Examples debugging back door left in sendmail back

This preview shows page 82 - 95 out of 100 pages.

Examples: Debugging back door left in sendmail Back door planted by Code Red worm
Image of page 82
Trojan Horse A Trojan Horse describes the class of malware that appears to perform a desirable function but in fact performs undisclosed malicious functions that allow unauthorized access to the victim computer Causes: Crashing the computer or device. Modification or deletion of files. Data corruption. Formatting disks, destroying all contents. Spread malware across the network.
Image of page 83
Root kit & Worm Root Kit A root kit is a component that uses stealth to maintain a persistent and undetectable presence on the machine Worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and do so without any user intervention.
Image of page 84
Scareware & adware Scareware is a form of malicious software that uses social engineering to cause shock, anxiety, or the perception of a threat in order to manipulate users into buying unwanted software Adware , or advertising-supported software , is any software package that automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process.
Image of page 85
Latest Malware Malware Name Malware Type Android/MazarBOT.A Malware Android/Morder.A Trojan Trojan-FHNH Trojan JS-Nemucod Trojan Android/Fobus.A Malware Android/Agent.AP Malware
Image of page 86
Chapter 5 Network Security
Image of page 87
Network Security Concepts Network Security – Measures to protect data during their transmission Internet Security measures to protect data during their transmission over a collection of interconnected networks
Image of page 88
Network Security Services Privacy: Privacy means that the sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended receiver and should be unintelligible to all others. Authentication: Authentication means that the receiver is sure of the sender’s identity and that an imposter has not sent the message. Integrity: Integrity means that the data must arrive at the receiver exactly as it was sent by the original sender. There must be no changes in transmission, either accidental or malicious. Non-repudiation: Non-repudiation means that a receiver must be able to prove that a received message came from a specified sender. The sender must not be able to deny sending a message that it has, in fact, sent.
Image of page 89
Network Security Model
Image of page 90
OSI Seven Layers OSI (Open Systems Interconnection) is reference model for how applications can communicate over a network
Image of page 91
Data Link Layer This layer sets up links across the physical network, putting packets into network frames. This layer has two sub-layers, Logical Link Control Layer and Media Access Control Layer. Ethernet is the main data link layer in use
Image of page 92
Data Link Security Data link Layer in Ethernet networks is highly prone to several attacks. The most common attacks are − ARP Spoofing Port Stealing DHCP Attacks Based broadcasting
Image of page 93
ARP Spoofing Address Resolution Protocol (ARP) is a protocol used to
Image of page 94

Want to read all 100 pages?

Image of page 95

Want to read all 100 pages?

You've reached the end of your free preview.

Want to read all 100 pages?

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern