Virus Attack Final Presentation

Slides:



Advertisements
Similar presentations
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Advertisements

Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Web Server Administration
Tutorial 5 Downloading and Storing Data. XP Objectives Learn what FTP is and how it works Explore how to use a Web browser to transfer files Navigate.
Symantec AntiVirus Update Mark Reynolds Manager of Support Services Technology Support Services Michael Satut Manager of Distributed Support Services Technology.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Free Software Alternatives: Avast! Anti-virus
Computer Security and Penetration Testing
Maintaining and Updating Windows Server 2008
1 of 13 Back to Start Working Remotely Your company’s Windows SBS computer network makes it easy for you and your coworkers to work remotely—and to stay.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 10 Operating System Customization
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Data Security.
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
Using Windows Firewall and Windows Defender
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Home Media Network Hard Drive Training for Update to 2.0 By Erik Collett Revised for Firmware Update.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
Instant Messaging for the Workplace A pure collaborative communication tool that does not distract users from their normal activities.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Businesses understand the importance of branded communications … but have neglected to brand one of the most visible and prevalent 1-to-1 communications.
IIS Security Sridurga Mavram. Contents -Introduction -Security Consideration -Creating a web page -Drawbacks -Security Tools -Conclusion -References.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 5 1 Downloading and Storing Data Using FTP and Other Services to Transfer and.
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 8 : Configuration II Jong S. Bok
1.Nattawut Chaibuuranapankul M.2/6 No. 8 2.Poonnut Sovanpaiboon M.2/6 No.11 3.Sarin Jirasinvimol M.2/6 No Attadej Rujirawannakun M.2/6 No.28.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
1 Lesson 10 Operating System Customization Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Windows Vista Configuration MCTS : Network Security.
For more information on Rouge, visit:
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
How To Silent-Install The AVG Antivirus 2017 Using The DOS Command.
BY: SALMAN 1.
Web and Proxy Server.
BUILD SECURE PRODUCTS AND SERVICES
Introducing, Installing, and Upgrading Windows 7
PIWIK JUNIOR TIDAL ASSOCIATE PROF., WEB SERVICES & MULTIMEDIA LIBRARIAN NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY.
BY: SALMAN.
Software basics on the Internet
How To Protect Your Computer From Virus Outbreak Malwarebytes Antivirus Support
Computer Worms & Viruses
Protect Your Computer Against Harmful Attacks!
How to scan system with norton-antivirus Norton antivirus is one of the worlds best anti-malware software developed by Symmantics corporation in 1991 as.
Call AVG Antivirus Support | Fix Your PC
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Information Security Session October 24, 2005
Lesson 10 Operating System Customization
Title: Tech Training Certificate: Ace of Initiative Program
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Security through Group Policy
AbbottLink™ - IP Address Overview
(With Hybrid Network Support)
Designing IIS Security (IIS – Internet Information Service)
Network Locations in Windows 7
Securing web applications Externally
Presentation transcript:

Virus Attack Final Presentation Alex Whiteside | Audrey Simonne

The Threat Of Viruses Over 32% of the world’s computer are currently infected with a virus The United States ranks 11th on scale with over 30% infection Viruses cause over $50,000,000,000 (50 Billion) in damage yearly Anyone can create (or buy) a virus off the market and deploy it No Special Skills are required Over 74,000 Strains are created daily by computer polymorphism or by hand Viruses propagate in an exponential way, causing harm as soon as they are detected Academic models show no easy way to curb these attacks

Our Test We wanted to determine how protected the average user was from simple web use Two common operating systems : Windows 10, Windows 7 Some form of internal protection, but only the default User running with Administrative privileges People are random, so we wanted random sites For each page we visit, we want to gather all possible links Then open up 5 at random and repeat the process for each new link We’ll stop the recursive approach when a page has less than 5 links

The Implementation

The Implementation Language: Java Java was a natural choice due to our programming backgrounds, it’s ease of deployment across platforms, and integration with Selenium. Crawler Library: Selenium Selenium is a popular library supporting all OS and web browsers Logging: Custom It was easier to implement our own logging to a file than to configure one Network Connections: Standard Java Sockets Rather than use a heavy protocol, we leverage Java Sockets to send strings representing the links from master to client.

Execution We setup the master and slave and began the test with a seed list of 36 sites. We let the system run for 24 hours We retrieved the logs for both systems We ran a full virus scan on both systems Master (center), Development Computer (left) and Slave (right) running the application and opening web pages.

Results Over 5000 Pages 183 recognized domains Interesting correlation to ‘Hihanin.com’ Only 2 file downloads No EXEs 0 Viruses on either system

An interesting trend

Problems Various Exceptions Random Events Unrecognizable Domains ????????????.?? Malformed Popups Windows Update Many hits to ‘normal sites’

Conclusions Simply browsing the web does not present an easy entry point for viruses when using default security. This is important to Domain Administrators, as not all sites need to be blocked if the user does not actively look for downloads. Hihanin.com is very interesting, as many unrelated sites recursively ended up there by random link choices. Numerous exceptions can be thrown for many web related issues, and catching them at every point is the only way to continue operations gracefully.

Next Steps Other entry points for viruses exist, each could be tested in a similar way Email spam, opening and clicking through various ads Torrenting files and running their contents Downloading free software Some users turn off their firewall and deviate from the basic security Use computers that have not just been freshly installed, without patches The tests could be run for longer periods of time Tests could look for largest links, or incorporate more human choices