電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.

Slides:



Advertisements
Similar presentations
Webgoat.
Advertisements

Network Security Attack Analysis. cs490ns - cotter2 Outline Types of Attacks Vulnerabilities Exploited Network Attack Phases Attack Detection Tools.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Define and identify unethical practices such as hacking, phone fraud, online piracy, cyberstalking, and data vandalism. Use of employer’s computers for.
電腦攻擊與防禦 The Attack and Defense of Computers
現代作業系統核心 Modern Operating System Kernels
Welcome to EECS 354 Network Penetration and Security.
Information Networking Security and Assurance Lab National Chung Cheng University 1 Top Vulnerabilities in Web Applications (I) Unvalidated Input:  Information.
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
Hacking and Network Defense. Introduction  With the media attention covering security breaches at even the most tightly controlled organization, it is.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
作業系統解譯器之計算理論 Computation Theory of Operating System Interpreter CE6114許富皓.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Securing Information Systems
CSC 386 – Computer Security Scott Heggen. Agenda Introduction to Software Security.
Mobile Operating System Security A PRESENTATION BY DANIEL ADAMS CSC 345 DR. BOX.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Ladd Van Tol Senior Software Engineer Security on the Web Part One - Vulnerabilities.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2015.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Watchfire AppScan Web Application Security Software Omen Wild September 2007.
Network Security by Behzad Akbari Spring 2012 In the Name of the Most High.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
© 1999 Ernst & Young LLP e e treme hacking Black Hat 1999 Over the Router, Through the Firewall, to Grandma’s House We Go George Kurtz & Eric Schultze.
Return to the PC Security web page Lesson 5: Dealing with Malware.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2010.
COMPUTER SECURITY MIDTERM REVIEW CS161 University of California BerkeleyApril 4, 2012.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
# Ethical Hacking. 2 # Ethical Hacking - ? Why – Ethical Hacking ? Ethical Hacking - Process Ethical Hacking – Commandments Reporting.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2013.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Input Validation – common associated risks  ______________ user input controls SQL statements ultimately executed by a database server
Middleware Vulnerabilities Damian Tamayo Kansas State University MSE 2 nd Semester.
Cloud = Web, Web = Hacked! Fabio Viggiani. Why Web Apps? Every organization exposes web apps Most common entry point Image source:
1 C12 - March 19, 2008 Business 54 - Introduction to eCommerce Spring 2008 C12 - March 19, 2008.
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Changes in Computer Security Will You Be Better Off?
Business Technology Applications What is Malware.
Network Reconnaissance CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
CAP6135: Malware and Software Vulnerability Analysis Cliff Zou Spring 2009.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 3 Network Security Threats Chapter 4.
Example – SQL Injection MySQL & PHP code: // The next instruction prompts the user is to supply an ID $personID = getIDstringFromUser(); $sqlQuery = "SELECT.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
Attack Methods  Attacks  DoS (Denial of Service)  Malware.
ARF DEFENSE OFFICIALS' DIALOGUE 13TH ARF SECURITY POLICY CONFERENCE REGIONAL CYBER SECURITY CHALLENGES DIR. NEBUCHADNEZZAR ALEJANDRINO CHIEF, CYBERSECURITY.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Mark Ryan Professor of Computer Security 25 November 2009
Computer Security Revision Week
Web Application Vulnerabilities, Detection Mechanisms, and Defenses
Example – SQL Injection
The Security Problem Security must consider external environment of the system, and protect it from: unauthorized access. malicious modification or destruction.
OPERATING SYSTEMS CS 3502 Fall 2017
Security of web applications.
Web Application Security Testing Checklist Attributable to the broad measure of information put away in web applications and increment in the number of.
CompTIA Security+ Study Guide (SY0-501)
Course Information Teacher: Cliff Zou Office: HEC
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Security: Attacks & Countermeasures
Presentation transcript:

電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓

Reference Books Hacking Exposed, Fifth Edition Hacking Exposed, Fifth Edition –Authors: Stuart McClure, Joel Scambray, and George Kurtz –Publisher: Mc Graw Hill Practical Unix & Internet Security, 3rd Edition Practical Unix & Internet Security, 3rd Edition –Authors: Simson Garfinkel and Gene Spafford –Publisher: O Reilly

Contents: Footprinting Footprinting Scanning Scanning Enumeration Enumeration Port-Scanning Port-Scanning OS fingerprinting. OS fingerprinting. Hacking Unix Hacking Unix Buffer Overflow Attacks/Return Into Libc Attacks Buffer Overflow Attacks/Return Into Libc Attacks Internet Worm Internet Worm Format String Attacks Format String Attacks Input Validation Attacks Input Validation Attacks Integer Overflow and Integer Sign Attacks Integer Overflow and Integer Sign Attacks TCP session Hijackng TCP session Hijackng Denial of Service Attacks/Distributed DoS Denial of Service Attacks/Distributed DoS Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Malware: Virus, Trojan Horse, Spyware, Rootkit, Dialer, Key logger Cross Site Script (XSS) Cross Site Script (XSS) SQL Injection SQL Injection

Important Security ConferencesImportant Security Conferences: Important Security Conferences

Grading: Midterm 30% Midterm 30% Final 35% Final 35% Assignment 30% Assignment 30% Attendance: 5% Attendance: 5%