Presentation is loading. Please wait.

Presentation is loading. Please wait.

W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service.

Similar presentations


Presentation on theme: "W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service."— Presentation transcript:

1 W15D2

2 Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service (denial of service attacks)

3 W15D2 Hacker culture Phone phreaking John "Captain Crunch" Draper Formerly a Phone Phreak, John Draper once gained fame (and prison sentences) from his skills in manipulating the telephone system. His "handle" came from the inclusion of a plastic whistle in Captain Crunch cereal in the 1960's which could, with proper manipulation, send out a control tone that would affect telephone systems of the time.

4 W15D2 A famous hacker… Blue Box - Manufacturer: Stephen Wozniak - Date: c. 1972 Steve WOZniak Phone Phreakin´ Steve Jobs and Steve Wozniak in 1975 with a Blue Box

5 W15D2 Types of malware Viruses Worms Trojan horses Infection - user action - vulnerability in OS (exploit)

6 W15D2 Phishing = password harvesting Info: http://www.safecanada.ca/identitytheft_e.asp

7 W15D2 Date: Sat, 5 Apr 2008 14:27:12 -0100 From: Raphael Hess To: rbenkocz@cs.queensu.ca, robertson@cs.queensu.ca, news@cs.queensu.ca, mcaloney@cs.queensu.ca, nasserd@cs.queensu.ca Subject: Visa Line of Credit Parts/Attachments: 1 Shown 33 lines Text (charset: ISO-8859-1) 2 OK 1.8 KB Message, "original message before SpamAssassin" 2.1 Shown 12 lines Text ---------------------------------------- [ The following text is in the "iso-8859-1" character set. ] [ Your display is set for the "US-ASCII" character set. ] [ Some characters may be displayed incorrectly. ] Spam detection software, running on the system "innovate", has identified this incoming email as possible spam. The original message has been attached to this so you can view it (if it isn't spam) or label similar future email. If you have any questions, see sa@cs.queensu.ca for details. Content preview: If you have your own business and need IMMEDIATE money to spend ANY way you like or want Extra money to give your company a boost or want A low interest loan - NO STRINGS ATTACHED! Do not worry about approval... your credit will not disqualify you! [...] Content analysis details: (7.5 points, 5.0 required) The original message was not completely plain text, and may be unsafe to open with some email clients; in particular, it may contain a virus, or confirm that your address can receive spam. If you wish to view it, it may be safer to save it to a file and open it with an editor. [ Part 2, "original message before SpamAssassin" Message/RFC822 1.8KB. ] [ Not Shown. Use the "V" command to view or save this part. ]

8 W15D2 Protection Common sense Antivirus software (some free, eg: AVG) Update OS Verify the validity of info in e-mails received  Use search engines, database searches (phone book) etc…  Do not follow links in e-mail  Remember: sender address can be spoofed


Download ppt "W15D2. Malware = malicious software Viruses, Trojan horses, Worms. Goal: usually financial gain (at the expense of the victim) C-card info disrupt service."

Similar presentations


Ads by Google