電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
電腦攻擊與防禦 The Attack and Defense of Computers
現代作業系統核心 Modern Operating System Kernels
Welcome to EECS 354 Network Penetration and Security.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Advanced Computer Networks Fall 2010 Instructor: Haining Wang.
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Process Coloring: an Information Flow-Preserving Approach to Malware Investigation Eugene Spafford, Dongyan Xu (Presenter) Department of Computer Science.
作業系統解譯器之計算理論 Computation Theory of Operating System Interpreter CE6114許富皓.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Computing Security Paul Wagner Department of Computer Science.
Securing Information Systems
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
1 Computer Engineering Department Islamic University of Gaza ECOM 6321 Network Security Spring (Graduate course) Lecture 1 Syllabus.
TCP/IP Malicious Packet Detection (SQL Injection Detection) Ashok Parchuri.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2015.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
Lesson 5 Knowing the Threat. Unauthorized use of Computer Systems 2000 CSI/FBI Survey Trend.
CSCE 548 Secure Software Development Final Exam – Review.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
Return to the PC Security web page Lesson 5: Dealing with Malware.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.
Advanced Computer and Network Security Fall 2014 Instructor: Haining Wang.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Changes in Computer Security Will You Be Better Off?
Business Technology Applications What is Malware.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2009.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Computer Security Revision Week
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
MALWARE Autumn Mattis.
Epidemic spreading in complex networks with degree correlations
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
Security of web applications.
SEC 420 StrCompetitive Success/tutorialrank.com
CS/IS 196 Final Exam Review
Course Information Teacher: Cliff Zou Office: HEC
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Presentation transcript:

電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓

Reference Books Hacking Exposed, Fifth Edition Hacking Exposed, Fifth Edition –Authors: Stuart McClure, Joel Scambray, and George Kurtz –Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Practical Unix & Internet Security, 3rd Edition –Authors: Simson Garfinkel and Gene Spafford –Publisher: O Reilly

Contents: Footprinting Footprinting Scanning Scanning Enumeration Enumeration Port-Scanning Port-Scanning OS fingerprinting. OS fingerprinting. Hacking Unix Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Internet Worm Format String Attacks Format String Attacks Input Validation Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks Integer Overflow and Integer Sign Attacks TCP session Hijackng TCP session Hijackng Denial of Service Attacks/Distributed DoS Denial of Service Attacks/Distributed DoS Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Cross Site Script (XSS) Cross Site Script (XSS) SQL Injection SQL Injection

Important Security Conferences: IEEE Symposium on Security and Privacy IEEE Symposium on Security and Privacy USENIX Security Symposium ACM Conference on Computer and Communications Security (CCS) USENIX Security Symposium ACM Conference on Computer and Communications Security (CCS) International Symposium on Recent Advances in Intrusion Detection (RAID) International Symposium on Recent Advances in Intrusion Detection (RAID) Sigcomm ( Sigcomm ( Infocom ( Infocom (

Grading: Midterm 25% Midterm 25% Final 40% Final 40% Assignment 30% Assignment 30% Attendance: 5% Attendance: 5%