Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 9

LOGIC BOMBS

PRESENTED BY
Guided by:-Mrs. Susmita Sikdar
Biswajit Nayak (220720100191)
ASSISTANT PROFESSOR OF CSE
Branch-MCA(A) DEPARTMENT
Domain-Software Technology
CONTENT:-

 What is Logic Bomb


 Working Of Logic Bomb
 Implementation Area
 To Deal With logic Bomb
 Minimize Potential
 Reference
WHAT IS A LOGIC BOMB
 It is a piece of computer code that executes a
malicious task, such as clearing a hard drive or
deleting specific files, when it is triggered by a
specific event.

 It is also called slag code because all that's left


after it detonates is computer slag.

 It’s not the same thing as a virus, although it


often behaves in a similar manner.
WORKING OF LOGIC BOMB
 A logic bomb is a program, or portion of a
program, which lies dormant until a specific
piece of program logic is activated.

 The most common activator for a logic bomb is


a date. The logic bomb checks the system
date and does nothing until a pre-programmed
date and time is reached. At that point, the
logic bomb activates and executes it's code.

 A logic bomb could also be programmed to


wait for a certain message from the
programmer.
IMPLEMENTATION AREAS
 Logic Bombs can be implemented on Intranet
such as company’s LAN or on Internet.

 Logic Bombs that are implemented on LAN


affect only the company’s Data. It does not
spread in the outside world.

 Whereas, Logic Bombs implemented on Internet


can be spread and it can cause damage to
every computer on which the malicious code is
being run.
TO DEAL WITH LOGIC BOMBS
 Most IT experts recommend constant
monitoring, using virus software and other
scanning programs intended to pick up on new
objects in a computer's data, not only of overall
networks but also of each individual computer
on a network.

 To deal with logic bombs, make sure your


enterprise employs regular backups that are
verified on a consistent basis.

 make sure you have Hot Standby Router


Protocol (HSRP) enabled on your routers, which
will ensure connectivity even when first-hop
routers fail.
MINIMIZING POTENTIAL
There are number of ways to minimize potential for
obtaining Logic Bombs.

 Individual Actions:-
1. Check disks or programs using current version of
Antivirus software.
2. Don’t use software or demos with doubtful origin.
3. Check the disk which is lend to other, before using it
again.
4. Remove the floppy disk hen work is done.
5. Don’t boot the machine if any disk, except a “Clean
Bootable System Disk “ is present is disk drive.
6. Scan any program or document downloaded on the
machine.
7. Upgrade the Anti-virus software on regular basis.
8. Be aware of “cookies” on internet.
REFERENCE WEBSITES

 http://computer.howstuffworks.com/logic-
bomb.htm

 http://www.networkworld.com/
newsletters/sec/2002/01514405.html

 http://en.wikipedia.org/wiki/Logic_bomb
..

You might also like