY
I-MSC(CS)
topic: intruder
INTRUDERS
 Any set of actions that attempt to compromise
the confidentiality, integrity, or availability of a
computer resource
 One of the most publicized attack to security is
the intruder, generally referred to a hacker or
cracker.
There classes of intruder are as follows:
 Masquerader
 Misfeasor
 Clandestine user
INTRUSION DETECTION
SYSTEM (IDS)
INTRUSION DELECTION
SYSTEM(IDS)
Intrusion detection I the process of identifying and
responding to malicious activity targeted at
resources
IDS is a system designed to test/analyze network
system traffic/events against a give set of
parameters and alert/capture data when these
IDS uses collected information and predefined
knowledge-based System reason about the
possibility of an intrusion.
IDS also provides services to cop with intrusion
such as giving alarms, activating programs to try to
deal with intrusion,etc.
FUNCTION OF IDS
 An IDS detects attacks as soon as possible and
takes appropriate action.
 An ID dose not usually take preventive measures
when an attack is detected
 It is a reactive rather than a pro-active agent
 It plays a role of informant rather than a police
officer.
PRINICIPLES OF INTRUCTION DETECTION
SYSTEM
 An IDS must run unattended for extended periods
of time
 The IDS must stay active and secure
 The IDS must be also to recognize unusual
activity
 The IDS must operate without unduly affecting
the system’s activity
 The IDS must be configurable
PRINCIPLES OF INTRUION DETECTION
SYSTEMS
COMPONENTS OF IDS
 Basically there are three components or modules
in an intrusion detection system:
 Sensor: responsible for capturing packets and
sending to the console class.
 Console: responsible for analyzing packets
captured by enor class.
 Its is the class responsible for displaying GUI and
generating alerts
TYPES OF IDS
 Network intrusion detection system(INDS)
 Protocol based intrusion detection system(PIDS)
 Application protocol based intrusion detection
system(APIDS)
 Host-based intrusion detection system(HIDS)
VIRUSES AND RELATED
THREATS
 Perhaps the most sophisticated types of threats
to computer systems are presented by program
that exploit vulnerabilities in computing systems.
 Malicious programs
Viruses
 Virus-vital information resources under seize
 A virus is a malware program that, when
executed, replicates by inserting copies of itself
into other computer programs, data files, or the
boot sector of the hard drive
Virus phases:
Dormant-waiting on trigger event
Propagation –replicating to programs/disks
Triggering-by event to execute payload
Execution- of payload
TYPES OF VIRUSES
VIRUS
COUNTERMEASURES
Viral attacks exploit lack of integrity control on
systems to defend need to add such controls
Typically by one or more of:
 Prevention-block virus infection mechanism
 Detection-of viruses in infected system
 Reaction – restoring system to clean state
VIRUS REMOVAL TECHIQUE
FIREWALL DESIGN
PRINCIPLES
 Information system undergo a steady evolution
(from small LAN’s to internet connectivity).
 Strong security features for all workstations and
servers not established.
 Effective means of protection a local system or
network of system from network _ based security
threats while affording access to the outside world
via WAN’s or the internet.
TYPES OF FIREWALLS
 Three common types of firewalls:
 Packet-filtering-router.
 Application-level-gateways.
 Circuit-level-gateways.
 Bastion host
TRUSTED SYSTEM
 A trusted system can protect malicious attacks
from future bugs or viruses.
 The code of a trusted system I passed through
rigorous analysis and development
 A trusted system and an untrusted system can
share a similar foundation
TRUSTED SYSTEM MODEL
NADAR SARASWATHI COLLEGE IDS

Mais conteúdo relacionado

Semelhante a NADAR SARASWATHI COLLEGE IDS

Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...researchinventy
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsAlison Hall
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...IIJSRJournal
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMApoorv Pandey
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Wail Hassan
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System EssayCandice Him
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentationelihuwalker
 

Semelhante a NADAR SARASWATHI COLLEGE IDS (20)

Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
 
1776 1779
1776 17791776 1779
1776 1779
 
1776 1779
1776 17791776 1779
1776 1779
 
Intrusion dDetection
Intrusion dDetectionIntrusion dDetection
Intrusion dDetection
 
Detection &Amp; Prevention Systems
Detection &Amp; Prevention SystemsDetection &Amp; Prevention Systems
Detection &Amp; Prevention Systems
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Ids vs ips
Ids vs ipsIds vs ips
Ids vs ips
 
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
Analysis of Artificial Intelligence Techniques for Network Intrusion Detectio...
 
AN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEMAN INTRUSION DETECTION SYSTEM
AN INTRUSION DETECTION SYSTEM
 
Data security
Data securityData security
Data security
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
idps
idpsidps
idps
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
Ids
IdsIds
Ids
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 
Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)Module 19 (evading ids, firewalls and honeypots)
Module 19 (evading ids, firewalls and honeypots)
 
information security technology
information security technologyinformation security technology
information security technology
 
Intrusion Detection System Essay
Intrusion Detection System EssayIntrusion Detection System Essay
Intrusion Detection System Essay
 
IT Security Presentation
IT Security PresentationIT Security Presentation
IT Security Presentation
 

Mais de PriyadharshiniVS

R Ramya devi digital image processing
R  Ramya devi digital image processingR  Ramya devi digital image processing
R Ramya devi digital image processingPriyadharshiniVS
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computingPriyadharshiniVS
 
Ramya devi R women empowerment
Ramya devi R women empowermentRamya devi R women empowerment
Ramya devi R women empowermentPriyadharshiniVS
 
R Ramya devi artificial intelligence and machine learning
R Ramya devi  artificial intelligence and machine learningR Ramya devi  artificial intelligence and machine learning
R Ramya devi artificial intelligence and machine learningPriyadharshiniVS
 
Ramya devi R internet of things
Ramya devi R internet of thingsRamya devi R internet of things
Ramya devi R internet of thingsPriyadharshiniVS
 
MOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHONMOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHONPriyadharshiniVS
 
PriyaDharshini distributed operating system
PriyaDharshini distributed operating systemPriyaDharshini distributed operating system
PriyaDharshini distributed operating systemPriyadharshiniVS
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system PriyadharshiniVS
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security PriyadharshiniVS
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system PriyadharshiniVS
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityPriyadharshiniVS
 
Graph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph databaseGraph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph databasePriyadharshiniVS
 

Mais de PriyadharshiniVS (20)

R Ramya devi digital image processing
R  Ramya devi digital image processingR  Ramya devi digital image processing
R Ramya devi digital image processing
 
R ramya devi cloud computing
R ramya devi cloud computingR ramya devi cloud computing
R ramya devi cloud computing
 
Ramya devi R women empowerment
Ramya devi R women empowermentRamya devi R women empowerment
Ramya devi R women empowerment
 
R Ramya devi artificial intelligence and machine learning
R Ramya devi  artificial intelligence and machine learningR Ramya devi  artificial intelligence and machine learning
R Ramya devi artificial intelligence and machine learning
 
Ramya devi R internet of things
Ramya devi R internet of thingsRamya devi R internet of things
Ramya devi R internet of things
 
vs.pptx
vs.pptxvs.pptx
vs.pptx
 
WE.pptx
WE.pptxWE.pptx
WE.pptx
 
IOT.pptx
IOT.pptxIOT.pptx
IOT.pptx
 
cc.pptx
cc.pptxcc.pptx
cc.pptx
 
MOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHONMOBILE APP DEVELOPMENT USING PYTHON
MOBILE APP DEVELOPMENT USING PYTHON
 
Vanmathy python
Vanmathy python Vanmathy python
Vanmathy python
 
PriyaDharshini distributed operating system
PriyaDharshini distributed operating systemPriyaDharshini distributed operating system
PriyaDharshini distributed operating system
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system
 
vanmathy cryptography network security
vanmathy cryptography network security vanmathy cryptography network security
vanmathy cryptography network security
 
Vanmathy distributed operating system
Vanmathy distributed operating system Vanmathy distributed operating system
Vanmathy distributed operating system
 
Vanmathy no sql
Vanmathy no sql Vanmathy no sql
Vanmathy no sql
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
No sql
No sql No sql
No sql
 
Graph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph databaseGraph, graph and network modeling, advantage of graph database
Graph, graph and network modeling, advantage of graph database
 
Compiler design
Compiler designCompiler design
Compiler design
 

Último

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 

Último (20)

Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 

NADAR SARASWATHI COLLEGE IDS

  • 1. NADAR SARASWATHI COLLEGE OF ARTS&SCIENCE,THENI DEPARTMENT OF COMPUTER SCIENCE&INFORMATION TECHNOLOGY V.VANMATHY I-MSC(CS)
  • 3. INTRUDERS  Any set of actions that attempt to compromise the confidentiality, integrity, or availability of a computer resource  One of the most publicized attack to security is the intruder, generally referred to a hacker or cracker. There classes of intruder are as follows:  Masquerader  Misfeasor  Clandestine user
  • 5. INTRUSION DELECTION SYSTEM(IDS) Intrusion detection I the process of identifying and responding to malicious activity targeted at resources IDS is a system designed to test/analyze network system traffic/events against a give set of parameters and alert/capture data when these IDS uses collected information and predefined knowledge-based System reason about the possibility of an intrusion. IDS also provides services to cop with intrusion such as giving alarms, activating programs to try to deal with intrusion,etc.
  • 6. FUNCTION OF IDS  An IDS detects attacks as soon as possible and takes appropriate action.  An ID dose not usually take preventive measures when an attack is detected  It is a reactive rather than a pro-active agent  It plays a role of informant rather than a police officer.
  • 7. PRINICIPLES OF INTRUCTION DETECTION SYSTEM  An IDS must run unattended for extended periods of time  The IDS must stay active and secure  The IDS must be also to recognize unusual activity  The IDS must operate without unduly affecting the system’s activity  The IDS must be configurable
  • 8. PRINCIPLES OF INTRUION DETECTION SYSTEMS
  • 9. COMPONENTS OF IDS  Basically there are three components or modules in an intrusion detection system:  Sensor: responsible for capturing packets and sending to the console class.  Console: responsible for analyzing packets captured by enor class.  Its is the class responsible for displaying GUI and generating alerts
  • 10. TYPES OF IDS  Network intrusion detection system(INDS)  Protocol based intrusion detection system(PIDS)  Application protocol based intrusion detection system(APIDS)  Host-based intrusion detection system(HIDS)
  • 11. VIRUSES AND RELATED THREATS  Perhaps the most sophisticated types of threats to computer systems are presented by program that exploit vulnerabilities in computing systems.  Malicious programs
  • 12. Viruses  Virus-vital information resources under seize  A virus is a malware program that, when executed, replicates by inserting copies of itself into other computer programs, data files, or the boot sector of the hard drive Virus phases: Dormant-waiting on trigger event Propagation –replicating to programs/disks Triggering-by event to execute payload Execution- of payload
  • 14. VIRUS COUNTERMEASURES Viral attacks exploit lack of integrity control on systems to defend need to add such controls Typically by one or more of:  Prevention-block virus infection mechanism  Detection-of viruses in infected system  Reaction – restoring system to clean state
  • 16. FIREWALL DESIGN PRINCIPLES  Information system undergo a steady evolution (from small LAN’s to internet connectivity).  Strong security features for all workstations and servers not established.  Effective means of protection a local system or network of system from network _ based security threats while affording access to the outside world via WAN’s or the internet.
  • 17. TYPES OF FIREWALLS  Three common types of firewalls:  Packet-filtering-router.  Application-level-gateways.  Circuit-level-gateways.  Bastion host
  • 18. TRUSTED SYSTEM  A trusted system can protect malicious attacks from future bugs or viruses.  The code of a trusted system I passed through rigorous analysis and development  A trusted system and an untrusted system can share a similar foundation