m8 networks and security

m8 networks and security - t Ac ian r ita Focus l i Ut Cr...

Info icon This preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
1 Social Contract Act Utilitarian Rule Utilitarian Motivation Focus Criteria Module 10: Viruses, worms and bots! Oh my!
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
INTRODUCTION 2 Threats to Computer Security Unauthorized Programs – Viruses, worms and Trojan horses Unauthorized Users
Image of page 2
VIRUSES 3 How do they work? Self replicating code embedded within another program PROGRAM -> Host HOW STUFF WORKS: VIRUSES
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
VIRUSES 4 Some oldies but goodies! The Brain Virus (1986) The Michelangelo Virus (1991) The Melissa Virus (1999) The Love Bug (2000)
Image of page 4
VIRUSES: THE BRAIN VIRUS 5 First virus to infect MS DOS Written by two brothers in Pakistan who claimed was protection for their medical software Slowed down floppy disk drive and made 7 kbs of memory unavailable to DOS Not malicious so often unnoticed
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
VIRUSES: The Michelangelo Virus 6 Designed to affect DOS systems on March 6 th Certain PCs – virus overwrites first 100 sectors of the hard disk with nulls Started in 1991 Not very widespread Workaround – Don’t boot your system on 3/6. (LOL!)
Image of page 6
VIRUSES: The MELISSA Virus 7 First virus to use email to infect other systems Came in on an attachment Infected a WORD document and sent it out to mailing lists Overwhelmed servers Traced back to a New Jerseyite by FBI Sentenced to 20 months in prison and $5000 in fines
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
VIRUSES: THE LOVE BUG 8 Philipino College student – “accidentally” sent out in 2000 Destroyed computer files, stole passwords, stole email addresses and replicated itself Had subject line “ILOVEYOU” and attachment VBS extension on file but hidden by default by WINDOWS .
Image of page 8
VIRUSES TODAY 9 BIG BUSINESS!!!! Antivirus packages - what's the key to keeping these working? REGULAR UPDATES DO YOU UPDATE? .
Image of page 9

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WORMS 10 VIRUS – self-replicating code embedded in another program WORM – self-contained program spreading through security holes in computer networks .
Image of page 10
WORMS: WANK Worm 11 First worm with political message - 1989 W O R M S A G A I N S T N U C L E A R K I L L E R S ____________________________________________________________ ___ \__ ____________ _____ ________ ____ ____ __ _____/ \ \ \ /\ / / / /\ \ | \ \ | | | | / / / \ \ \ / \ / / / /__\ \ | |\ \ | | | |/ / / \ \ \/ /\ \/ / / ______ \ | | \ \| | | |\ \ / \_\ /__\ /____/ /______\ \____| | __\ | |____| |_\ \_/ \___________________________________________________/ \ / \ Your System Has Been Officially WANKed / \_____________________________________________/ You talk of times of peace for all, and then prepare for war. .
Image of page 11

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WORMS: WANK Worm 12 Exploited poorly protected accounts that had passwords identical to usernames Showed upon Dept. of Energy and NASA systems Hackers in Australia but no idea who
Image of page 12
WORMS: Code Red 13 CODE RED - 2001 Exploited vulnerability with IIS server software – patch already there Used buffer overflow Displayed “HELLO! Welcome to by Chinese” Based on days of month did varying activities WHY CODE RED?
Image of page 13

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WORMS: Sapphire (SLAMMER) 14 Sapphire (SLAMMER) 2002 Another buffer overflow vulnerability Infected at least 75000 hosts – fastest growing After 30 minutes Not malicious though it overloaded systems
Image of page 14
WORMS: Blaster 15 Blaster Buffer overflow problem (again) Aimed to flood windowsupdate.com Microsoft sidestepped it
Image of page 15

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
WORMS: Sasser 16 SASSER - SIMILAR TO Blaster 2004 – buffer overflow exploitation of WINDOWS OS Causes shutdown of system From Russia
Image of page 16
WORMS: CONFICKER 17 DOWNUP, DOWNADUP, KIDO Targets MS Windows OS Creates bots
Image of page 17

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern