CS682 – Session 8 Prof. Katz. Virus Warning DO NOT OPEN "NEW PICTURES OF FAMILY" It is a virus that will erase your whole "C" drive. It will come to you.

Slides:



Advertisements
Similar presentations
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 8. Supporting Software 1 Software Compatibility Whether you are doing a fresh.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
BIOMETRIC VOTING SYSTEM
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Biometrics and Authentication Shivani Kirubanandan.
VIRUS Jan Damsgaard Dept. of Informatics Copenhagen Business School
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Authentication Approaches over Internet Jia Li
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
D. Beecroft Fremont High School VIRUSES.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line Trend Micro Confidential 1 Virus/ Trojans/ Worms etc and some Common issues.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
 The advancement of science and technology is directly proportional to the advancement of time.  As we are swimming in the current of time we are gradually.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Computer Viruses Susan Rascati CS30 Section 11 George Washington University.
Malicious Code By Diana Peng. What is Malicious Code? Unanticipated or undesired effects in programs/program parts, caused by an agent with damaging intentions.
Lecture 7 Page 1 CS 236 Online Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know The.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Lecture 7 Page 1 CS 236, Spring 2008 Challenge/Response Authentication Authentication by what questions you can answer correctly –Again, by what you know.
Biometrics Authentication Technology
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Networking Network Classification, by there: 3 Security And Communications software.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
What does it mean to us?.  History  Biometrics Defined  Modern Day Applications  Spoofing  Future of Biometrics.
Information Systems Design and Development Security Precautions Computing Science.
An Introduction to Biometrics
SYSTEM SECURITY & ANTIVIRUS Chapter - 4 1Dr. BALAMURUGAN MUTHURAMAN.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Challenge/Response Authentication
Technical Implementation: Security Risks
Challenge/Response Authentication
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
G061 - Network Security.
Presentation transcript:

CS682 – Session 8 Prof. Katz

Virus Warning DO NOT OPEN "NEW PICTURES OF FAMILY" It is a virus that will erase your whole "C" drive. It will come to you in the form of an from a familiar person. I repeat a friend sent it to me, but called & warned me before I opened it.He was not so lucky and now he cant even start his computer! Forward this to everyone in your address book. I would rather receive this 25 times than not at all. Also: Intel announced that a new and very destructive virus was discovered recently. If you receive an called "FAMILY PICTURES," do not open it. Delete it right away! This virus removes all dynamic link libraries (.dll files) from your computer. Your computer will not be able to boot up.

Virus Dear Friends, We have been unwittingly just infected with a virus from someone's . THIS Klez Worm VIRUS SENDS ITSELF TO ALL THE ADDRESSES IN THE ADDRESS BOOK OF THE COMPUTER IT HAS ARRIVED AT. Take the time and remove it now. The instructions are easy and I got rid of it in a few minutes. Some versions of anti virus software including Norton and Inoculate T have not been able to detect it. It is said that the virus HIDES in the computer for 2 weeks and then DAMAGES THE DISC IRREPARABLY. The virus is called sulfnbk.exe Many apologies for the trouble it is causing. 1. Go to "Start" and click on "Find" 2. In the box, "find files or folders" type in sulfnbk.exe (the name of the virus) 3. Make sure you are searching in the C-drive (check in the box marked "Search in") 4. Click on Find 5. If the file is found you will find an ugly black icon with the name sulfnbk.exe This file is a program. DO NOT OPEN IT !!!!!! 6. Click on the RIGHT button of the mouse, on the file name, and then click on DELETE with the LEFT BUTTON OF THE MOUSE. 7. You will be asked to send this file to the recycle bin or wastebasket---respond YES 8. Open the recycle bin and eliminate the file, manually or by emptying the entire recycle bin or wastebasket. 9. If you do find this virus in your computer, send this to all the people in your address book because the virus is transmitted in this way. (Even if you don't find the virus, you should probably still send this to all your addresses) 10. I thought this was a joke at first but it is not and we found the ugly icon when we followed the above directions. Good luck.

Virii Computer virii are as old as computers themselves Originally written as a “Proof of concept” Competitions were created There are now almost 60,000 known virii

Propagation methods Manual – User Intervention required – Either with or without user intervention Physical – Via infected media Network – usually RPC or SMB protocols

Different Flavors Hoaxes Infectious Worms Trojans

Hoaxes Generally try to convince the user of some believable event Most commonly in the form of messages (e.g. government bill to charge for usage) (Unfortunately) Cannot be stopped by software

Protecting against Hoaxes Check one of the following sites:

Types of Infectious virii Master Boot Record File infection Macro

MBR Infections Require physical transfer of a disk from one computer to another They will overwrite a portion of the Master Boot Record on the host to become active in memory each time the computer restarts Future accesses through BIOS calls to the floppy disk will result in infections

File Infection Usually Executable files Infection will usually result in overwriting/rewriting the command.com, autoexec.bat or adding a registry key to HKLM/Software/Microsoft/Windows/Current Version/Run. These virii are usually passed manually or physically, rarely are they by Sometimes benign

Macro virii Application specific usually.wp or.doc These will usually contain some VB Code to do harm to the host or otherwise infect it. Common propagation includes modifying normal.dat so that every word document the user creates is infected

Now the most common (and rapidly propagating) virii Sometimes application specific (usually to MS Outlook) otherwise classified as trojan Examples: KakWorm, Happy99, Melissa

Worms Originally named for the way a Xerox memory print-out looked when infected Self-replicating Usually is a classification of an infection virii

Trojans Users are coerced into activating these virii Can do anything from provide remote control of the system to cause worm- like infection E.g. Trinn, Back Orifice, Love Letter

Biometric Authentication

Authentication using measurable physiological and/or behavioral characteristics Replacements to Username/Password combinations

Problems with U/P authentication Users frequently document their password Loss of the password requires administrative intervention “Passing” of the password become frequent

Biometric advantages Authentication is by a combination of what you know and what you are “Passing” what you are is difficult or impossible Impersonation becomes an impossibility Indirect Advantages Can test medical health with authentication Using centralized database can authorize/unauthorize people very quickly

Biometric Template storage At the authentication point Central Repository On a portable token with the user

Biometric types Fingerprint Hand Geometry Voice Recognition Retinal Scanning Iris Scanning Signature Facial Recognition

Fingerprint 12 or more points on the finger are scanned for a match Gaining popularity, low cost easy to implement  Cuts or dirt can cause false rejects  Intruders can obtain fingerprints from anything the authentic user has touched  Digits are easily removed from the body

Hand Geometry Physical characteristics of the hand are measured False reject rate (FRR) is very low Popularity means low cost  Requires a scanner large enough for the hand

Voice Recognition A line of text is read, key points are compared to a baseline sample Users like the idea of talking to computers  Background noise, anxiety and the common cold can cause a failure  Large storage space required for the template

Retinal Scanning The inside of the eye contains blood vessels which form in a unique way for each individual Very accurate Almost impossible to steal  Users will not like being shot with a laser  Medical problems may inhibit authentication

Iris Scanning Scans the random pattern of the iris Overcomes many of the problems of Retinal scanners Almost impossible to steal  Users don’t trust the safety of the cameras

Signature Verification The user’s signature is compared with a baseline sample User’s feel comfortable Inexpensive  High failure rate  Easy to steal

Facial recognition Distance from a midline to key points on the face is measured Inexpensive No contact with the device  Background “noise” can cause problems  Immature technology

Problems with Biometrics Passwords cannot be changed once they are compromised Identical Twins will have the same biometric readings Most solutions don’t eliminate the possibility of theft