{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

Lecture 5_Malware_x_6 - Viruses Trojan Horses Worms etc...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
1 COMP 6370 – Lecture 5 – Malicious Software 1 Viruses, Trojan Horses, Worms, etc. Resources http://www.wildlist.org/ http://www.iwar.org.uk/comsec/ ‘Viruses Revealed” by Harley, Slade and Gatticker, McGraw- Hill “Modern Operating Systems,” by Tanenbaum Virus researchers owe this man a debt of gratitude COMP 6370 – Lecture 5 – Malicious Software 2 The three pillars of Information Security Confidentiality : protecting information from unauthorized disclosure; Integrity : protecting information from unauthorized modifications, and ensure that information is accurate and complete; Availability : ensuring information is available when needed; COMP 6370 – Lecture 5 – Malicious Software 3 Direct Damage from Virus & Trojan Payloads Availability Deletion of files and directories Renaming of files Encryption of files, disks, system calls Unauthorized calls to system software such as FORMAT, FDISK, etc. Integrity Corruption of system files and system areas (MBRs, FAT, etc.) Garbling data such as spreadsheet formulas... Corruption of both application and data files by unauthorized file writes Confidentiality Capture and forwarding of passwords Forwarding of personal and confidential files to newsgroups and elsewhere COMP 6370 – Lecture 5 – Malicious Software 4 Hacking is actually NOT resume building COMP 6370 – Lecture 5 – Malicious Software 5 Defining a Computer Virus A virus is an entity that uses the resources of the host to spread and reproduce itself, usually without informed operator action.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}