7e Chapter 9 Part 2

7e Chapter 9 Part 2 - MSIS 2103 Chapter 9 Part 2 1 Viruses...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
MSIS 2103 Chapter 9 – Part 2 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Viruses on Demand: Mpack! MPack is a PHP-based malware kit produced by Russian hackers” This product is readily available to anyone over the Internet using B2C e- commerce It costs between $500 and $1500, depending upon exactly what capabilities 2 Source: www.wikipedia.org (2007)
Background image of page 2
Viruses on Demand: Mpack! “The server-side software in the kit is able to customize attacks to a variety of web browsers including Microsoft Internet Explorer, Mozilla Firefox and Opera MPack works by being loaded into a hidden IFrame attached to the bottom of 3 Source: www.wikipedia.org (2007)
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Viruses on Demand: Mpack! When a user visits an infected page, MPack sends a script that loads into the IFrame on the victim’s computer It executes, and determines if any vulnerabilities in the browser or operating system can be exploited 4 Source: www.wikipedia.org (2007)
Background image of page 4
Viruses on Demand: Mpack! The server-side software in the kit is able to customize attacks to a variety of web browsers including Microsoft Internet Explorer, Mozilla Firefox and Opera Technical support and regular updates of the software vulnerabilities it exploits are provided for a fee 5 Source: www.wikipedia.org (2007)
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Bluetooth Attacks Bluetooth is a transmission protocol for exchanging data wirelessly over short distances Bluesnarfing - software available on the Internet Exploits flaw in the Bluetooth access software to steal information contained on the device 6
Background image of page 6
Wireless Networks on the Road Beware of the “Evil Twins” problem A hacker sets up a wireless network in a known Wi-Fi area and uses a sound-alike name Then the hacker lures careless web surfers to his/her network and the person enters a credit card to access the Wi-Fi network they think they are entering 7
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Passwords Create a strong password At least 14 characters, including numbers, symbols, and upper- and lowercase letters Not a single word or a word from a dictionary Not easily associated with you (birthday, name of pet, nickname) Use different passwords for different sites 8
Background image of page 8
Password Managers Remember all your different passwords Built into Operating systems Web browsers Some security packages 9
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Anonymous Web Surfing Public computers Shared computers risk subsequent user viewing your data Might already have viruses or hacking tools installed Google Chrome has the “Incognito” feature and IE has the “InPrivate” feature 10
Background image of page 10
Ubuntu – a Linux Version with a Windows-like Interface 11
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
By Putting a Linux OS on a Flash Drive You can boot from your flash drive and bypass the public OS You most likely won’t become infected by any malware that might be running on the public computer Most malware targets Windows-related software 12
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 10/12/2011 for the course MSIS 2103 taught by Professor Dr.kletke during the Fall '08 term at Oklahoma State.

Page1 / 50

7e Chapter 9 Part 2 - MSIS 2103 Chapter 9 Part 2 1 Viruses...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online