Mark Ryan Professor of Computer Security 25 November 2009

Slides:



Advertisements
Similar presentations
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Threats To A Computer Network
Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
Introduction of Internet security Sui Wang IS300.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
Business Technology Applications What is Malware.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Security The problem of insecure PCs – and its consequences Why does this problem exist? Solutions – what you can do – what the industry can do.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Chapter 40 Internet Security.
What they are and how to protect against them
Malware and Computer Maintenance
MALWARE Autumn Mattis.
Chapter 7: Identifying Advanced Attacks
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
CS101 Security.
Instructor Materials Chapter 7 Network Security
Attacks and Malicious Code
ISYM 540 Current Topics in Information System Management
Various Types of Malware
Network security threats
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Chapter 12: Social Implications of IT
Malicious Software There are various sources via whom a malicious software can enter a system most common of which is through internet sites not only this.
NET 311 Information Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Fire-wall.
Malicious Software Network security Master:Mr jangjou
Faculty of Science IT Department By Raz Dara MA.
Hardware Security – Highlevel Survey Review for Exam 4
How to keep the bad guys out and your data safe
Ch9 E-commerce Security
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Introduction to Internet Worm
An overview over Botnets
Presentation transcript:

Mark Ryan Professor of Computer Security 25 November 2009

Insecure PCs buffer overflow virus Trojan horse malware DoS attack phishing worm spam cross-site scripting spyware identity theft botnets keyloggers DNS spoofing

β α means β is a possible way to achieve α hardware theft hardware keylogger phishing data theft (inc. ID theft) DNS spoofing XSS exploit software vulnerabilities destruction (inc. vandalism) install malware DDoS promotion send spam create botnet β α means β is a possible way to achieve α

Malware covers all kinds of intruder software Malware is software intended to intercept or take partial control of a computer's operation without the user's informed consent. It subverts the computer's operation for the benefit of a third party. Also called spyware. The term “spyware” taken literally suggests software that surreptitiously monitors the user. But it has come to refer more broadly to any kind of malware, Malware covers all kinds of intruder software including viruses, worms, backdoors, rootkits, Trojan horses, stealware etc. These terms have more specific meanings.

How malware spreads Trojan horse Virus Worm Drive-by a malicious program that is disguised as useful and legitimate software. Can be part of, or bundled with, the carrier software. Virus Self-replicating program that spreads by inserting copies of itself into other executable code or documents. Worm Self-replicating program, similar to virus, but is self- contained (does not need to be part of another program). Spreads by exploiting service vulnerabilities. Drive-by installs as side-effect of visiting a website; exploits browser vulnerability. Detail from "The Procession of the Trojan Horse in Troy“, Giovanni Domenico Tiepolo

Why does this problem exist? Why can't engineers create systems that are not vulnerable to this plethora of attacks? Compare: cars aircraft telephone system electricity production

We have the technology... Attack Defence malware digital signatures for code anti-virus software phishing encrypted traffic key certificates education DNS spoofing

Why does this problem exist? complexity immaturity of technology: “release and fix” of designers/programmers: bad culture of users: a new one born every day... open platform monoculture

Trusting Trust backdoor How to create an undetectable backdoor: Change the compiler so that, when compiling the login program, it adds the hard-coded username/password check to the login program. Thus, the login program source code looks completely normal. As an extra twist, change the compiler so that, when compiling the compiler, it adds the code to add the code to the login program. Thus, even if the compiler is recompiled, the backdoor will still be inserted. And none of the source code reveals the backdoor. Described in a paper by Ken Thompson, Reflections on Trusting Trust, 1995.

What you can do Don't connect directly to the Internet – connect via a router instead Don't install anything! no third-party toolbars, extensions, helpers, freebies unless you really know where they came from Be sceptical about e-mail from nice people who want to give you $20,000,000 or help you reduce your mailbox usage or help your computer to go faster Stop using Windows use Linux, *BSD (or derivative, including Mac OS X) Update/patch frequently

What industry is doing better engineering thin clients cloud computing trusted computing protected capabilities outside software control virtualisation, to support throw-away OS