usc-csci530-f08-l07

usc-csci530-f08-l07 - USC CSci530 Computer Security Systems...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  USC CSci530 Computer Security Systems Lecture notes Fall 2008 Dr. Clifford Neuman University of Southern California Information Sciences Institute
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  CSci530: Security Systems Lecture 7, October 10 2008 Introduction to Malicious Code Dr. Clifford Neuman University of Southern California Information Sciences Institute
Background image of page 2
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  Classes of Malicious Code How propagated Trojan Horses Embedded in useful program that others will want to run. Covert secondary effect. Viruses When program started will try to propagate itself. Worms Exploits bugs to infect running programs. Infection is immediate.
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  Classes of Malicious Code The perceived effect Viruses Propagation and payload Worms Propagation and payload Spyware Reports back to others Zombies Controllable from elsewhere
Background image of page 4
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  Activities of Malicious Code Modification of data Propagation and payload Spying Propagation and payload Advertising Reports back to others or uses locally Propagation Controllable from elsewhere Self Preservation Covering their tracks
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  Defenses to Malicious Code Detection Virus scanning Intrusion Detection Least Privilege Don’t run as root Separate users ID’s Sandboxing Limit what the program can do Backup Keep something stable to recover
Background image of page 6
Copyright © 1995-2008 Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE  Trojan Horses A desirable documented effect
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 26

usc-csci530-f08-l07 - USC CSci530 Computer Security Systems...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online