Copyright, 1995-2006 1 The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.

Slides:



Advertisements
Similar presentations
© Ravi Sandhu Introduction to Information Security Ravi Sandhu.
Advertisements

Copyright Malware Categorisation in Support of Malware Policy Analysis Roger Clarke Xamax Consultancy, Canberra Visiting Professor, CLPC UNSW, and.
Copyright, Issues from Internet Technologies 2 – Apps for Collaboration & Subversion Roger Clarke, Xamax Consultancy, Canberra Visiting Prof/Fellow,
Copyright COMP 3410 – I.T. in Electronic Commerce eSecurity Malware and Other Attacks Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Computer Security What to Know and What to Do Presented to CUGG Jamie Leben IT-Works Computer Services
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Adware and Spyware. Objectives u Define terms, scope, and motivation u Discuss impact (personal and business) u Review basic technical aspects u Provide.
Copyright, Can Mobile Payments be 'Secure Enough'? Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in eCommerce at Uni of Hong.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Copyright COMP 2410 – Networked Information Systems SC2 – Malware and Other Attacks Roger Clarke Xamax Consultancy, Canberra Visiting Professor,
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
For any query mail to or BITS Pilani Lecture # 1.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
Malicious Software.
Computer Skills and Applications Computer Security.
Chapter 19 – Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature: Awaiting the blow. —On War,
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Mark Ryan Professor of Computer Security 25 November 2009
Managing Windows Security
Three Things About Malware
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
Lecture 8. Cyber Security, Ethics and Trust
Viruses and Other Malicious Content
Chap 10 Malicious Software.
The Internet of Unsecure Things
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Chap 10 Malicious Software.
Ch9 E-commerce Security
Test 3 review FTP & Cybersecurity
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce at Uni of Hong Kong, Computer Science at A.N.U. / EC/SecyMq-Malware.ppt LAW 868 – Electronic Commerce and the Law Macquarie University – 14 September 2006

Copyright, The Malware Menagerie Agenda Virus Worm Trojan Horse Spyware Bots / Robots / Agents Backdoor / Trapdoor Zombie Exploit Bug Phishing

Copyright, Infiltration by Software with a Payload Software (the Vector) Pre-Installed User-Installed Virus Worm... Payload Trojan: Undocumented Documented Spyware: Software Monitor Adware Keystroke Logger...

Copyright, Viruses and Worms A Virus is a block of code that inserts copies of itself into other programs. A virus generally carries a payload, which may have nuisance value, or serious consequences. To avoid early detection, viruses may delay the performance of functions other than replication A Worm is a program that propagates copies of itself over networks. It does not infect other programs. Viruses and Worms flourish because of: the naiveté of users inadequate care by some I.S. professionals OS and apps distributed in a culpably insecure state

Copyright, Trojan Horses A program that purports to perform a useful function (and may do so) but certainly performs malicious functions e.g. keystroke recorders embedded in utilities

Copyright, Spyware Software that surreptitiously: gathers data within a device e.g. about its user, or the uses made of it makes it available to some other party Key applications: keystroke loggers (esp. for passwords) monitoring of user behaviour for consumer marketing purposes (adware) monitoring of uses of copyright works (software, audio, video)

Copyright, Bots / Robots / Agents Software that interacts with other software or human users as though it were a human Web crawlers or spiders Re enquiries / requests / incident reports Auto-acknowledgement Auto-response Automated Trading Online Games

Copyright, Backdoors / Trapdoors Any planned means whereby a user can surreptitiously gain unauthorised access to an Internet node e.g. a feature of a package intended to enable maintenance programmers to gain access, or a feature added into a program by a virus

Copyright, Zombies A common use of Trojan Horses Establishes a large number of processors, scattered around the Internet, that are under central or timed control (hence zombies) These are referred to as a Botnet They can be used to: perform DDoS attacks send Spam

Copyright, Exploits An Exploit is an established way of performing an attack on a vulnerability Standard techniques are supported by established guidelines and programming code, which circulate on the Internet Code that enables easy performance of an exploit is expressed in a script Script Kiddies is a derogatory term for relatively unskilled crackers who rely on techniques and program code developed by others

Copyright, Bugs Errors in software (systems software esp. MS Windows) or applications (esp. MSIE) They may create vulnerabilities The vulnerabilities may be attacked by crackers This gives rise to the need for urgent patches AusCERT Security Alerts Commercial Services, e.g.

Copyright, Phishing Sending people messages in order to lure them into divulging sensitive data The data sought is commonly passwords and credit-card details The sender commonly assumes a relatively highly trusted identity e.g. a finl institution The data is commonly keyed into a web-form on a site that purports to be operated by the trusted identity