Malware and Social Engineering

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security+ Guide to Network Security Fundamentals, Fourth Edition
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Viruses & Destructive Programs
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
 a crime committed on a computer network, esp. the Internet.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 2 Malware and Social Engineering Attacks.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Attacks By: Jamie Woznicki Rahul-Anaadi Kurl Alexander Kaufmann Curtis Songer Daniel Cardenas Rivero.
Information Systems Design and Development Security Risks Computing Science.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Computer safety Filip Hruby.
Security+ Guide to Network Security Fundamentals, Fifth Edition
Botnets A collection of compromised machines
Social Engineering Dr. X.
COMPUTER CRIMES Presented by THABO.
Three Things About Malware
MALWARE Autumn Mattis.
Intro to Malware Attacks
Network Security Fundamentals
3.6 Fundamentals of cyber security
IT Security  .
Social Engineering Charniece Craven COSC 316.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
COMPUTER VIRUSES Computer Technology.
Network and Telecommunications Audit
Botnets A collection of compromised machines
Teaching Computing to GCSE
Security+ Guide to Network Security Fundamentals, Fourth Edition
Computer Technology Notes 5
Computer Applications Unit B
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Chap 10 Malicious Software.
How to keep the bad guys out and your data safe
Ch9 E-commerce Security
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction to Internet Worm
Presentation transcript:

Malware and Social Engineering MTI College

Objectives What is malware? What are the different types of malware? What are payloads of malware? What is social engineering? Describe social engineering attacks.

Malware “Malware is a software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action.”

Malware Oligomorphic Malware : Changes its internal code to one of a set number of predefined mutations whenever it is executed. Polymorphic Malware : Code that completely changes from its original form whenever it is executed. Metamorphic Malware : Can rewrite its own code to thus appear different each time it is executed.

Malware - Mission Circulation Infection Concealment Payload Capabilities

Circulation/Infection Virus (Computer) : Malicious computer code that, like its biological counterpart, reproduces itself on the same computer. Swiss Cheese Infection : Multiple steps (obscurity) to the infected code. This is more difficult to detect. Split Infection : Break the malicious code into parts and disperse throughout normal source code.

Swiss Cheese Infection Multiple steps (obscurity) to the infected code. This is more difficult to detect.

Split Infection Break the malicious code into parts and disperse throughout normal source code.

Worms A malicious program that uses a computer network to replicate. Utilize vulnerabilities throughout a network to gain access.

Trojan An executable program that masquerades as performing a benign activity but also does something malicious.

Concealment Hide itself from the operating system and/or user Sony Music 2005.

Payload Capabilities What is the main goal of the malware? Political Reasons? Financial Gain? (adware, ransomware) Productivity loss? War? Collect Data? (Spyware) Steal Data? (Spyware) Modify Security? (Back door) Launch Attacks? (Command and Control)

Social Engineering Example 1: In 2007, a mystery man who remains at large burgled safety deposit boxes at an ABN Amro bank in Belgium, stealing diamonds and other gems weighing 120,000 carats, in all. He visited the bank during regular business hours, overcame all of the bank's exceptional security mechanisms, and walked right out the door with €21 million (roughly $27.9 million at the time) worth of gemstones with no one the wiser, using absolutely no technology whatsoever. “He used one weapon -- and that is his charm -- to gain confidence," Philip Claes, spokesman for the Diamond High Council, said at the time. "He bought chocolates for the personnel, he was a nice guy, he charmed them, got the original of keys to make copies and got information on where the diamonds were. "You can have all the safety and security you want," said Claes "but if someone uses their charm to mislead people it won't help."

Example 2:

Example 3: http://www.social-engineer.org/framework/general-discussion/real- world-examples/

What Is Social Engineering? “ A means of gathering information for an attack by relying on the weaknesses of individuals” Impersonation Phishing Spear Phishing Whaling Vishing Spam Hoaxes Typo Squatting Watering Hole Attack Dumpster Diving Tailgating

Discussion Pick 3 and give examples: Impersonation Phishing Spear Phishing Whaling Vishing Spam Hoaxes Typo Squatting Watering Hole Attack Dumpster Diving Tailgating