Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 CHAPTER 8 BUFFER OVERFLOW. 2 Introduction One of the more advanced attack techniques is the buffer overflow attack Buffer Overflows occurs when software.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Video Following is a video of what can happen if you don’t update your security settings! security.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
WEB 2.0 READ/WRITE WEB Eidson. WORLD WIDE WEB  Sir Tim Berners-Lee  World Wide Web Inventor-1989  Web 2.0 – The Read/Write Web.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
WHAT IS VIRUS? NAE GRAND CHALLENGE SECURE CYBERSPACE.
 a crime committed on a computer network, esp. the Internet.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Return to the PC Security web page Lesson 5: Dealing with Malware.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Understand Malware LESSON Security Fundamentals.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
Group 9. Exploiting Software The exploitation of software is one of the main ways that a users computer can be broken into. It involves exploiting the.
Course Title: WEB SECURITY Chapter No: 01 “Introduction to Web-Security” 1 Maiwand Institute Of Higher Education.
Computer viruses are programs written by people and they are programed specially to damage the data on our computer by corrupting programs, deleting files,
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 3 Computing System Fundamentals 3.7 Utility Software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By Thomas Pantone Cosc 380.  A virus is a type of malware that self replicates after being executed and inserts itself into other programs, data files,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Chapter 40 Internet Security.
Botnets A collection of compromised machines
Computer Security Revision Week
What they are and how to protect against them
Botnets A collection of compromised machines
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
NET 311 Information Security
Malicious Software Network security Master:Mr jangjou
Security.
Crisis and Aftermath Morris worm.
Test 3 review FTP & Cybersecurity
Presentation transcript:

Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses, Trojan horses, spyware and worms. 2. Viruses A programs that can replicate their structures They can infect others files. Stealing the data is common task. 3. Trojan horse It is a general term for malicious software. software that pretends to be harmless. So that a user willingly allows it to be downloaded.

Week-14 (Lecture-1) 4. Spyware A programs that surreptitiously monitor activity on a computer It report that information to others without the user's consent. 5. Worms Worm replicates themselves throughout a computer network, performing malicious tasks throughout. 6. Botnet A botnet is a network of "zombie" computers "bot" that performs large-scale malicious act.

Week-14 (Lecture-1) Antivirus: Antivirus programs and Internet security programs protect from viruses. They detect and usually eliminate viruses. A user would pay for antivirus software. User can download it from a host of free security. Ex. Norton, AVIRA, AVST, Microsoft security essentials etc. Buffer overflow attacks: An attack that could get full system access Cracking a computer using brute force. Mostly applications are incapable of adequate defense Ex- Through remote control process.

Week-14 (Lecture-2) Features of buffer overflow attacks: 1- Use of the Stack Use push and pop methods for memory space The stack is used heavily to store local variables and the return address of a function.

Week-14 (Lecture-2) 2- Real Stack Overflow Attacks: A real attack would try to place the address of the top of the stack in lieu of the return address, It followed by some horrible lines of assembly code Ex. call to another tool. Whole process takes only the transmission of a little script program. 3- Heap Overflow Attacks Programs use dynamically allocated memory as well as the stack A vulnerable program uses a call to something like strcpy It overwrite data on the heap The program will not always crash but not show Observing this behavior attacker finds way to corrupt the stack. Once the stack is corrupted, the attacker can get through.

Week-14 (Lecture-2) Data Encryption: The process of converting the data into cipher text It uses an algorithm (mathematical formula) Decryption is the reverse process of it. A secret key is used to encrypt and decrypt the data. Symmetric key and Asymmetric key are current techniques used in data encryption.