Download presentation
Presentation is loading. Please wait.
1
Computer Network Security
Dr. X
2
Internet Problems Computer Viruses, Trojans and Worms
Financial Fraud and Identity Theft Crimes against minors Anonymous Libel Denial of Service
3
Computer Viruses What is a computer virus?
a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
4
Examples Melissa Virus ILOVEYOU OSX/RSPlug Trojan Storm Worm
Melissa virus in March 1999 was spectacular in its attack. Melissa spread in Microsoft Word documents sent via , and it worked like this: Someone created the virus as a Word document and uploaded it to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an message to the first 50 people in the person's address book. The message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. At that rate, the Melissa virus quickly became the fastest-spreading virus anyone had seen at the time. As mentioned earlier, it forced a number of large companies to shut down their systems to control the spread. The Love Bug flooded internet users with ILOVEYOU messages in May 2000, forwarding itself to everybody in the user's address book. It was designed to steal internet access passwords for its Filipino creator. OSX/RSPlug Trojan In November 2007, the first example of financially-motivated malware for Apple Macs was discovered in the wild. The launch of the OSX/RSPlug Trojan increased fears that Apple's platform may be targeted more by hackers in the future. 10. Storm worm The Storm worm, originally posing as breaking news of bad weather hitting Europe, infected computers around the world in Millions of infected PCs were taken over by hackers and used to spread spam and steal identities.
5
Malware Case Study: Stuxnet
Stuxnet is a famous computer worm that was first discovered in June of It was used to sabotage Iran’s nuclear enrichment facilities. In cyber security, an undisclosed vulnerability in a system is called a “zero day.” Stuxnet exploited several different zero days to change the way nuclear facilities were operating while reporting that everything was operating normally. June 2011
6
How can you avoid viruses?
Kahoot time!
7
Computer Network Attacks
Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle Students can research and discuss about different attacks
8
Case Study Computer Network Attacks: DDoS
Distributed Denial of Service Traffic flood Makes resources (e.g. websites) unavailable to users Can target small and large businesses Stuxnet had a very specific target, and an average business or computer user is not likely to have problems with it. But DDoS attacks are much more common. A DDoS attack is when a flood od traffic is sent to a target to make its resources unavailable to its users. Like when a crowd of people all try to go through a door at once. DDoS attacks are used to shut down businesses websites temporarily, causing them to lose traffic.
9
Case Study Computer Network Attacks: DDoS
In a survey of 270 North American companies, 45% said they have experienced a DDoS attack at some point in time About 2/3 of DDoS attacks last 6 hours or more Cost of a DDoS attack estimated at $40,000/hr Non-financial costs Hardware Customer trust Loss of data DDoS attacks are fairly common and can last for several hours. Because hey cost around $40,000/hr, the average cost of a DDoS attack is around $500,000. DDoS attacks also cause damage that is not financial. You may have to replace hardware, lose your customer’s trust, or even have theft of important data.
10
Case Study Computer Network Attacks: DDoS
Watch the attacks for a while. What trends do you notice? What do they show? The second map is the live one. After watching it for a while, it should become obvious that the US is the top attacker and victim. This may be because many big global corporations are in the US, and the US has many political enemies who want to attack the US. The importance of this is to show that DDoS attacks are global, and that attacks are often from one country to another. Remember Iran hiring an “army” of hackers to counterattack the US?
11
What is a botnet?
12
Distributed DoS (DDoS) Attack
Attacker Unidirectional commands Handler Zombies Coordinating Communications Agent Zombies Attack Traffic Target
13
Mirai Botnet Large distributed denial of service attack - GBps… one billion bytes per second Weaponized the Internet of Things devices: web cameras etc. Took down websites such as: Amazon, Spotify, Twitter, Reddit Code was distributed openly! Mirai means… the future in Japanese 1,073,741,824 bytes, 1 Gigabyte: The bed of a pickup truck filled with paper.
14
IoT Security … or saving the world, one fitbit at a time
15
What is IoT? the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.
16
(Image Credit: The Connectivist)
Why is IoT so important?
17
Why is IoT so important? ...
18
Cybersecurity X Lab approach
Hypothesis Penetration Testing Experimentation Theoretical framework Rinse, repeat!
19
Drone security Help needed! Known attack vectors: New ideas:
Flood of traffic Large file Corrupted traffic Man in The Middle New ideas: Spreading malware Flood attack with drone Your ideas!
20
Amazon Echo Security Assessment
Daniel Baczmaga,... your name! Ideas: Energize echo without permission Unauthorized purchases Surveillance Your ideas!
21
Fitbit Vulnerabilities
Logan Smith… your name! Spreading malware with Fitbit Weaponizing fitbit for network attacks Your ideas?
22
Shodan.io Search Engine for IoT
Gives information about devices (your printer needs toner!) Logs known vulnerabilities
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.