kiranNS
kiranNS
kiranNS
MALWARE
INTRODUCTION
Virus creators, or “virus writers”, started off writing viruses in the early 1980’s.
Until the late 1990’s most of the viruses were just pranks made up in order to
annoy users and to see how far a virus could spread. The writers were often
young programmers, some still in their teens, who didn’t always understand the
vast consequences of their actions.
In the late 1990’s and early 2000’s, virus writers and hackers began to put their
talents to more professional and sometimes criminal use. The internet
had become everyone’s tool for information and businesses and banks were
beginning to use it for commerce and transactions. As practical as online
shopping and banking are, they also opened a world of opportunities for
economic exploitation of both corporations and the ordinary computer user.
Today many experts believe the amount of malicious software being released on
the web might actually surpass the release of valid software.
pg. 1
MALWARE
Trojans and Rootkits are grouped together as they both seek to conceal attacks
on computers. Trojan Horses are malignant pieces of software pretending to be
benign applications. Users therefore download them thinking they will get a
useful piece of software and instead end up with a malware infected computer.
Rootkits are different. They are a masking technique for malware, but do not
contain damaging software. Rootkit techniques were invented by virus writers
to conceal malware, so it could go unnoticed by antivirus detection and removal
programs.
Spyware and keyloggers are malware used in malicious attacks like identity
theft, phishing and social engineering - threats designed to steal money from
unknowing computer users, businesses and banks.
The latest security reports for the first quarter of 2011 put Trojan infections at
the top of the malware list, with more than 70% of all malicious files detected
on computer systems, followed by the traditional viruses and worms.
The popularity of rogue antiviruses has been decreasing over the end of 2010
and beginning of 2011, but the number of downloader Trojans significantly
increased. The detection rates of new malware have increased 15% in the first
quarter of 2011 compared to the last quarter of 2010.
pg. 2
MALWARE
USES OF ANTIVIRUS
Antivirus Software is data security utility which is installed in a computer
system/PC with a purpose of protection from viruses, spyware, malware,
rootkits, Trojans, phishing attacks, spam attack and other online cyber threats.
With an increased use of computer system across the world, there are many
threats which are also increasing along with it resulting in risk of data security
for individual and organizations.
Data is the most crucial and essential component of every organization, and no
one would want to risk the confidential data to the viruses approaching the
computer system.
Antivirus are recommended for every computer system to keep it secure from
any unknown threats approaching your computer system from the internet,
external drives, CD/DVDs, etc. and keeps your confidential data secured.
Antivirus has the primary job of detecting any sought of viruses, spyware,
malware and other unknown threats and removing the same before they can do
any harm to the data present in a computer system.
pg. 3
MALWARE
With the increased use of the internet, various online cyber threats are affecting
the data security of the computer. Antivirus software takes control of the web
activities limiting unauthorized access of any online threat.
Two-Way Firewall
At present, most of the viruses and spam attacks are executed from the pop-up
ads and other spam website whose original intention is to steal confidential
information from user’s computer which could result in big financial losses.
pg. 4
MALWARE
could be a big advantage for all the employers and allows their employee’s
efficiency to be increased by up to 30%.
Speed Up Your PC
Now days, antivirus software are developed in such a way that they don’t
hamper the system performance. Rather they come with built in modules which
automatically deleted unwanted files and folders from the computer system,
thus increasing its performance speed.
Basic static analysis consists of examining the executable file without viewing
the actual instructions. Basic static analysis can confirm whether a file is
malicious, provide information about its functionality, and sometimes provide
information that will allow you to produce simple network signatures. Basic
static analysis is straightforward and can be quick, but it’s largely ineffective
against sophisticated malware, and it can miss important behaviours .
Basic dynamic analysis techniques involve running the malware and observing
its behaviour on the system in order to remove the infection, produce effective
signatures, or both. However, before you can run malware safely, you must set
up an environment that will allow you to study the running Malware Analysis
Primer without risk of damage to your system or network. Like basic static
analysis techniques, basic dynamic analysis techniques can be used by most
people without deep programming knowledge, but they won’t be effective with
all malware and can miss important functionality.
pg. 5
MALWARE
pg. 6
MALWARE
antivirus programs use different signatures and heuristics, it’s useful to run
several different antivirus programs against the same piece of suspected
malware. Websites such as VirusTotal (http://www.virustotal.com/) allow you
to upload a file for scanning by multiple antivirus engines. VirusTotal generates
a report that provides the total number of engines that marked the file as
malicious, the malware name, and, if available, additional information about the
malware.
Finding Strings
pg. 7
MALWARE
2. FEASIBILITY STUDY
Feasibility study assesses the operational, technical and economic merits of the
proposed project. The feasibility study is intended to be a preliminary review of
the facts to see it if it is worthy of proceeding to the analysis phase. From the
systems analyst perspective, the feasibility analysis is the primary tool for
recommending whether to proceed to the next phase or to discontinue the
project.
pg. 8
MALWARE
pg. 9
MALWARE
pg. 10
MALWARE
The economic feasibility will review the expected costs to see if they are in-line
with the projected budget or if the project has an acceptable return on
investment. At this point, the projected costs will only be a rough estimate. The
exact costs are not required to determine economic feasibility. It is only
required to determine if it is feasible that the project costs will fall within the
target budget or return on investment. A rough estimate of the project schedule
is required to determine if it would be feasible to complete the systems project
within a required timeframe.
2. FEASIBILITY STUDY
Feasibility study assesses the operational, technical and economic merits of the
proposed project. The feasibility study is intended to be a preliminary review of
the facts to see it if it is worthy of proceeding to the analysis phase. From the
systems analyst perspective, the feasibility analysis is the primary tool for
recommending whether to proceed to the next phase or to discontinue the
project.
pg. 11
MALWARE
pg. 13
MALWARE
• How do the end-users feel about their role in the new system?
• What end-users or managers may resist or not use the system?
• How will the working environment of the end-user change?
pg. 14
MALWARE
The economic feasibility will review the expected costs to see if they are in-line
with the projected budget or if the project has an acceptable return on
investment. At this point, the projected costs will only be a rough estimate. The
exact costs are not required to determine economic feasibility. It is only
required to determine if it is feasible that the project costs will fall within the
target budget or return on investment. A rough estimate of the project schedule
is required to determine if it would be feasible to complete the systems project
within a required timeframe.
pg. 15