Page 138 - DCAP516_COMPUTER_SECURITY
P. 138

Computer Security




                    Notes                   the Trojan. In some cases, the creator of the Trojan also puts a backdoor within the
                                            server file itself so that he is able to access any computer running his Trojan without
                                            the need to enter a password. This is called a backdoor within a backdoor.
                                       (b)  Password Trojans: Password Trojans search the victim’s computer for passwords and
                                            then send them to the attacker or the author of the Trojan. Whether it is an Internet
                                            password or an email password there is a Trojan for every password. These Trojans
                                            usually send the information back to the attacker via E-mail.

                                       (c)  Privileges-Elevating Trojans:  These Trojans are usually used to fool system
                                            administrators. They can either be bound into a common system utility or pretend
                                            to be something harmless and even quite useful and appealing. Once the administrator
                                            runs it, the Trojan gives the attacker more privileges on the system. These Trojans
                                            can also be sent to less-privileges users and give the attacker access to their account.
                                       (d)  Key Loggers: These Trojans are very simple. They log all of the victim’s keystrokes
                                            on the keyboard (including passwords), and then either save them on a file or e-mail
                                            them to the attacker. Key loggers usually do not take much disk space and can
                                            pretend to be as important utilities, thus making them very hard to detect.

                                       (e)  Destructive Trojans: These Trojans can destroy the victim’s entire hard drive, encrypt
                                            or just scramble important files. Some destructive Trojans work like joke programs,
                                            while they are actually destroying every file they encounter.
                                   8.  Viruses: Another type of major threat – the computer virus – can also cause damage by
                                       destroying or altering data on a computer. Hackers traditionally did not write computer
                                       viruses because of the lack of control over the virus. The very nature of a virus is that it is
                                       self-replicating, and once released it propagates on its own. Viruses require some human
                                       intervention to spread, such as sending an infected file to another user, or simply opening
                                       an e-mail attachment to trigger the propagation.

                                       Basically, a virus is a computer program that is able to attach itself to other documents and
                                       to move from computer to computer. Such a document may be an executable program,
                                       e-mail or any piece of information that resides on user’s computer, including the small
                                       programs that exist in the boot sector of every floppy or hard disk.
                                       These programs are harmful and not beneficial; even if the virus has no payload (the part
                                       of a virus that contains code to either multiply itself and or to destroy something) it is an
                                       unwelcome visitor and takes up system’s resources.

                                       For most viruses, when the program with the virus attached is run, the viral code goes into
                                       memory and stays there for as long as the computer is turned on. In some cases even if the
                                       user restarts the computer the virus stays in memory. To spread itself, a virus first attaches
                                       itself to other programs, documents with macros, e-mail or other disks as they are accessed.
                                       Then, if the circumstances are correct for a particular virus, it activates and causes the
                                       damage it was designed to do. This may range from a simple message on user’s screen to
                                       complete erasure of hard disk.
                                       Usually, the spread of viruses often is accelerated because of the behaviour of computer
                                       users. The ‘Kournikova’ or ‘I Love You’ viruses are prime examples of this. By enticing
                                       human curiosity, to lure users in opening mail with promising pictures or other material
                                       is something a virus protection program cannot guard against. However, it is not only by
                                       e-mail that viruses get spread. The classic file attachments, macro code inside documents,
                                       or extensible to binary programs are also important vehicles for a virus. It is also believed
                                       that virus protection companies themselves create viruses to keep them in business.






          132                               LOVELY PROFESSIONAL UNIVERSITY
   133   134   135   136   137   138   139   140   141   142   143