Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk email o Over 70% of email traffic  Bugs ---

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Its a new digital world with new digital dangers….
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Information Security Awareness Training
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Social media threats. Warning! May contain mild peril.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Welcome to New Hire Orientation Information Security
Introduction to Security Computer Networks Computer Networks Term B10.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
CS426Fall 2010/Lecture11 Computer Security CS 426 Lecture 1 Overview of the Course.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
Lecture 11 Reliability and Security in IT infrastructure.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Should there be a law that forbids people from sending to thousands of people (spam)? By: Bennett Moss Daniel Hoyt Hizkias Neway Junyu Wang.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
To Protect What Matters!! Protection Against Computer Virus Unit portfolio presentation by Saira Imtiaz.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
G53SEC Computer Security Introduction to G53SEC 1.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
Electronic Security. WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Managing Information in a Global World
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Chapter 1  Introduction 1 Chapter 1: Introduction.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
What is Computer Security. The Problem There are some bad guys: They are called viruses (or viri)
Phishing Problem Kristián Kučerák Milan Just. Abstract In this age of broadband, wireless, and network interconnectivity, we enjoy the unprecedented power.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Introduction to Security CS432 – Security in Computing Copyright © 2005, 2009 by Scott Orr and the Trustees of Indiana University.
Introduction1-1 Chapter 1: roadmap 1.1 What is the Internet? 1.2 Network edge  end systems, access networks, links 1.3 Network core  circuit switching,
Cybersecurity Test Review Introduction to Digital Technology.
MIS323 – Business Telecommunications Chapter 10 Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Information Security in Laurier Grant Li Wilfrid Laurier University.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Chapter 40 Internet Security.
Network Security Basics: Malware and Attacks
Systems Security Keywords Protecting Systems
What is Computer Security
Understand Core Security Principles
Protect Your Computer Against Harmful Attacks!
Cybersecurity Awareness
Risk of the Internet At Home
Chapter 13 Security and Ethical Challenges.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Introduction to Internet Worm
Cybersecurity Simplified: Phishing
Presentation transcript:

Chapter 1 We’ve Got Problems…

Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs --- software flaws  DoS --- denial of service  Malware --- malicious software o The “real war” is waged with malware

Why Study Malware?  Deepest connections to other three o Propagated using spam o Used to send spam o Take advantage of bugs o Used to mount DoS attacks  Addressing malware vital to improving computer security  Computer security vital to protecting critical infrastructure

Myth of Absolute Security  The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards. — Gene Spafford  People often represent the weakest link in the security chain and are chronically responsible for the failure of security systems. — Bruce Schneier

Risk Management  Risk others pose to you: 6 factors 1. Importance of the information 2. Impact if the security is breached 3. Who is the potential attacker 4. Attacker’s skills and resources 5. Constraints imposed by legitimate use 6. Resources available for security  Also, risk you pose to others…

Cost of Malware  Difficult to assess  “Real costs” and “hidden costs”? o We’ll say direct costs and indirect costs  Direct costs --- computer is down, resources devoted to security, etc.  Indirect costs --- reputation, leaked information, etc.  Also costs to individuals

Cost of Malware  According to Business Week… o From paper by Ross Anderson, et alpaper  …cyber crime cost $100B in 2012 o Includes cost of direct, indirect, anticipation (i.e., AV), reputation, etc.  Market for AV products o $29 billion in 2008  So, are people spending too much? o “Beware the prophet seeking profit”

Number of Threats  Estimates vary by a factor of 2  What to count? o All metamorphic copies? o In 1998, 15,000 automatically generated viruses appeared overnight o May also be some unknown malware  Malware is very target-specific o Should you care if you’re not affected?

Speed of Propagation  In the past, o Propagation speed measured in months  For some malware, speed now measured in minutes or seconds o Not so popular today as when book written Worm propagation

Speed of Propagation

 To move curve to the left… o Attacker needs better search strategy o Warhol worm, flash worm, etc.  To move curve to the right… o Good guys need better defenses  To flatten curve… o Fewer vulnerable hosts/better defenses

People  People are social, trusting, etc. o Good for friends, bad for security  People are often the problem o Social engineering attacks  scams  People click on links o Some people cannot not click on a link…

People  People don’t demand enough of software vendors o With respect to security, that is  People want features, not security o Security is an anti-feature --- no attacks  My perspective… o Don’t fight against human nature o Users don’t want to be security experts o We don’t expect everyone to service their car, repair their drywall, etc.

About this Book  Chapter 2: groundwork o Definitions and malware timeline  Chapter 3: viruses  Chapter 4: anti-virus techniques  Chapter 5: anti-anti-virus techniques  Chapter 6: exploited weaknesses o Both technical and social

About this Book  Chapter 7: worms  Chapter 8: defenses against worms  Chapter 9: applications of malware  Chapter 10: people who create malware and defend against it  Chapter 11: final thoughts

About this Book  Endnotes o 1 thru additional related content o 100 and up --- citations and pointers  Lots of “can”, “could”, “may”, “might” o Not because author is wishy-washy o Because malware is malleable  Not a programming book, but programming knowledge is assumed

Words of Warning  Working with malware is risky  Do all work in a lab or virtual machine disconnected from the network  Creating/distributing malware may violate local laws o Criminal and/or civil penalties possible  Defensive techniques can cause legal trouble too (e.g., patents)