Where Malware Lives Most people expect malware in only one place –

Slides:



Advertisements
Similar presentations
Digital Skills Academy. What is a Computer Super Calculator Digital Skills Academy.
Advertisements

Lecture 13 Page 1 CS 111 Online File Systems: Introduction CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture 19 Page 1 CS 111 Online Protecting Operating Systems Resources How do we use these various tools to protect actual OS resources? Memory? Files?
Cosc 4765 Cleaning up.. So… The Windows machine has been infected/comprised or just “acting funny”. How to clean it up. Hope you have backups…
Lecture 12 Page 1 CS 111 Online Devices and Device Drivers CS 111 On-Line MS Program Operating Systems Peter Reiher.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Essential Computer Concepts
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Introduction to Windows 7. Desktop Maximize, Minimizing, and Restoring.
CS 101 – Aug. 26 Definition of computer & CS Making good decisions Computer organization A little history Please read Chapter 1 in book. Tomorrow’s lab:
Lecture 10 Page 1 CS 236 Online Prolog to Lecture 10 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Computers Parts/Types. Topics Definition Types of Computers Parts of Computer System Impact on Society.
Lecture 15 Page 1 Advanced Network Security Perimeter Defense in Networks: Firewalls Configuration and Management Advanced Network Security Peter Reiher.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
We are here to help you… Fight something like this Brownies !
Dealing with Malware By: Brandon Payne Image source: TechTips.com.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Parts of the Computer System
Lecture 15 Page 1 CS 236 Online Prolog to Lecture 15 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 2 Page 1 CS 236 Online Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 4 Page 1 CS 111 Online Modularity and Virtualization CS 111 On-Line MS Program Operating Systems Peter Reiher.
Computer Parts and Functions. How A Computer Works.
Lecture 14 Page 1 CS 111 Summer 2013 Security in Operating Systems: Basics CS 111 Operating Systems Peter Reiher.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Lecture 8 Page 1 CS 236 Online Prolog to Lecture 8 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 3 Page 1 CS 236 Online Security Mechanisms CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Lecture 8 Page 1 CS 236, Spring 2008 Operating System Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Keeping you and your computer safe in the digital world.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Chapter 6 Protecting Your Files
Electronic Plan By Ben Smithers and Dana Natov
What they are and how to protect against them
Firmware threat Dhaval Chauhan MIS 534.
Outline Basic concepts in computer security
Malware and Computer Maintenance
Android Access Control
Year 8 ICT Internet Security
Protecting Memory What is there to protect in memory?
Firewall Configuration and Administration
Secure Software and the Law
Outline Introduction Viruses Trojan horses Trap doors Logic bombs
Outline What does the OS protect? Authentication for operating systems
Putting It All Together
Putting It All Together
Operating System and Utilities
Why Computer Security Need???
computer virus infection & symptoms
Unit 2 Computer Systems HND in Computing and Systems Development
Introduction to Computers
Outline What does the OS protect? Authentication for operating systems
1(844) How to fix Smart test failed Error Code 303 in HP
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Call us HP Support Phone Number.
Stay Safe While Using The Internet
Computer Security.
Prolog to Lecture 2 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
Hardware Security – Highlevel Survey Review for Exam 4
TPM, UEFI, Trusted Boot, Secure Boot
Unit 1 insight – Hardware and software of a computer
Outline Introduction Memory protection Buffer overflows
Android Access Control
Windows 10 An Operating System
Presentation transcript:

Prolog to Lecture 15 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher

Where Malware Lives Most people expect malware in only one place – Somewhere on your hard drive Maybe also on flash drives, CDs, DVDs Perhaps in boot sector But that’s it, right?

Malware and Firmware Proof of concept recently showed malware stored in peripherals In their firmware Malware writes itself into their firmware Virus detection stuff doesn’t look there Nor does most cleaning code So it’s unlikely to be found or removed

The Implications Anything with writable memory might harbor malware Need device specific scanning and analysis code If device has its own processing capabilities, problem is even worse Obviously, much harder to clean devices this way

Let’s Look in Another Dimension Spatial We are moving to a world of embedded devices They’re too small and weak to host virus detection software What will be the problems there?

Malware Problems of the Ubiquitous Future Millions of evil little nodes All around us Hard to detect Hard to clean But they are limited devices Can we leverage that for protection? Or at least to limit the damage?

Another Example What if someone writes malware to live in a network device? Like a printer Recently, HP and Samsung had printer security problems Doesn’t have to have large footprint in other machines Printer software wakes up and takes over other machines when needed Who’s going to bother checking the printer?

Malware in Our Smart Phones Smart phones are essentially portable computers Widely deployed Poorly administered With access to useful personal data Criminals are very interested in them

Protecting the Ubiquitous Future If computers are everywhere, how can we prevent malware from being everywhere? The few advantages we have with classic computers don’t apply What’s our strategy for keeping these machines safe?