csce201-lect8 - CSCE201 CSCE201 AttacksonDesktop Computers:...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 201 CSCE 201 Attacks on Desktop  Attacks on Desktop  Computers: Computers: Malicious Code   Malicious Code   Hardware attacks Hardware attacks
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 2 Reading list: M. Ciampa, Security Awareness: Chapter 2 Malicious Codes in Depth, http://www.securitydocs.com/library/2742 USC Computer Services – Virus Information Center http://www.uts.sc.edu/itsecurity/antivirus.shtml
Background image of page 2
CSCE 201 - Farkas 3 Program Flaws Program Flaws Taxonomy of flaws: how (genesis) when (time) where (location) the flaw was introduced into the system
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 4 Security Flaws by Genesis Security Flaws by Genesis Genesis Intentional Malicious: Trojan Horse, Trapdoor, Logic Bomb, Rootkits, Botnets, Covert channels Non-malicious Inadvertent Validation error Domain error Serialization error Identification/authentication error Other error
Background image of page 4
CSCE 201 - Farkas 5 Kinds of Malicious Codes Kinds of Malicious Codes Virus : a program that attaches copies of itself into other programs. Propagates and performs some unwanted function. Rabbit (Bacteria) : program that consumes system resources by replicating itself.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
CSCE 201 - Farkas 6 Kinds of Malicious Code Kinds of Malicious Code Worm : a program that propagates copies of itself through the network. Usually performs some unwanted function. Does not attach to other programs Trojan Horse : secret, undocumented routine embedded within a useful program. Execution of the program results in execution of secret code.
Background image of page 6
CSCE 201 - Farkas 7 Kinds of Malicious Code Kinds of Malicious Code Logic bomb, time bomb : logic embedded in a program that checks for a certain set of conditions to be present in the system. When these conditions are present, some malicious code is executed. Trapdoor : secret, undocumented entry point into a program, used to grant access without normal methods of access authentication.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Kinds of Malicious Code Kinds of Malicious Code Rootkits : aims to hide the presence of itself and
Background image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/13/2011 for the course CSCE 201 taught by Professor Staff during the Fall '10 term at South Carolina.

Page1 / 30

csce201-lect8 - CSCE201 CSCE201 AttacksonDesktop Computers:...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online