Senin, 23 Januari 2012

pert 9 virus, trojan, worm

Virus = program komputr yg dpt mnybar pd kmputer atau jaringn dgn cra mbuat copy diriny.

Virus criteria Having an ability to :
- get an info. eq: macro vrus
- check a file. Eq: macro virus
- reproduces itself and infect other
- manipulate
- hide itself

virus cycle life :
- dormant phase (sleeping phase) = virus is inactive until activated
- propagation ( distrubing) = virus start to clonning itself
- triggering (active)
- execution (acting) = start manipulating

kategori virus :
- boot virus = brada di boot sector
- file virus = mnginfeksi executable program
- multipartite virus = mnginfeksi boot sector n file
- macro virus = targetny file dokumen sprti excel n word

agar virus dpt d jlnkn korban :
- mnempelkn diriny pd suatu program
- virus yg jln ktk mbuka suatu tipe file ttntu
- mmanfaatkn celai keamanan
- file virus dlm attachment email

Yang bsa d lakukn virus :
- memperlambat email dg mbuat trafik email yg sgt bsar (so-big)
- mncuri data konfidential (worm bugbear-D, mampu mrkam keystroke keyboard)
- mnggunkn kmpter korban utk mnyrang situs (mydoom)
- mrusak dta (virus compatable)
- mnhpus data (virus sircam)
- men-disable hardware (virus CIH/ chernobyl)
- mnimbulkn hal2 yg aneh (virus Netsky-D)
- Mampilln psan trtnt (virus cone-F)
- Mmposting dokumen dan nma anda pd newsgroup yg brbau porno (virus polypost).

Virus cetix = merubah diri mnjd icon aplikasi

trojan horse = unlike virus, contains or installs malicious program while under the guise of being something else atau
trojan horse = program/code fragment that is hides inside a program and perform a disguised function

nama trojan horse dri mitos di yunani dan cerita troy

pembagian trojan horse :
- DOS trojan horse = mngurangi kcptn komptr / mnghpus file2
- windows trojan horse = u/ hacking yg dpt mngkoleks info dr kmptr korban

contoh trojan horse :
- back office dan net bus hacker tdk hnya mlacak kgiatan tp jga mngambil alih kmptr korban
- win-trojan/sub seven, win-trojan/ecokys(korean)

worm = independent program to propagate or spawn itself on infected systm

worm :
- ga butuh carrier
- mengcopy dri sndri
- virus mydoom/bagle bkrja sprti worm n mnggunkn email utk memforward
- virus mnginfeksi target code, sdngkn worm hnya mnetap di memory

contoh worm = i-worm(happy99/explore zip/prettypark/mypics)

program anti virus :
on-access scanner = slalu aktif dlm sistm kmptr
on-demand = mmbiarkn user yg mmulai aktivitas scanning. Dpt d lkukn sec periodik

software antivirs :
- norton
- mcafee
- pc tools
- wndows live 1 care
- f-port
- caspersky
- avg

Tidak ada komentar:

Posting Komentar