Malware CJ 520 10.0.

Slides:



Advertisements
Similar presentations
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Newport Photography Club Ryan Erwin PC MAINTENANCE & SECURITY.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
For any query mail to or BITS Pilani Lecture # 1.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Computer safety Filip Hruby.
Escalation Of Ad Wars Boosts Malware Delivery
Botnets A collection of compromised machines
Internet Vulnerabilities & Criminal Activities
Mark Ryan Professor of Computer Security 25 November 2009
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
IT Security  .
Level 2 Diploma Unit 11 IT Security
Various Types of Malware
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Level 2 Diploma Unit 11 IT Security
Computer Technology Notes 5
Computer Applications Unit B
Risk of the Internet At Home
Chap 10 Malicious Software.
Viruses and Virus Protection
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Malicious Software Network security Master:Mr jangjou
Chap 10 Malicious Software.
King Saud University- College OF Applied Studies
Test 3 review FTP & Cybersecurity
An overview over Botnets
Presentation transcript:

Malware CJ 520 10.0

Malware “software designed to infiltrate or damage a computer system without the owner's informed consent”

Why Care About Malware? Estimated malware cost 2006 - $13.3 billion Cyber attacks, From Russia with Love April 2007 - Estonia July 2008 - Georgia preceding physical attack November 2008 - US Pentagon

Why is Malware so prevalent? Computers & networks not designed with security in mind Most computers run the same OS Most computers connected to the Internet Most people use e-mail Knowledge base of average user declining Cyber attacks on the rise Computers are everywhere

Types of Malware - Viruses Small piece of code, piggybacks on a real program Every time the program runs, virus loaded into memory Once in memory, virus copies itself to other files Can also be an e-mail attachment

Virus Characteristics Must have a host file Self-replicating Requires human interaction to replicate Has a payload http://www.youtube.com/watch?v=9G0dtEk205o

Virus Environments File viruses Boot viruses OS specific Part of an executable file May or may not run original program code Boot viruses Copies itself to boot sector Copies itself to memory every time computer starts

Virus Environments cont. Macro viruses Part of an office document Copies itself to a global macro Network viruses Attacks networks &/or e-mail Can run themselves Don’t change file content Cross platform viruses

Types of Malware - Worms Self-replicating stand alone Specific to network No human intervention Most viruses really worms Types of worms - http://www.virusall.com/worms.shtml

Types of Malware – Trojan Horse Malicious code disguised or embedded w/in legitimate software Delivers a payload Requires human interaction Not self replicating Spread via ICQ, IRC, e-mail attachments, web sites, or file sharing

Trojan Horse Payloads Backdoor programs Remote access Password theft Key loggers File destruction Zombies Disable anti-virus software

Types of Malware – Malicious Mobile Code Small programs downloaded from remote sites - similar to Trojan horse Run local w/ minimal/no human interaction Change cookie setting Written in Java, java script, vb script, active x Stand alone Non replicating

Types of Malware - Rootkit Program designed to take control of a computer system Root - unix, linux Administrator - windows Designed to get control of unresponsive system Replaces executable files used by OS

Types of Malware - Adware Not really malicious Nuisance Maybe an e-mail attachment Maybe part of another program Maybe a web site download ICQ Kazaa Weather Bug Zwicky

Adware - What it can do Change browser settings Re-direct start-up pages Replace browser search functions Generate pop-up ads May include spyware

Types of Malware - Spyware Similar to adware - same sources Installed surreptitiously on user’s machine Will intercept/take control of user’s machine Part of another program Used for marketing purposes May change browser settings Eula

Spyware Sites Cool web search Internet optimizer Zango Movieland Internet Spyware Prevention Act of 2007 Amended to Title 18

Types of Malware – Rogue Security Software Pretends to be real anti-virus or anti-spyware software Really malware - usually spyware delivered in the form of a Trojan Examples: Doctor anti-virus, Virus isolator, Spywiper, Malware Alarm http://www.youtube.com/watch?v=FSQ0WpoyZJo

Blended Threats Combination of malware Increases the effectiveness of an attack Website infects w/ multiple programs Example: 22 malware examples at one HYIP site

Backdoors Virus or Trojan payload Means of bypassing normal authentication Attempt to remain undetected Allows other malware to be installed May become a zombie

Backdoors Examples Sub 7 - http://hackpr.net/~sub7/main.shtml Back orifice - http://www.bo2k.com/index2.shtml Netbus - http://www.tcp-ip-info.de/trojaner_und_viren/netbus_eng.htm

Botnets Web Robot or zombie Botnet – collection/network of bots Run by bot herders Machine infected by trojan/worm/virus – opens a “backdoor” Infected machine notifies master when online Network used for criminal activities

Botherders Mischievous teenagers Organized crime Nation states Russian Business Network (RBN)

Botnet Crimes DoS / DDoS attacks Spam Click fraud Credit card # theft / Personal info theft Spamdexing Extortion Fast flux Hosting illegal information / contraband

Storm – 85,000 infected

Srizbi – 450,000

Kraken – 495,000 infected

Conficker – 9 Million Infected

Conficker

Operation Bot Roast 2007 FBI Operation Track down and arrest botherders Identified 1 million infected computers National security issue http://www.fbi.gov/page2/june07/botnet061307.htm