Dr. Richard Ford  Fundamental Definitions  What is Malcode?  Malcode Overview  Follows: Szor Ch.1 & 2.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Presented by: Melissa Dark CERIAS, Purdue University.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Virus code actions Or ‘how viruses work’. Replication Spreads quickly and can be difficult to control Can be attached to any type of file and make copies.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Chapter 3 (Part 1) Network Security
Viruses and Malicious Code
Chapter 14 Computer Security Threats
________________ CS3235, Nov 2002 Viruses Adapted from Pfleeger[Chap 5]. A virus is a program [fragment] that can pass on malicious code [usually itself]
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Done By:Salha Mohammed Obaid AL-kaabi ID:
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Dr. Richard Ford.  By now in the course, we’ve examined a lot about Malicious Mobile Code  One thing we’ve learned is that the world looks very different.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Trojan Horse ITGD 2202 Assistant Professor Dr. Sana’a Wafa Al-Sayegh Dr. Sana’a Wafa Al-Sayegh supervision Mohammed F. Abu Lamdy.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Week 6 COMMON TYPES OF MALICIOUS CODE. Objectives describe the operation of: Viruses Malware [last week] Spyware [last week] Adware [last week] Trojans.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 3 Computing System Fundamentals 3.7 Utility Software.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Giảng viên hướng dẫn : Sinh viên : Hoàng Xuân Nhật Huy Nguyễn Nam Tiệp.
Computer safety Filip Hruby.
Botnets A collection of compromised machines
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
Big Picture Consider this How many online threats might you be faced with a day?
Botnets A collection of compromised machines
NET 311 Information Security
Computer Viruses.
Chap 10 Malicious Software.
Malware CJ
Chap 10 Malicious Software.
Ch9 E-commerce Security
Presentation transcript:

Dr. Richard Ford

 Fundamental Definitions  What is Malcode?  Malcode Overview  Follows: Szor Ch.1 & 2.

 Like most researchers, I got hit by a Virus  I disassembled the virus, and began on this wonderful journey of discovery…  Making every possible mistake on the way!

 MMC = Malicious Mobile Code  Critical word: Mobile  MMC is designed to move from one machine to another

 Viruses  Trojan Horses  Worms  Blended threats

 A virus is a malicious program that modifies other host files or boot areas to replicate. In most cases, the host object is modified to contain a complete copy (possibly evolved) of the malicious program code. The newly- infected object is capable of spreading the “infection” further

 A Trojan, or Trojan Horse, is a non-replicating program masquerading as one type of program with its real intent hidden from the user.

 A worm is a piece of replicating code that uses its own program coding to spread with minimal user intervention. Unlike viruses worms do not “infect” other programs or boot sectors

 Replication + something else bad (like an exploit)

 A technology that aids in gathering information about a user or content of a machine without that user’s knowledge

 Pretty much Spyware that tells you exactly what it’s going to do…  Always read the EULA…

 Colloquial but descriptive  “Any piece of software that the user doesn’t want”

 In The Wild  Dr0pper  “Generation 0”<- this is a zero  Payloads  Rootkit

 Interesting problem  Go ahead and read: 03/ pdf: (p14) That Which We Call Rose.A 03/ pdf  What really is in a name?  For the other side, read 1/caro.xml or Szor Chapter 2, /caro.xml or Szor Chapter 2

 What is the goal of virus naming?  Assignment: Read Szor Ch.1 & 2 for Tuesday’s class

 Is there any such thing as a good virus?  What do you think about this: terfriendly.asp?p=337309&rl=1 terfriendly.asp?p=337309&rl=1

 Viruses and their environment…