Midterm 2 Exam Review Release questions via webcourse “assignment” around 2pm, Wednesday Mar. 28th, due via webcourse at 2pm, next day Submit format: Word.

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

MOSQUITO BREEDING ATTACK: Spread of bots using Peer To Peer INSTRUCTOR: Dr.Cliff Zou PRESENTED BY : BHARAT SOUNDARARAJAN & AMIT SHRIVATSAVA.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Windows Malware: Detection And Removal TechBytes Tim Ramsey.
Botnets Abhishek Debchoudhury Jason Holmes. What is a botnet? A network of computers running software that runs autonomously. In a security context we.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
 Collection of connected programs communicating with similar programs to perform tasks  Legal  IRC bots to moderate/administer channels  Origin of.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2015.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
COMP Introduction to Programming Yi Hong May 13, 2015.
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 20 th, due via webcourse at 10:30am next day Submit format:
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Catie Welsh January 10, 2011 MWF 1-1:50 pm Sitterson 014.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
CIS 3360: Security in Computing Cliff Zou Spring 2012.
AN INSIDE LOOK AT BOTNETS Barford, Paul and Yegneswaran Advances in Information Security, Springer, 2006 Kishore Padma Raju.
Omar Hemmali CAP 6135 Paul Barford Vinod Yegneswaran Computer Sciences Department University of Wisconsen, Madison.
Internet Security and Your Computer Welcome to Boot Camp.
CDA6530: Performance Models of Computers and Networks Mid-Term Review TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2009.
Speaker: Hom-Jay Hom Date:2009/10/20 Botnet Research Survey Zhaosheng Zhu. et al July 28-August
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Midterm Exam Review –Time: Oct. 16 (Thursday, in class, close book) –Knowledge questions –True or false statement (explain why) –Protocols –Calculations.
Midterm Exam Review Release questions via webcourse “assignment” around 12:00pm, Mon. Oct. 28 th, due via webcourse at 12:00pm next day Submit format:
CDA6530: Performance Models of Computers and Networks Mid-Term Review TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Final Exam Review Release questions via webcourse “assignment” around 10am, 04/23 (next Monday), due via webcourse at 6pm, next day (next Tuesday) Submit.
Published: USENIX HotBots, 2007 Presented: Wei-Cheng Xiao 2016/10/11.
Computer Viruses Author: Alyse Allen.
Botnets A collection of compromised machines
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
Course Overview - Database Systems
Big Picture Consider this How many online threats might you be faced with a day?
CNT 4704 Computer Communication Networking (not “analysis”)
COSC 1200 Best Practices: homework
CNT 4704 Computer Communication Networking (not “analysis”)
EN Lecture Notes Spring 2016
Lecture 8. Cyber Security, Ethics and Trust
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Midterm Exam Review Release questions via webcourse “assignment” around 1:30pm, Thur. Oct. 14th, due via webcourse at 11:59pm Submit format: Word file,
Techniques, Tools, and Research Issues
CNT 4704 Computer Communication Networking (not “analysis”)
Midterm Exam #2 Review Exam time is Mar. 28th during class time.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Botnets A collection of compromised machines
Course Overview - Database Systems
Internet Worm propagation
Final Exam Review Exam time is Aug. 2nd 2:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
Malware CJ
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
BASIC SOFTWARE MAINTENANCE
CNT 4704 Analysis of Computer Communication Networks
Botnets Usman Jafarey Including slides from The Zombie Roundup by Cooke, Jahanian, McPherson of the University of Michigan.
CNT 4704 Analysis of Computer Communication Networks
Course Information Teacher: Cliff Zou Office: HEC
Welcome to Physics 5306!!.
Akhila Kondai Exam-2 overview Akhila Kondai
Acknowledgement This lecture uses some contents from the lecture notes from: Dr. Dawn Song: CS161: computer security Richard Wang – SophosLabs: The Development.
Welcome to Physics 4304!!.
English II March 20, 2018 As you come in, answer questions 3 & 4 for both the revision and editing selections you received yesterday. If you need to read.
What are Computers? C Use this tutorial alongside the numbers coded in your workbook and answer the related questions in each section.
Introduction to Internet Worm
Welcome to Physics 5305!!.
Midterm Exam Review Time: Knowledge questions
Midterm Exam Review Release questions via webcourse “assignment” around 10:30am, Thur. Oct. 25th, due via webcourse at 10:30am next day Submit format:
Final Exam Review Exam time is May. 2nd 1:00pm – 3:50pm in the same classroom. All semester’s content will be tested, but more on content after midterm.
Presentation transcript:

Midterm 2 Exam Review Release questions via webcourse “assignment” around 2pm, Wednesday Mar. 28th, due via webcourse at 2pm, next day Submit format: Word file, PDF file Scanned answer sheets Make sure your writing is large and readable, file names show page number Photos of your answer sheets if you have no scanner Make sure it is readable, file names show page number You can resubmit, so submit first version early! Don’t wait until the last one hour to submit! No excuse of not being able to submit! (unless webcourse is down for the all day on Mar. 29th) From 2pm to 3:45pm on Mar. 28th, you can call me for any questions related to exam problems Office number: 407-823-5015 (HEC 243)

Exam Coverage All questions in previous three homework and the email spam assignment All questions in mid-term 1 exam All examples given in this review lecture Try to go over my lecture notes after mid-term 1 exam Use textbook as reference

Question Types Knowledge questions True or false statement (explain why) Protocols Calculations

Knowledge Question Examples What port is used by SMTP protocol? By HTTP protocol? By HTTPS protocol? When a user reads his/her email, is the “From:” field shows the email address from “Mail from:” command, or from the “from:” line in Data command? What is RBL? (realtime blackhole list) What are the two sender verification techniques introduced in class? Which one use public key? What is the biggest hurdle for “pwdHash” to be really implemented? Why in KaZaA there are so many virus-infected files? What is the major differences between polymorphic virus and metamorphic viruse?

Knowledge Question Examples What is IRC? Among Agobot, SDBot, SpyBot, GT Bot, which one has no malicious code in it? Why centralized C&C botnets are very hard to shut down by defenders? Why peer-to-peer botnets are even harder to shut down? What are the two running mode of rootkits? Why rootkitrevealer can detect rootkits that hide malicious files on hard drive? What is a Trojan horse? Adware? Spyware?