Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
D. Beecroft Fremont High School VIRUSES.
 a crime committed on a computer network, esp. the Internet.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
For any query mail to or BITS Pilani Lecture # 1.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Submitted By :- Neeraj Kumar Singh Branch :Electronics&communication Topic : computer Viruses Submitted to :- Ms. Veena Gupta.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
CONTENTS What is Virus ? Types of computer viruses.
Malicious Software.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Computer safety Filip Hruby.
Lecture 8. Cyber Security, Ethics and Trust
Computer Technology Notes 5
Computer Applications Unit B
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Chap 10 Malicious Software.
Malware CJ
Malicious Software Network security Master:Mr jangjou
Chap 10 Malicious Software.
Presentation transcript:

Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi Bandung

Computer systems security is all about the security threats that can compromise an operating system and the data held within Threats: viruses, Trojans, and spyware are 2

COMPUTER SYSTEMS SECURITY THREATS 3

Malicious Software Malicious software, or malware, is software designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent – Viruses – Worms – Trojan horses – Spyware – Rootkits – Adware – and other types of undesirable software. 4

Viruses A virus is code that runs on a computer without the user’s knowledge; it infects the computer when the code is accessed and executed For viruses to do their dirty work, they first need to be executed by the user in some way – A virus needs some sort of carrier A virus also has reproductive capability and can spread copies of itself throughout the computer if it is first executed by the user By infecting files accessed by other computers, the virus can spread to those other systems as well 5

Viruses types – Boot sector - Initially loads into the first sector of the hard drive; when the computer boots, the virus then loads into memory. – Macro - Usually placed in documents and ed to users in the hopes that the user will open the document, thus executing the virus. – Program - Infects executable files 6

Viruses types (2) – Polymorphic - Can change every time is it executed in an attempt to avoid antivirus detection. – Stealth - Uses various techniques to go unnoticed by antivirus programs. – Armored - These protect themselves from antivirus programs by tricking the program into thinking that it is located in a different place from where it actually resides Essentially, it has a layer of protection that it can use against the person who tries to analyze it; it will thwart attempts by analysts to examine its code. – Multipartite - A hybrid of boot and program viruses that attacks the boot sector or system files first and then attacks the other 7

Worms Worms are much like viruses except they self-replicate whereas a virus does not With worms, the user doesn’t need to access and execute the malware Worms take advantage of backdoors and security holes in operating systems and applications – They look for other systems on the network or through the Internet that are running the same applications and replicate to those other systems 8

Trojan Horses 9

Trojan horses, or simply Trojans, appear to perform wanted functions but are actually performing malicious functions behind the scenes These are not technically viruses and can easily be downloaded without noticing them 10

Remote access Trojans (RATs) are the most common type of Trojan (ex: Back Orifice or NetBus) – their capability to allow an attacker higher administration privileges than the owner When a target computer is controlled by an attacker, it could easily become a robot (or simply a bot), carrying out the plans of the attackers at their command 11

Spyware Spyware is a type of malicious software either downloaded unwittingly from a website or installed along with some other third-party software Usually, this malware collects information about the user without the user’s consent. Spyware is also associated with advertising (those pop-ups that just won’t go away!) and could possibly change the computer configuration – Adware usually falls into the realm of spyware because it pops up advertisements based on what it has learned from spying on the user Grayware is another general term that describes applications that are behaving improperly but without serious consequences – It is associated with spyware, adware, and joke programs 12

Rootkits A rootkit is a type of software designed to gain administrator-level control over a computer system without being detected – The term is a combination of the words “root” (meaning the root user in a UNIX/Linux system or administrator in a Windows system) and “kit” (meaning software kit) – Usually, the purpose is to perform malicious operations on a target computer at a later date without the knowledge of the administrators or users of that computer 13

Rootkits are difficult to detect because they are activated before the operating system has fully booted A rootkit might install hidden files, processes, and hidden user accounts. Because rootkits can be installed in hardware or software, they can intercept data from network connections, keyboards, and so on 14

Rootkits can target the BIOS, boot loader, kernel, and more Example: Evil Maid 15

Spam Spam is the abuse of electronic messaging systems such as , broadcast media, instant messaging, and so on Spammers send unsolicited bulk messages indiscriminately, usually without benefit to the actual spammer, because the majority of spam is either deflected or ignored The bulk of network-based viruses are transferred through spam e- mails 16

Summary of Malware Threats 17

WAYS TO DELIVER MALICIOUS SOFTWARE 18

Malware is not sentient (...not yet) and can’t just appear out of thin air it needs to be transported and delivered to a computer or installed on a computer system in some manner 19

20

Direct physical access 21

Via Software, Messaging, and Media 22

Active Interception (inception) 23

Privilege Escalation the act of exploiting a bug or design flaw in a software or firmware application to gain access to resources that normally would’ve been protected from an application or user 24

Backdoors Backdoors are used in computer programs to bypass normal authentication and other security mechanisms in place Originally, backdoors were used by developers as a legitimate way of accessing an application, but soon after they were implemented by attackers who would use backdoors to make changes to operating systems, websites, and network devices Quite often, it is installed via a Trojan horse Example: Back Orifice (completely new application that would act as a backdoor), which enables a user to control a Windows computer from a remote location. 25

Logic Bombs Logic bombs are code that has, in some way, been inserted into software to initiate one of many types of malicious functions when specific criteria are met malware malware delivery system 26

Botnets and Zombies malware can be distributed throughout the Internet by a group of compromised computers known as a botnet (controlled by a master computer (where the attacker resides)) The individual compromised computers in the botnet are called zombies Leads to distributed denial of service (DDoS) 27

Columbo is an American detective mystery television film series, starring Peter Falk as Columbo, a homicide detective with the LAPD (wikipedia) 28