MaliciousSoftware

MaliciousSoftware - Malicious Software All your bytes are...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Malicious Software All your bytes are belong to me. Omar Hemmali Jun 6, 2011
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Omar Hemmali - Malicious Software Objectives Define Malicious Software and some relevant terms Define and explain some of the types of Malicious Software Talk about how we can get Malicious Software Talk about ways to prevent transfer of Malicious Software Talk about Malicious Software Laws Show a few examples
Background image of page 2
Omar Hemmali - Malicious Software Malicious Software = Malware A catch-all term to refer to any software designed to cause undesirable effects or damage to a single computer, server or computer network. Bug = Malware? Viruses, Worms, Trojan Horses, Spyware, Adware High Level, Assembly, Script
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Omar Hemmali - Malicious Software Scripting Language A programming language that mimics user interaction with a computer. Very easy to use. More later.
Background image of page 4
Omar Hemmali - Malicious Software Virus A segment of code designed to attach to another file, run when the file is executed, and have a mechanism to replicate itself. Needs a host. User must spread the virus.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Omar Hemmali - Malicious Software Michelangelo Virus Discovered April 1991 Activates on March 6 th Changes MBR Infects Disks Intel LANSpool
Background image of page 6
Worms Scripts designed to create an undesired effect and replicate. Worm = Virus?
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/06/2011 for the course MIS 651 taught by Professor Randall during the Spring '11 term at UCLA.

Page1 / 31

MaliciousSoftware - Malicious Software All your bytes are...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online