Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Security. Physical security Protection from fire/water Protection from dust and extremes of temperature.
1 Computer Security: Protect your PC and Protect Yourself.
Viruses, Worms and Spam Definitions Virus - unauthorized software, embedded in other programs and with the ability to propagate when the host program is.
What is it, how does it work, and why is it important?
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
eScan Total Security Suite with Cloud Security
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
©2003 CNET Networks, Inc. All rights reserved. Virus Basics Created by: Robert L. Bogue, MCSE: Security, etc. Crowe Chizek.
Malware: Defenses. Kinds of malware Viruses  Macro Viruses  Memory-resident viruses  File infector viruses  Boot Viruses  Trojan Horses  Hoaxes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
1 Wireless Threats 4 – Airborne Viruses Airborne Viruses in Chapter 8 of Wireless Maximum Security by Peikari, C. and Fogie, S.
Configuring Electronic Health Records Privacy and Security in the US Lecture f This material (Comp11_Unit7f) was developed by Oregon Health & Science University,
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Types of Electronic Infection
Recent Internet Viruses & Worms By Doppalapudi Raghu.
COMPUTER VIRUS.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Venugopal reddy 07R91A05b7.  Computer virus have become today’s headline news  With the increasing use of the Internet, it has become easier for virus.
bitdefender virus protection
TMG Client Protection 6NPS – Session 7.
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Information Security Session October 24, 2005
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
Presentation transcript:

Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University

The Threat v Computers are under attach more than ever before v As computer operating systems become more powerful, they also become more vulnerable v Original Viruses were transmitted by files and diskettes v Macro viruses are cross platform

The Threat... v Most current viruses transmitted by v Mail attachments common vehicles v Some viruses live within message body v Scripting engines are vulnerable

What is a virus v Transmit v Replicate v Attack v Mutate

Major virus outbreaks v 1980’s: attacks begin on COM, EXE, boot sectors –Jerusalemz (Friday the 13th) –AIDS (trojan) v 1988: Internet worm v 1992: Michelangelo v 1994 Good Times hoax v 1996 Concept (Macro virus)

...Major Virus outbreaks v 1998: Chernobyl/CIH (activates v 1998: Chernobyl/CIH (activates 26th of April) v 1999: Melissa (Macro virus/propagates through Outlook) v 2000: ILOVEYOU, Stages (VBX) v 2000: Phage; Vapor: Palm Virus

Observations v Over 50,000 viruses and variants v Major outbreaks more frequent v Microsoft products targeted v Fast propagation through v Very complex to manage: e.g. Microsoft

Trends v Current generation requires active role by user v Emerging viruses: passive victim v Future/present concern for wireless devices v Wider range of targets: Computers, PDA, Cell Phones

Anti-virus solutions v User behavior v Technical

The #1 Anti-virus strategy involves human behavior v Be aware and cautious v Train computer users to be wary v Never access files from an unchecked disk –any removable media v Do not download software from untrusted sources v Know the true source of all software

Be careful with v Don’t open obviously suspicious messages v Don’t open attachments unless you know the sender and are expecting that specific attachment v Ensure that your mail client displays extensions of attachments –Avoid: VBX, EXE, v Never send attachments from listserves v Never open attachments from listserves

What users should do when a virus is found or suspected v Notify system administrator v Don’t panic v Don’t restart computer v Don’t send spam warnings

Technical solutions

Implement a multi-layer approach v Desktop: dynamic inspection, regular scanning v Network Server v Mail scanning/interception

Anvi-virus Architecture Mail Serve r Local Network INTERNET Firewall File Server Dynamic Scan-on-access File Scanning Desktop Computers Mail Scanning Current Virus Signatures Regular scanning of Disks

Desktop layer v Inspect files on access v Regularly scan all permanent disks v Scan all removable media with each use v Regularly update virus signature database

Desktop Anti-virus software v Norton Anti Virus v McAfee ActiveShield v Command Anti-Virus (was Fprot) v Data Fellows F-Secure v Dr. Solomons Anti-Virus

Network Fileserver layer v Regularly scan all disk volumes v Shared folders easily missed by desktop scanning

scanning v Inspect incoming messages v Inspect outgoing messages v Inspect messages from one local user to another within mail system

Scanning software v Trend Micro Virus Wall v Sybari Antigen

Virus signature database v the key to the current generation of anti- virus software v must be current v can’t be current enough

Firewalls v Part of a general computer security plan, but also helpful with viruses v Institutional firewalls imperative –CheckPoint FireWall-1 v Consider personal/workstation-level firewalls –BlackIce –ZoneAlarm

What software should do when it detects a virus v clean file/message when possible v remove if it can’t be cleaned v warn system administrator v warn recipient v warn sender

Need to identify the signature of each virus –distinguish malicious items v Original products scanned after the fact v Scanning of files as they are accessed

Mitigate vulnerability v Avoid being logged in with workstation/network administrative rights v Minimize the number of network drives mapped at any given time –Web document directories –shared network drives v Turn off features not needed: –e.g. Windows Scripting Host from –Do we need support for VBX or JavaScript in ?

Web-oriented vulnerabilities v Java applets v Active-X

More advanced anti-virus software v rely less on specific virus signatures v rely more on trapping unwanted behaviour

Future expectations v No end in sight v The world is becoming more dangerous v Enormous dependence on commercial anti- virus applications v Future computer OS will be designed to be less vulnerable...