Malicious Software

Get Started. It's Free
or sign up with your email address
Malicious Software by Mind Map: Malicious Software

1. Classified Viruses

1.1. Appending

1.2. Surrounding

1.3. Integrating

1.4. Replacing

1.5. Hiding Mechanism

1.5.1. In the boot sector

1.5.2. In memory

1.5.2.1. Attached to resident programs

1.5.3. In application programs

1.5.3.1. MS Word

1.5.3.2. MS PowerPoint

1.5.3.3. MS Excel

1.5.4. In library files

1.5.4.1. .dll

1.5.4.2. .jar

1.5.5. In other widely shared files and programs

1.5.5.1. Data sets

1.5.5.2. Digital Photos

1.5.5.3. Inside virus protection programs

2. Anti-Malware Methods

2.1. Virus Detection

2.1.1. define signature by patterns

2.1.1.1. Storage Patterns

2.1.1.2. Execution Patterns

2.1.1.3. Distribution Patterns

2.1.2. Virus scanners

2.1.2.1. use file checksum to detect viruses

2.2. Virus removal and Post-infection Recovery

2.2.1. Use antivirus softwares to disinfect viruses

2.2.2. Recover/ Replace

2.2.2.1. files deleted by virus

2.2.2.2. files modified by virus

2.2.2.3. files deleted during disinfected

2.3. Identifying Digital Objects Modified by Malware

2.3.1. Error detecting codes can be used to detect when digital objects have been surreptitiously altered

2.3.2. Error correcting code can be used to restore programs or files to their proper state without requiring a coppy of the original object

2.4. Proper Malware Hygiene

2.4.1. Use up-to-date anti malware

2.4.2. Test new software on an isolated device

2.4.3. Open only safe attachments and data files

2.4.4. Recognize that any website might be hamful

2.4.5. Keep a recoverable system image in a safe place

2.4.6. Backup executable system

2.5. Several mechanisms can be used to reduce from malware

2.5.1. Least privilege

2.5.2. Complete mediation

2.5.3. Memory separation

3. Attributes

3.1. Harm

3.2. Transmission / Propagation

3.3. Activation

3.4. Stealth

4. Common Forms

4.1. Virus

4.1.1. transient virus

4.1.2. resident virus

4.2. Worm

4.3. Trojan Horse

4.4. Zombie

4.5. Logic Bomb

4.6. Rabbit

4.7. Trapdoor

4.8. Script Attack

5. Targeted

5.1. Attack a particular system

5.2. Attack a particular application

5.3. Carry out a particular malicious task

6. Most singel-user

6.1. home computers

6.2. laptops

6.3. tablets

7. Seven Truths about Malware

7.1. Malware can infect any platform

7.2. Malware can modify hidden and read-only files

7.3. Malware can appear anywhere in a system

7.4. Malware can spread anywhere where sharing occurs

7.5. Malware cannot remain in volatile memory after a complete power off/power on rebooot

7.6. Malware can infect sorftware that runs hardware

7.7. Malware can be malevolent, begin, or benevolent