From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
24/7/365 Remote Computer Support. Program Overview.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
By, Anish Shanmugasundaram Yashwanth Sainath Jammi.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Unit 19 INTERNET SECURITY
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Online Game Trojan SecurityLabs.websense.com Hermes Li.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Safety and Security issues of using ICT Alys brooks.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
What is Spam? d min.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Trend Micro Consumer 2010 Easy. Fast. Smart.
Common Methods Used to Commit Computer Crimes
3.6 Fundamentals of cyber security
Malware aka- malicious software By: Ken Fogel
Challenges We Face On the Internet
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Introduction-Cyber Safety
Presentation transcript:

From AV to Internetized Security Solution 马杰 Jeffrey Beijing Rising Tech. Co., Ltd. --- The Analysis Report of Malware Technology in China in 2005

Travel

Agenda Background –Overview of the security industry –Overview situation of viruses and spam Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

Internet Statistics Data from: CNNIC

Security Industry Revenue Data from: CCID Consulting

Product Dispersal Data from: CCID Consulting

AV Market Share Distribution Data from: IDC 2005

Agenda Background –Overview of the security industry –Overview situation of viruses and spam Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

Virus Statistics new definitions added to virus database –From Jan. 1 st to Nov. 15 th, 2005 Data from: RISING

Most Active Top 10 Data from: RISING

Top 10 Worst Spam Countries (Jan ) Top 10 Worst Spam CountriesNumber of Current Listed Spam Issues 1 United States China South Korea Brazil Canada Taiwan Russia Japan Argentina Italy 92

Top 10 Worst Spam Countries (Nov ) Top 10 Worst Spam CountriesNumber of Current Listed Spam Issues 1 United States China South Korea Russia Taiwan Japan Canada Brazil Hong Kong United Kingdom 98

Agenda Background –Overview of the security industry –Overview situation of viruses Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

Changes of the purpose of virus creation Gain economic benefits –Virtual property –Bank accounts Increase website hits Show off Skills Gain Economic Benefits

Viruses have an Economic Purposes Total: 4163 found till Nov. 15th, 2005 Economic Purpose Numbers of viruses Stealing online game passwords2763 Bring more Page Views to websites967 Stealing QQ (or MSN) Passwords427 Stealing online banking passwords6 Data from: RISING

Agenda Background –Overview of the security industry –Overview situation of viruses Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

Changes to Anti-Detection The economic benefits by improving anti- detection technology Methods used for anti-detection –Root Kit –Entry Point Obscuring –Source code level morphing

Root Kits Hooks Native API Hides Processes – ZwQuerySystemInformation() Hides Files – ZwQueryDirectoryFile() etc… Many Open Source Code

The Viruses Using Root Kit Technology CategoryAmount Hooking System Ring3 API191 Hooking System Ring0 API53 Patching Kernel81 Viruses using root kit technology found in 2005: 325 Data from: RISING

Agenda Background –Overview of the security industry –Overview situation of viruses Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

Other Threats Rogue software –Ad-ware –Spy-ware –Browser hijack and ActiveX controls –Track-ware –Malicious shareware –… Fishing etc…

Rogue software 22.72%22.72% 13.87%13.87% 19.53%19.53% 9.74%9.74% Data from: UNB

How Rogue Software Avoid Being Deleted? Make themselves automatically launch Install drivers to get a higher privilege Create mutually protecting threads Inject DLLs or threads into another process Rubbish Files

To remove or not to remove… It’s hard to make the decision. To remove : –Annoys the users. Not to remove : –Free –Provides some useful features.

Agenda Background –Overview of the security industry –Overview situation of viruses Changes of viruses –Changes of purpose –Changes if anti-detection Other threats on the internet –Unauthorized software (Rogue software) Summary

The situation of viruses in 2005 Economic purposes significantly lead to the increase of new viruses and virus technologies. Weaknesses of a system is the major reason of virus infection. Network is still the most commonly used media though which viruses spread. IM tools are utilized by viruses to spread over internet. New platforms are becoming the target of viruses –mobile phones –PDAs –and etc… Open source is still the origin of lots of viruses

Diary

Job

File System openomy project

earth

People Internetized A lot of things around us getting internetized –Job Web office Instance Message –Life Blog Online Game Online Movie

Threats Internetized Attack on internet Gain from internet Threat s

Protection Needs to be Internetized! Virus Spam Hack Spy-ware Browser hijack Fishing

Protect Users Online Security An internetized security solution provides: –Antivirus –Anti-spam –Firewall –Password protect –Anti browser hijack –Anti fishing

The Hardest Part I wish that I could work it out … Thank you!