Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,

Slides:



Advertisements
Similar presentations
Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Advertisements

Data and Computer Communications
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
Lecture 13 Malicious Software modified from slides of Lawrie Brown.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Chapter 14 Computer Security Threats
Chapter 18: Computer and Network Security Threats
Chapter 14 Computer Security Threats
Informationsteknologi Thursday, October 11, 2007Computer Systems/Operating Systems - Class 161 Today’s class Security.
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Security Chapter 15. Computer and Network Security Requirements Confidentiality –Requires information in a computer system only be accessible for reading.
After this session, you should be able to:
Lecture 15 Overview. Kinds of Malicious Codes Virus: a program that attaches copies of itself into other programs. – Propagates and performs some unwanted.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Viruses and Worms By: Olga Bibas. Malicious Programs are perhaps the most sophisticated threats to computer systems. These threats can be divided into.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 18 “Computer and Network Security Threats”.
Data and Computer Communications
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Ola Flygt Växjö University, Sweden Malicious Software.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Data Security and Encryption (CSE348) 1. Lecture # 27 2.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Fundamentals of The Internet Learning outcomes After this session, you should be able to: Identify the threat of intruders in systems and networks and.
VIRUSES - Janhavi Naik. Overview Structure Classification Categories.
Structure Classifications &
1 Chapter 19: Malicious Software Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal, U of Kentucky)
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CSCE 522 Lecture 12 Program Security Malicious Code.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
29.1 Lecture 29 Security I Based on the Silberschatz & Galvin’s slides And Stallings’ slides.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
CSCE 522 Lecture 12 Program Security Malicious Code.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Program Security Malicious Code Program Security Malicious Code.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Viruses a piece of self-replicating code attached to some other code – cf biological virus both propagates itself & carries a payload – carries code to.
Malicious Software.
VIRUS.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
1 Security Chapter Information Assurance and Security Confidentiality  Not available or visible to unauthorized parties Integrity  Only modifiable.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
MALWARE.
LECTURE 6 MALICIOUS SOFTWARE
Lecture 8. Cyber Security, Ethics and Trust
Viruses and Other Malicious Content
Chap 10 Malicious Software.
Malicious Software Network security Master:Mr jangjou
Chapter 22: Malicious Logic
Chap 10 Malicious Software.
Malicious Software Slide Set #5 Textbook Chapter 6 Clicker Questions
Presentation transcript:

Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles, 6/E William Stallings

Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity Availabilty

The Security Requirements Triad

Additional Concepts Authenticity Accountability

Threats

Scope of System Security

Assets

Intruders Masquerader Misfeasor Clandestine user

Intruders

Backdoor Trapdoor Secret entry point Useful for programmers debuggin

Logic Bomb Explodes when certain conditions are met –Presence or absence of certain files –Particular day of the week –Particular user running application

Trojan Horse Useful program that contains hidden code that when invoked performs some unwanted or harmful function Can be used to accomplish functions indirectly that an unauthorized user could not accomplish directly –User may set file permission so everyone has access

Mobile Code Transmitted from remote system to local system Executed on local system without the user’s explicit instruction

Multiple-Threat Malware Multipartite virus infects in multiple ways Blended attack uses multiple methods Ex: Nimda has worm, virus, and mobile code characteristics

Parts of Virus Infection mechanism Trigger Payload

Virus Stages Dormant phase –Virus is idle Propagation phase –Virus places an identical copy of itself into other programs or into certain system areas on the disk 21

Virus Stages Triggering phase –Virus is activated to perform the function for which it was intended –Caused by a variety of system events Execution phase –Function is performed 22

Simple Virus

Compression Virus

Virus Classification by Target Boot sector infector File infector Macro virus

Virus Classification by Concealment Strategy Encrypted virus –Random encryption key encrypts remainder of virus Stealth virus –Hides itself from detection of antivirus software

Virus Classification by Concealment Strategy Polymorphic virus –Mutates with every infection Metamorphic virus –Mutates with every infection –Rewrites itself completely after every iteration

Macro Viruses Platform independent –Most infect Microsoft Word documents Infect documents, not executable portions of code Easily spread File system access controls are of limited use in preventing spread 28

Viruses Attachment Open Uses software to replicate

Worms Use network connections to spread form system to system Electronic mail facility –A worm mails a copy of itself to other systems 30

Worms Remote execution capability –A worm executes a copy of itself on another system Remote log-in capability –A worm logs on to a remote system as a user and then uses commands to copy itself from one system to the other

Worm Propagation Model

Bots Zombie or drone Program secretly takes of another Internet-attached computer Launch attacks that are difficult to trace to bot’s creator Collection of bots is a botnet

Rootkit Set of programs installed on a system to maintain administrator (or root) access to that system Hides its existece

System Call Table Modification by Rootkit