Slide 1 By: Date: 09/03/2003 Info Security Writing and Rootkits.

Slides:



Advertisements
Similar presentations
RULES FOR APA WRITING Used with permission from: John R. Slate, Ph.D.
Advertisements

PhD Seminar Hints on Writing (C) Common Mistakes From My Graduate Students Jeff Offutt
Your Users, Friend or Foe? Matthew Sullivan IT Security Manager, the University of Canberra Creator, the Spam and Open Relay Blocking System (SORBS)
(It’s not that bad…). Error ID  They give you a sentence  Four sections are underlined  E is ALWAYS “No error”  Your job is to identify which one,
 Before you submit your paper, check these things.
Informationive Report. Definition:  A report where only facts are given; no conclusions; no recommendations  A summary is often included at the end.
Chapter 4 Basics of English Grammar
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
EE 399 Lecture 2 (a) Guidelines To Good Writing. Contents Basic Steps Toward Good Writing. Developing an Outline: Outline Benefits. Initial Development.
Science-terrific Writing. Swim against the current In direct opposition to everything your high school teacher and probably your college English professor.
Basic Five-Paragraph Essay
Berryman Essay Revising and Editing. First Things First! Heading should have: – Your name – Instructor’s name – Class name – Assignment name – Date –
WEEK 6, 7, 8, 9 AND 10 Journalism 1. Bell work ALL ALL bell work from (Bell work # 11) this point forward will be hand written in class in the students.
WARNING! Sample chapter -Materials in this sample chapter is selected advanced penetration from
Revising and Editing Checklist - Review
1 Business Writing in a Technical Environment Prepared by Graham Associates copyright 2002 copyright © 2002.
 SAT Question of the Day #13  Unit Three  Activity 3.3 p. 179  Activity 3.2 p. 173  Exit Slip: Exercising My Five Freedoms handout OBJECTIVES: Students.
Proofreading & Revising
2. Phrases / Agreement. Phrases A phrase is a group of words that cannot stand alone as a sentence. Unlike the clause, a phrase does not have a subject-verb.
RAA Website Training Initial Operations & Meetings Management.
BIT 115: Introduction To Programming1 Sit in front of a computer Log in –Username: 230class –password: –domain: student Bring up the course web.
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Fall 2006 RULES FOR APA WRITING Used with permission from: John R. Slate, Ph.D.
Computer-Assisted Communication
My Argument Essay-- What is it & How do I write it??
Pronouns Cano. A pronoun replaces a noun. We call the word being replaced by the pronoun the antecedent. In the following sentence, keys is the antecedent.
*You have 25 minutes to write the essay. *You will be provided with a short excerpt and will be asked to present your views on the subject.
ENG 102 CI Research Paper Self Check. You are going through this power point on your own. At this point you will get out of this self edit experience.
USE PROPER HEADING Name Date Period Title of Assignment Centered (Don’t underline your own title) DO NOT CENTER YOUR PAPER! USE FAR LEFT AND RIGHT MARGINS.
I-Search Paper Purpose You will be writing a personal research paper, sometimes called an I-Search paper. You will pick a subject to which you have a personal.
Basic Outline The basic structure of informative and research writing consists of:  Cover Page  Introduction  Body  Summary  Reference Page.
What is the phenomenon? How is it different & similar to another phenomenon? When is it exhibited vs. not? Why? Why is it true vs. not ? What explains.
Diagnostic Pathfinder for Instructors. Diagnostic Pathfinder Local File vs. Database Normal operations Expert operations Admin operations.
ENGLISH. PUNCTUATION Apostrophes Commas Semi-colons GRAMMAR Subject-Verb Agreement Verb Tense Pronoun – Antecedent Agreement Subject – Object Pronouns.
English 28: Last Class Class Reflection PLO Survey Discussing the Final Exam.
Unit 9: Distributing Computing & Networking Kaplan University 1.
Teaching: the journey so far 04/19/02. testing standardized vs other tests norm-referenced vs criterion referenced tests –norm: test designed so that.
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Informative Paragraph Writing 101
Pronouns Pronouns are used in place of nouns, mostly to avoid repetition. Personal pronouns – refer to particular people: I, you, us. Impersonal pronouns.
Writing To Be Awesome. First things first… Our focus: expository. What is expository writing? Expository writing is the key to all other types of writing.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Paper Issues. Do not put the in-text citation information in the References Cited; it is only for the text itself. Keep the focus on EMIC voices and differences.
SENIOR PAPER Writing Issues. SPACING ERRORS SPACING Make sure your essay is properly spaced! There should not be any extra spaces in between paragraphs.
EmPOWER Your writing!!!!!!!!!!!!. What does EmPOWER stand for? E- Evaluate mP- Make a Plan O- Organize W- Write E- Edit R- Re-write.
Switchvox SMB 4.6 for your peace of mind
Subject–verb Pronoun–antecedent DATA is a Plural word
What they are and how to protect against them
Writing a Critical Summary of an Article or Paper
REPORT WRITING.
Science-terrific Writing
Q023 This diner used to give its employees a free meal. Now everyone must steal what they want to eat. Change ... used > use its > their everyone > workers.
Unit 11 Communication & Collaboration
Introduction to Networking
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Hints on Writing (C) Common Mistakes From My Graduate Students
Administering Your Network
GEE’S Writing RULES.
Cornell Notes Note-taking strategy that will
BIT 115: Introduction To Programming
Use these guidelines to make any final edits to your argumentative
BSc Semester IV Communication Skills.
What’s the difference between Editing, Revising, and Proofreading?
Research Paper Step-by-step Process.
Friday, June 10th Hello, future of humanity!
Editing Process: English 10 Spoken Language
HSP3 Grammar Review By: [Insert your name].
Presentation transcript:

Slide 1 By: Date: 09/03/2003 Info Security Writing and Rootkits.

Slide 2 By: Date: 09/03/2003 Admin Papers Topic Main: Phil Backup: John One from me gee htm Class times and finals schedule.

Slide 3 By: Date: 09/03/2003 Papers Section headings Longer paper, use section headings. Look at the assignment, several sections required. For related work section Start new paragraph for each complete experiment that you describe. When describing work Use names, not “a journalist” or “a person”, “a magazine” Instead “Sam Smith showed...” “Chavez at security.com did an...”

Slide 4 By: Date: 09/03/2003 Mass vs Count again Most modifies Plural nouns or mass nouns The most chickens The most money Largest Singular nouns Largest chicken Largest amount. Largest portion.

Slide 5 By: Date: 09/03/2003 Reminders A few repeat reminders Avoid the passive!! Sometimes it can't be helped, but a half dozen times in a paper this short should raise alarm bells. Subject verb agreement Make sure antecedents of all pronouns are clear ';' separates two closely related sentences Be careful of simile and metaphor A outscored B No feelings Rarely does it matter what you feel, but what you believe

Slide 6 By: Date: 09/03/2003 Next Draft Have a section for each of the sections listed in the assignment. (first person ok) Intro Talk about spam, where it comes from its problems etc. Related work Describe at least two other experiments (with two citations) Experiment Describe the experiment setup. (not the results) Use past tense next time (you did this already) Results Talk about the spam you received and where and when

Slide 7 By: Date: 09/03/2003 Next Draft II Discuss results Analyze what it means What does it mean that address 3 got more spam? Conclusion Summarize, why is spam bad, results and implications for experiment Any future work that seems immediately indicated. I've made copies so improve your work.

Slide 8 By: Date: 09/03/2003 Rootkits Definition: Trojan horse backdoor tools that modify existing operating system software so that an attacker can hide on a machine and keep access to it. (skoudis) Note difference from everything that we've looked at thus far: Other software inserts itself in addition to existing software Rootkits replace parts.

Slide 9 By: Date: 09/03/2003 Rootkits Disguised to look like normal parts of the system Replace dir command from dos for example. Generally new version do not write to log files Most administrative actions logged Network connections logged too. Two types: Usermode (replace programs that users use) Kernal mode (modifies the heart of the operating system) Don't give admin access hide the fact that attacker has it

Slide 10 By: Date: 09/03/2003 MSWindows RootKit Example FakeGINA User mode rootkit Used to logon to windows Intercepts username, domain, password from winNT/200 machines

Slide 11 By: Date: 09/03/2003 Windows File protection Replaces any modified versions of a system program Does so transparently What are the implications? Why is fakeGina not affected?

Slide 12 By: Date: 09/03/2003 More Next Monday Have a good Thanksgiving.