Problem Solving Project - Soumya Bandi, Praneeth Bhatter, Sharath chandra Komuravelli (2) - Running head FINAL DRAFT ON PROBLEM SOLVING PROJECT 1 Final
Running head: FINAL DRAFT ON PROBLEM SOLVING PROJECT1Final Draft on Problem Solving ProjectWilmington UniversityIT Policy Strategy 7100Table of Contents
FINAL DRAFT ON PROBLEM SOLVING PROJECT2AbstractIn the month of January, 2009, a malicious computer worm has infected some British military systems and hasn’t infiltrated U.S. Army networks in Europe, according to 5th Signal Command in Germany.Conficker, also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It S. NoTopicsPg. No1.Abstract32Introduction43Background 44Summary of proposed system75Evidence126Plan of action157Budget168Funding209Schedule2010Evaluation2111Conclusion2212References25
FINAL DRAFT ON PROBLEM SOLVING PROJECT3uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually difficult to counter because of its combined use of many advanced malware techniques. In this paper, we analyze Conficker infections at a large scale, about 25 million victims, and study various interesting aspects about this state-of-the-art malware.Keywords: Worms, Malware techniques, SecurityFinal Draft on Problem Solving ProjectIntroductionA conficker worm has attacked the French Navy computer network called as Intramar on 15 January 2009. The aircraft at different airbases are forced to shut down because they are unable to download their flight plans as their network was confined subsequently. The Defence
FINAL DRAFT ON PROBLEM SOLVING PROJECT4Minister of United Kingdom couldn’t understand the problem with the systems and reported to higher authorities. The virus had spread across administrative offices, NavyStar/N* desktops aboard various Royal Navy warships and Royal Navy submarines, and hospitals across the city of Sheffield reported infection of over 800 computers. On 2 February 2009, the Bundeswehr, the unified armed forces of Germany, reported that about one hundred of their computers were infected. An infection of Manchester City Council's IT system caused an estimated £1.5m worth of disruption in February 2009. USB flash drives have since been banned, as this was believed tobe the vector for the initial infection (Burton, 2008). A memo from the Director of the UK Parliamentary ICT service informed the users of the House of Commons on 24 March 2009 that it had been infected with the virus. The memo, which was subsequently leaked, called for users to avoid connecting any unauthorized equipment to the network (Burton, 2008).In January 2010, the Greater Manchester Police computer network was infected, leading to its disconnection for three days from the Police National Computer as a precautionary measure; during that time, officers had to ask other forces to run routine checks on vehicles and people (Burton, 2008).