Problem Solving Project - Soumya Bandi, Praneeth Bhatter, Sharath chandra Komuravelli (2) - Running head FINAL DRAFT ON PROBLEM SOLVING PROJECT 1 Final

Problem Solving Project - Soumya Bandi, Praneeth Bhatter, Sharath chandra Komuravelli (2)

This preview shows page 1 - 5 out of 23 pages.

Running head: FINAL DRAFT ON PROBLEM SOLVING PROJECT 1 Final Draft on Problem Solving Project Wilmington University IT Policy Strategy 7100 Table of Contents
Image of page 1
FINAL DRAFT ON PROBLEM SOLVING PROJECT 2 Abstract In the month of January, 2009, a malicious computer worm has infected some British military systems and hasn’t infiltrated U.S. Army networks in Europe, according to 5th Signal Command in Germany. Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It S. No Topics Pg. No 1. Abstract 3 2 Introduction 4 3 Background 4 4 Summary of proposed system 7 5 Evidence 12 6 Plan of action 15 7 Budget 16 8 Funding 20 9 Schedule 20 10 Evaluation 21 11 Conclusion 22 12 References 25
Image of page 2
FINAL DRAFT ON PROBLEM SOLVING PROJECT 3 uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. In this paper, we analyze Conficker infections at a large scale, about 25 million victims, and study various interesting aspects about this state-of-the-art malware. Keywords: Worms, Malware techniques, Security Final Draft on Problem Solving Project Introduction A conficker worm has attacked the French Navy computer network called as Intramar on 15 January 2009. The aircraft at different airbases are forced to shut down because they are unable to download their flight plans as their network was confined subsequently. The Defence
Image of page 3
FINAL DRAFT ON PROBLEM SOLVING PROJECT 4 Minister of United Kingdom couldn’t understand the problem with the systems and reported to higher authorities. The virus had spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers. On 2 February 2009, the Bundeswehr, the unified armed forces of Germany, reported that about one hundred of their computers were infected. An infection of Manchester City Council's IT system caused an estimated £1.5m worth of disruption in February 2009. USB flash drives have since been banned, as this was believed to be the vector for the initial infection (Burton, 2008). A memo from the Director of the UK Parliamentary ICT service informed the users of the House of Commons on 24 March 2009 that it had been infected with the virus. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorized equipment to the network (Burton, 2008). In January 2010, the Greater Manchester Police computer network was infected, leading to its disconnection for three days from the Police National Computer as a precautionary measure; during that time, officers had to ask other forces to run routine checks on vehicles and people (Burton, 2008).
Image of page 4

Want to read all 23 pages?

Image of page 5

Want to read all 23 pages?

You've reached the end of your free preview.

Want to read all 23 pages?

  • Fall '14
  • Smith,R
  • Windows Vista, Software Removal Tool

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture