Security: Attacks. 2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc.

Slides:



Advertisements
Similar presentations
Presented by: Melissa Dark CERIAS, Purdue University.
Advertisements

Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Unit 18 Data Security 1.
Exploits Dalia Solomon. Categories Trojan Horse Attacks Trojan Horse Attacks Smurf Attack Smurf Attack Port Scan Port Scan Buffer Overflow Buffer Overflow.
Trojan Horse Program Presented by : Lori Agrawal.
Silberschatz, Galvin and Gagne  Operating System Concepts The Security Problem A system is secure iff its resources are used and accessed as.
1 Protection Protection = access control Goals of protection Protecting general objects Example: file protection in Linux.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
1 Protection and Security Protection = mechanisms used to control access to valued resources: e.g., programs & data stored on computer system. Usually.
Nasca Internet Networking and Security viruses.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
Privacy - not readable Permanent - not alterable (can't edit, delete) Reliable - (changes detectable) But the data must be accessible to persons authorized.
Viruses, Malicious Code, & Other Nasty Stuff Presented by: Melissa Dark K-12 Outreach Coordinator CERIAS, Purdue University
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
Protection and Security CSCI 444/544 Operating Systems Fall 2008.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
VIRUSES and DESTRUCTIVE PROGRAMS
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Security CS Introduction to Operating Systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
4061 Session 26 (4/19). Today Network security Sockets: building a server.
Malicious Software.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
MALICIOUS SOFTWARE Rishu sihotra TE Computer
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Operating Systems Services provided on internet
Viruses and Other Malicious Content
Viruses, Malicious Code, & Other Nasty Stuff
Computer Viruses.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Viruses.
Security.
Chap 10 Malicious Software.
Operating System Concepts
Presentation transcript:

Security: Attacks

2 Trojan Horse Malicious program disguised as an innocent one –Could modify/delete user’s file, send important info to cracker, etc The program has to get to the computer somehow –Cracker hides it as a new game, e-card, windows update site, etc. When run, Trojan Horse executes with user’s privileges Examples: –Hide program in path directory as a common typo: la for ls –Malicious user puts malicious ls in directory, and attracts superuser Malicious ls could make user the superuser Denning’s paper 1999

3 Login Spoofing Specialized case of Trojan Horse –Attacker displays a custom screen that user thinks belong to the system –User responds by typing in user name and password –Can be circumvented by key sequence that user programs cannot catch: e.g. CTRL+ALT+DEL in Windows

4 Logic Bombs Piece of code, in the OS or app, which is dormant until a certain time has elapsed or event has occurred –Event could be missing employee record from payroll Could act as a Trojan Horse/virus once triggered Also called “slag code” or “time bomb” Recovery options for a firm include: –Calling the police –Rehiring the programmer

5 Trap Doors Code in system inserted by programmer to bypass normal check Ken Thompson “Reflections on Trusting Trust” –Hole in UNIX system utility; enforced by C compiler

6 Buffer Overflow C compiler does no array bounds checking –A number of programs a written in C –Cracker can force his routine to run by violating array bounds

7 Viruses and Worms Virus is a program that reproduces itself by attaching its code to another program –They require human intervention to spread –Melissa, I LOVE YOU spread by Worms actively replicate without a helper program –Is a subclass of virus, but does not require user intervention –Sasser and Blaster targeted machines with out of date software

8 Denial of Service Client sends a legitimate-looking request for service to a service provider Service provider commits the necessary resources to provide the service –Ports, buffer space, bandwidth The resources are wasted, legitimate users get diminished service –Usually launched from many computers controlled by attackers Possible whenever the cost to ask for service is far cheaper than the cost of providing it –Challenge-response mechanism, selective packet tagging

9 Other Network Attacks Protocol attacks: –E.g. IEEE WEP Brute force attacks Use Network Firewalls to reduce security risk