/    /  OS – Types of program threats.

Types of program threats.

 

A program threat is a program written to hijack the security or change the behaviour of the process. 

Types of program threats are as follows:

 

  • Virus

 

A virus is a self-replicating and malicious thread that attaches itself to the system file and then rapidly replicates itself changing the essential files leading to a system breakdown. 

 

Various types of computer viruses are as follows:

  • file/parasitic: It attaches itself to a file.
  • Macro: It affects the MS Office files and is written in a high-level language.
  • Source code: It modifies the source code.
  • Multipartite: It infects multiple parts of the system.
  • boot/memory: It infects the boot sector,
  • Polymorphic: It makes changes in copies every time.
  • Encrypted: It is an encrypted virus and decrypts the code.
  • Tunnelling: It installs itself in interrupt service routines and device drivers.
  • Stealth: It modifies parts of the system so that they cannot be detected.

 

  1. Logic Bomb

It is a program that initiates a security attack under certain specified conditions.

 

 

  • Trap door

 

A trap door is a hole kept open by the designer of a program so that only he can use it. It is very difficult to detect a trap door, as one will need to go through the entire source code.

 

 

  • Trojan Horse

 

A Trojan Horse is a code segment that misuses its environment. It appears as a harmless cover program but has a harmful hidden program that is used to carry viruses. It can fool the user to enter their confidential information which is then stolen by a login emulator and causes information breaches. 

Another type of trojan horse is Spyware. In Spyware, the user downloads a certain program, it then downloads ads to pop up on the user’s window, certain ads are then visited by the user, and the information entered there is then sent over to the remote server. These attacks are also known as Covert Channels.

 

Reference 

Types of program threats.