DOC PREVIEW
UCF COT 4810 - Malicious Software

This preview shows page 1-2-14-15-30-31 out of 31 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 31 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Malicious SoftwareObjectivesMalicious Software = MalwareScripting LanguageVirusMichelangelo VirusWormsBenjamin WormCode Red wormSlide 10Trojan HorsesStorm TrojanSpywareAdwareMalware PreventionMalware ProtectionMalware lawsSlide 18ExamplesSlide 20Slide 21Slide 22Slide 23Slide 24Slide 25Slide 26Slide 27SummaryQuestionsSlide 30SourcesMalicious SoftwareAll your bytes are belong to me.Omar HemmaliJan 13, 2019Omar Hemmali - Malicious Software ObjectivesDefine Malicious Software and some relevant termsDefine and explain some of the types of Malicious SoftwareTalk about how we can get Malicious SoftwareTalk about ways to prevent transfer of Malicious SoftwareTalk about Malicious Software LawsShow a few examplesOmar Hemmali - Malicious Software Malicious Software = MalwareA catch-all term to refer to any software designed to cause undesirable effects or damage to a single computer, server or computer network.Bug = Malware?Viruses, Worms, Trojan Horses, Spyware, AdwareHigh Level, Assembly, ScriptOmar Hemmali - Malicious Software Scripting LanguageA programming language that mimics user interaction with a computer.Very easy to use.More later.Omar Hemmali - Malicious Software VirusA segment of code designed to attach to another file, run when the file is executed, and have a mechanism to replicate itself.Needs a host.User must spread the virus.Omar Hemmali - Malicious Software Michelangelo VirusDiscovered April 1991Activates on March 6thChanges MBRInfects DisksIntel LANSpoolOmar Hemmali - Malicious Software WormsScripts designed to create an undesired effect and replicate.Worm = Virus?No host – Self containedInternet Connectivity greatly help the spread of wormsOmar Hemmali - Malicious Software Benjamin WormSpread through File Sharing ProgramsUser thinks they are getting a movie or songFile is actually the worm with dummy bytesCreates multiple copies with names of popular filesTakes a lot of hard drive spaceOmar Hemmali - Malicious Software Code Red wormDiscovered July 2001Infected 300,000+ machines in 14 hoursOmar Hemmali - Malicious Software Code Red wormExploited a flaw in Microsoft’s Internet Information Server (IIS) softwareRequired no user interactionOnly a network connectionCompiled a list of IP addresses and then attacked themOmar Hemmali - Malicious Software Trojan HorsesMasquerades as a program the user wants or finds interestingCreates a security hole so that the attacker may gain control later onSometimes used as a method of implanting another form of malwareOmar Hemmali - Malicious Software Storm TrojanDiscovered January 17, 2007Sent as an email with a fictitious news story as the subjectContains program with name similar to subjectJoins the Storm botnet structured like a peer-to-peer networkEach node is connected to 30-35 other nodesUtilizes some of the infected machines to send spam messages containing the TrojanOmar Hemmali - Malicious Software SpywareInstalled without user knowledge or consent and monitors user activities.This is used for advertising and monitoring, or to sell to another party.Considered invasion of privacySlows down the computer significantlyOmar Hemmali - Malicious Software AdwareUsers consider malicious, legally isn’t.Present ads catered to users surfing habitsConsidered invasion of privacyUser must agree to have adware installed usually bundled with sponsored software.Omar Hemmali - Malicious Software Malware PreventionOunce of prevention is worth a ton of cureStay away from illegally shared filesNot worth the hassle of losing valuable data to identity thievesNot worth the jail time eitherOmar Hemmali - Malicious Software Malware ProtectionALWAYS get the latest security updatesCode Red could have been preventedKeep Anti-Virus / Anti-Spyware runningKeep a software Firewall runningOmar Hemmali - Malicious Software Malware lawsDeveloping viruses, worms, Trojans, and spyware for distribution is illegal. Period.Florida Statute §815.06 outlines what constitutes illegal activityOmar Hemmali - Malicious Software Malware lawsSoftware cannot destroy, injure, damage, disrupt, deny, or cause to deny service of a computer. 3rd degree felonyAbove and damage exceeds $5,000. 2nd degree felonyAbove and endangers a human life. 1st degree felonyOmar Hemmali - Malicious Software ExamplesOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious SoftwareOmar Hemmali - Malicious Software SummarySubtle differences between viruses, worms, and TrojansSpyware and Adware are annoyingPrevention is easier than fixingEasy to protect yourselfOmar Hemmali - Malicious Software QuestionsWhat is one way to protect yourself from malicious software?What was one of the viruses/worms/Trojans discussed?Omar Hemmali - Malicious SoftwareOmar Hemmali - Malicious Software SourcesFundamentals of Network SecurityBy Eric


View Full Document

UCF COT 4810 - Malicious Software

Documents in this Course
Spoofing

Spoofing

25 pages

CAPTCHA

CAPTCHA

18 pages

Load more
Download Malicious Software
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Malicious Software and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Malicious Software 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?