20 Years of Malware Risk Robert M. Slade, M. Sc., CISSP

Slides:



Advertisements
Similar presentations
Quantum Computing : Security Implications Robert M. Slade, MSc, CISSP
Advertisements

Computer Security Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Chapters 14 and 15 Operating Systems: Internals and Design Principles,
Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
Securing Your Computer 1,2,3 The Basics Just the facts……..  In 2003, Symantec documented 2,636 new computer vulnerabilities, an average of seven per.
Computer Viruses Computer viruses are a type of Malware that can infect other computer operating systems. They can do harmful things to the host it infected.
Primary Threats to Computer Security
POSSIBLE THREATS TO DATA
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
Malicious Software programs exploiting system vulnerabilities known as malicious software or malware program fragments that need a host program e.g. viruses,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Viruses. History Malicious software – 1970’s Programs distributed over exchange servers speeds spread of viruses Brain sparks term: Virus.
1 Malicious Logic CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute March 25, 2004.
Malware Fundamentals POLITEHNICA University of Bucharest 14 th of January 2015 Ionuţ – Daniel BARBU.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Video Following is a video of what can happen if you don’t update your security settings! security.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 7 – Malicious Software.
Malicious Software Malicious Software Han Zhang & Ruochen Sun.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
1.1 System Performance Security Module 1 Version 5.
IT security By Tilly Gerlack.
1 ISA 662 Information System Security 20 Years Of PC Viruses.
D. Beecroft Fremont High School VIRUSES.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
Spyware, Viruses and Malware What the fuss is all about.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
Terminology Worm –A computer program that duplicates itself over computer networks. Virus –A computer program that inspects it’s environment and copies.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Everything you wanted to know about Computer Viruses.
A Timeline of Malicious Code Sean Watts Department of Computer Science Clemson University As a partial requirement for CP SC 620.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Return to the PC Security web page Lesson 5: Dealing with Malware.
For any query mail to or BITS Pilani Lecture # 1.
CIS 442: Chapter 2 Viruses. Malewares Maleware classifications and types Viruses Logical and time bombs Trojan horses and backdoors Worms Spam Spyware.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Recent Internet Viruses & Worms By Doppalapudi Raghu.
COMPUTER VIRUS.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
3.6 Fundamentals of cyber security
Lecture 8. Cyber Security, Ethics and Trust
Computer Virus Nick DeFabis.
Electronic Communications
Malware, Anti-malware & Rats
Computer Technology Notes 5
Chap 10 Malicious Software.
Malware CJ
Malicious Software Network security Master:Mr jangjou
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

20 Years of Malware Risk Robert M. Slade, M. Sc., CISSP

(c)1986Brain Was it the first? Was it the first? Are the risks the same? Are the risks the same?

Prehistory s-50s von Neumann architecture von Neumann architecture Harvard architecture Harvard architecture Howard Aiken, Mark I – IV Howard Aiken, Mark I – IV Risk – Law of unintended consequences Risk – Law of unintended consequences Cost/benefit – development versus viruses? Cost/benefit – development versus viruses?

Prehistory s-70s Core Wars Core Wars DARWIN – 1969 DARWIN – 1969 Survival of programs Survival of programs Imp Imp Replication, quite successful Replication, quite successful Risk – beware of playful programmers Risk – beware of playful programmers

Trojans Various types, difficult to define Various types, difficult to define Password stealing Password stealing Pranks Pranks Malicious damage Malicious damage Phishing (ID theft) Phishing (ID theft) Risks Risks Trust Trust Ill-defined threats Ill-defined threats

Pranks Non-malicious Non-malicious Anthem Anthem Flip Flip Risks? Risks?

Prehistory s Infamous Xerox worm Infamous Xerox worm Shoch and Hupp Shoch and Hupp Experiment in distributed computing Experiment in distributed computing Application with multiple segments Application with multiple segments Bug in the program Bug in the program Risk – unintended consequences again Risk – unintended consequences again

Prehistory s Apple viruses Apple viruses Texas Texas Like Core Wars, examining survival Like Core Wars, examining survival Variant 1 successful Variant 1 successful Variant 2 escaped, interfered with game Variant 2 escaped, interfered with game Variant 3 to hunt down 2 Variant 3 to hunt down 2 Risk – buggy code Risk – buggy code Risk – antivirus viruses - Ohio Risk – antivirus viruses - Ohio

Fred Cohen Replication proposed at 1983 seminar Replication proposed at 1983 seminar Len Adelman Len Adelman 1984 thesis 1984 thesis 1986 dissertation 1986 dissertation Three major antiviral types identified Three major antiviral types identified

(c)1986Brain Brain Computer Services, Pakistan Brain Computer Services, Pakistan Ashar and Ashar Ashar and Ashar Stealth Stealth Boot sector infector Boot sector infector Risk – variants – Ohio, Den Zuk Risk – variants – Ohio, Den Zuk

1987 Lehigh Lehigh CHRISTMA CHRISTMA Risk - DoS Risk - DoS

1987 Jerusalem Jerusalem Risks – variants, malicious damage, reputation Risks – variants, malicious damage, reputation

1987 Polymorphism Polymorphism Many shapes Many shapes Self-encryption Self-encryption stub stub Modular construction Modular construction module signatures module signatures Updating Updating update module signature update module signature File pickup File pickup other signatures other signatures Risks Risks AV expert blood pressure (zero day) AV expert blood pressure (zero day) CPU time CPU time File distribution File distribution

1988 Stoned Stoned Risk – holdover technology (boot sector) Risk – holdover technology (boot sector) Internet/UNIX/Morris Worm Internet/UNIX/Morris Worm Risks - defaults Risks - defaults MacMag MacMag Risks – data, commercial Risks – data, commercial

1991 Desert Storm Desert Storm Risk – don't believe everything you read Risk – don't believe everything you read MSAV MSAV Anti-antivirus Anti-antivirus Risk - There is hardly anything in the world that some man cannot make a little worse and sell a little cheaper, and the people who consider price only are this man's lawful prey. - John Ruskin Risk - There is hardly anything in the world that some man cannot make a little worse and sell a little cheaper, and the people who consider price only are this man's lawful prey. - John Ruskin

1994 Good Times hoax Good Times hoax Risk – don't believe everything you read Risk – don't believe everything you read Springer-Verlag publishes "Robert Slade's Guide to Computer Viruses" Springer-Verlag publishes "Robert Slade's Guide to Computer Viruses" (ummm...) (ummm...)

1995 Concept Concept Macro virus Macro virus Risks Risks Outdated definitions of program Outdated definitions of program Extraneous functionality Extraneous functionality

1999 Melissa Melissa First of the fast burners First of the fast burners Used multiple linked applications Used multiple linked applications Risks Risks Platform dominance Platform dominance Convenience Convenience (Pornography) (Pornography)

2000 Life Stages Life Stages Risk - file formats and extensions Risk - file formats and extensions

2001 Lindose/Winux Lindose/Winux Cross-platform Cross-platform Code Red Code Red Worm speed Worm speed

Intermission DCOM DCOM

2003 Sobig Sobig Spambotnets Spambotnets Risk – commercial and criminal impetus to malware Risk – commercial and criminal impetus to malware

Spyware and Adware Potentially Unwanted Software – PUS Potentially Unwanted Software – PUS Risk - definition Risk - definition

Mobile Cell phones, PDAs, Blackberry, etc. Cell phones, PDAs, Blackberry, etc. Risk – computers everywhere Risk – computers everywhere

20 Years of Malware Risk Robert M. Slade, M. Sc., CISSP