A Survey on Malware Analysis and Detection Techniques

Size: px
Start display at page:

Download "A Survey on Malware Analysis and Detection Techniques"

Transcription

1 A Survey on Malware Analysis and Detection Techniques 1 Farhood Norouzizadeh Dezfouli, 2 Ali Dehghantanha, 3 Ramlan Mahmod, 4 Nor Fazlida Binti Mohd Sani, 5 Solahuddin bin Shamsuddin, 6 Farid Daryabar 1,6 Faculty of Computer Science and Information Technology, University Putra Malaysia, {farhood1990, farid0fx}@gmail.com 2.3,4 Faculty of Computer Science and Information Technology, University Putra Malaysia, {alid, ramlan, 5 Cyber Security Malaysia, [email protected] Abstract Nowadays the use of the internet has become an integral part. Parallel to this, we have seen an overwhelming flood of new malware. And malware detectors are the primary tools in defense against malware. The quality of such a detector will be decided by the techniques it used. This paper discusses the background of the types of malware and technological innovations that led to the present day computing environment. We have also identified inadequacies in the signature-based, behavior-based detection methods. Keywords: malware, types of malwares, malware detection techniques, signature-based, behaviourbased 1. Introduction Malware is any malicious software that is used by the attacker to enter the system as unauthorized access, harm other programs or alter data and spread it to another device through internet. The combination of malicious and software is the creation of the term of malware. Therefore, malware has another name called malicious code. According to [1], malware is used to set on the computer and affect the performance of the computer to give the remarkable controls to the attackers. This kind of control can be overwriting the owner of the user. Nowadays malware is considered as worldwide threats in the computing world. It continues to grow and evolve in complexity. Some malware can be very easy to detect and remove from the computer or other device such as mobile phone thought antivirus software. This antivirus software is used to check all the files in the computer and find out those files which contain any virus signature. A quality of malware detector is based on the techniques that are used in the detector. The condition that a good malware detection technique must have includes identifying the malware code either it has been hidden or embedded inside those files. Besides that it should be able to look for others unknown or new malicious code. This paper includes 3 sections. The first section discusses malware and its different types. The second section discusses various existing malware detection techniques. Finally, in the last section we conclude the paper and summarize the findings. 2. Malware There are six types of malware which are virus, worm, backdoor, trojan horse, spyware and adware. According to [2], there are three characteristics that are used to associate with those malware types. 1) Self-replicating malware will keep creating the new copies of the code when it is being broadcast. Besides that, malware can also be broadcasted passively via the file that has been infected and copied by users, but this kind of malware cannot self-replicate. 2) According to [2], because of the first characteristics, the population growth of malware describes the overall change in the number of malware. Malware that doesn t self-replicate will always have a zero population growth may self-replicate. 3) In order to exist, parasitic malware requires some executable code that can be executed automatically and stealthy in any machine. Those executable codes are boot block code on a International Journal of Advancements in Computing Technology(IJACT) Volume5, Number14, October

2 disk or on a USB thumb drive, binary code in applications, interpreted code and others. Besides that, it also involves the source code such as application scripting languages, but this kind of code might have to compile before it being executed. Table 1 shows different types of malicious code [3]. Type of Malicious Code Virus Worm Backdoor Trojan horse Malicious mobile code Table 1. Types of Malicious Codes Defining Characteristics Significant Examples Infects a host file such as executable, word processing document. Self-replicates. Usually requires human interaction to replicate through opening a link that sent by unknown sender, opening a program or install software that includes the code inside the software. Can be broadcast through the network connection. Self-replicates. Normally can be broadcast automatically. Bypasses normal security controls to give an attacker access. Disguises itself as a useful program while masking hidden malicious purpose. Consists of lightweight programs that are downloaded from a remote system and executed locally with minimal or no user intervention. Typically written in Javascript, VBScript, Java or ActiveX. Michelangelo, CIH. Morris Worm, Code Red, SQL Slammer. Netcat and Virtual Network Computing (VNC) Both of it can be used legitimately as remote administration tools and illegitimately as an attack tools. Setiri, Hydan. Cross Site Scripting. Malware have different types of payloads to perform different functionalities that challenge detection. Many types of malware perform different activities; however, this paper will focus into following categories: 2.1. Virus A virus is a computer program that is hidden into a executable file when the infected program is executed. It is one of the types of malware. According to [4], when the virus code executes, it attempts to replicate itself into other executable code; when it succeeds, the file is considered infected by the virus. Those files that have been infected by the virus code can infect the new code in turn. This kind of action is called self-replication and is one of the characteristic of malware. On MS-DOS system, files that have the extensions.exe,.com,.bat and.sys can be infected easier. The most harmless viruses are only able to self-replicate and spread to new programs from infected files. Besides that, the virus can damage the data file, copy data continuously until the capacity of the computer is full, alter the original data and keep shutting down or open the same program in the shortest time. Boot sector virus infects the boot sector or master boot record on a computer system. The first step to infect the computer system is to alter the original boot code and replace the original code with infected boot code. And from that infected boot code spread the virus to other codes. Normally, boot sector virus is hard to detect, because when a computer is being switched on, the first process that is going to load will be the boot sector. After computer system has been infected, the viruses have the full control of the computer system and are able to do anything on the computer system based on the virus code. Figure 1 shows that boot sector viruses target MBR or PBS instructions that are executed during the PC s boot-up sequence [4]. 43

3 Figure 1. Viruses targeting MBR and PBS. The objective is to infect as much executable files as possible with the extensions.com,.exe,.ovl and other overlay files. According to [4], there are a few examples of software products that support macros- commands embedded into documents for the official purpose of enhancing the application, interacting with user, or automating tasks. Those software products are Microsoft Office, WordPerfect Office, StarOffice and AutoCAD. Figure 2 shows that the visual basic editor, built into Microsoft Office, allows users to embed executable instructions into Office document [5] Backdoor Figure 2. Visual basic editor allowing embedding executables in Office Documents. According to [6], a backdoor is a way that bypasses a normal security check through the device. Backdoor is not only used for illegitimate purposes but it is also used for legitimate reason as well, such as sometimes programmers will create backdoor to skip an authentication process when debugging a network server. Figure 3. An example of using backdoor for legitimate purposes. 44

4 There is another special situation for legitimate purpose of backdoor called RAT, which is stand for Remote Administration Tool or Remote Access Trojan. The function of this backdoor is similar to other remote computer software. Once RAT is installed on a computer, another computer can monitor and have full control over that computer. According to [6], user may install these to access a work computer from home, or to allow help desk staff to diagnose and fix a computer problem from afar. According to [7], backdoor are focused on giving the attacker access to the target machine. These kinds of access have many different forms. It depends on the attacker s aim and the function of backdoor. Table 2 shows several types of access by using backdoor [7]. Backdoor Access Local Escalation of Privilege Remote Execution of Individual Commands Remote Command- Line Access Remote Control of the GUI Description Table 2. Access types using backdoor This kind of backdoor lets attackers which are having an account on the system suddenly change their privilege level to the highest privilege level such as administrator. With these special privileges, the attacker is able to access any file that is stored on the victim machine without any limit. This kind of backdoor allows attacker to send a message or command to the victim machine and execute the command on the victim machine. After the backdoor executes the command from the attacker, it will return the result to the attacker automatically. This kind of backdoor is also known as remote shell. It is able to allow attacker to access victim machine and type a command that attacker wants to execute on a command prompt through the network connection. Besides that, attacker is able to use all of the functions of command such as open a program through command prompt, copy or alter data that are in the victim machine and delete the data. These kind of backdoors are more harmful than other backdoor access. This kind of backdoor will allow attacker to see the GUI of the victim computer, able to control the victim mouse movements and enter keystrokes through the network connection. Besides that, attackers are able to monitor all of the victim s activity Worm A worm is a self-replicating piece of code that spreads via networks and usually doesn't require human interaction to propagate [8]. Worm is quite similar to virus as both of them share some common characteristics. Worms can be identified by their obvious characteristics which is self-replicating just like a virus. However, self-replication of a worm is distinct from virus as its self-replication process can be done standalone without dependent to executable code. Table 3 shows the comparison and differences between virus and worm. Table 3. Comparison between virus and worm Type of Malware Self- Way of Propagation User required in propagation replication Virus Yes Infecting a file in computer, such as a document file. Worm Yes Spread from machine to machine across networks. process User interaction is required for virus propagation, such as opening a document file in computer. Worm can propagate in either present or absent of user interaction. Humans are slow, compared to computers and computer networks. Worm thus has the potential to spread very, very quickly, because human doesn t have to be involved in the process of worm propagation [9]. After a worm attacks a targeted system, the targeted system will be taken over and used by worm as a staging ground. From there, the worm will start its scanning for other vulnerable 45

5 systems and conquer other vulnerable systems found. The existence of a network is very important for worm propagation because worms cannot spread from one machine to another if there is no network. Whether user interaction is present or absent, it doesn t affect the propagation of worm. Worm is able to propagate in both situations. A worm using which is called worm is one of the worm examples that can propagate with user interaction. For example, worm arrives to user s computer as an attachment and tricks the user to run it or open it. After it is executed or opened by the user, the worm will harvest addresses off the machine and mails itself to those addresses. Worm that can propagate without user interaction doesn t have to trick user to open an or attachment. This type of worm will find the vulnerability of a system and attack the targeted system based on the system weakness. A user interaction is not required at all if the worm spread using buffer overruns between long-running network server processes on different machines. Once a computer or system is being attacked by a worm, it will cause many very bad effects. Due to worm can self-replicate itself on the system, it could send out thousands of copies of itself and cause a huge devastating effect. The worm will use up the system or computer processing speed and space. The worms on a system will consume too much system memory and cause the system process to be accomplished slower and even can cause system to stop responding. Some worms have been designed to tunnel into user system. This will allow malicious users to control tunnelled system remotely. So, the malicious users can hijack internet access or of the victim computer and use these services for illegal activities. Worm will also cause data corruption on the computer or system. Some worms are designed to perform vandalism actions on computer data. The data on victim computer will be corrupted or erased once it is attacked by this type of worms. The result of such worm attacks is that the computer owner will be unable to run a program or access data on their computers. Worm also causes damage to human psychology. When a computer operation is affected by worm attack, it not only takes personal resources and times to fix the damage, but it also will leave the victim with unsafe and vulnerable feeling Trojan Horse Trojan horse is named after the Greek Army invasion method to the city of Troy where the Greek army was hiding in a gift of a horse hollow statue. This also applies to a type of computer virus that attacks the victim computer in a similar way, the Trojan horse virus will act as a gift or part of a computer and invades the computer silently. A Trojan horse is a program that appears to have some useful of benign purpose, but really masks some hidden malicious functionality [10]. The Trojan horse will appear as a normal or useful software at the first glance but will actually do damage once it is installed or run on the computer. Users who receive a Trojan horse will be tricked to open or run it because Trojan horse appears like legitimate software or files from a legitimate source. In this case, unsuspecting users are the vulnerability and become entry point for the malicious software to successfully deploy on the computer. There are different techniques used by attackers to create a Trojan horse virus. For the simplest level of Trojan horse techniques, an attacker just needs to alter the malicious code name on a system. With this action, the Trojan horse will appear to belong to that machine. Another technique is naming a backdoor program the same name with normal program in the computer. This allows an attacker to operate undetected. One simple Trojan horse naming technique which is popularly used by attackers against systems operated based on Windows, is done by creating a file named with a bunch of spaces in it to obscure the file's type, for example (text.txt.exe). The program is still executable with.exe at the end after all the spaces, but careless or unwary user might not notice the.exe suffix. When user looks at this file with Window Explorer file viewer, it will confuse the user as the program will appear in normal text file look. Besides that, Trojan horse will mask itself as some normal process or program running on a machine. So, Trojan horse will look like a program that belongs to the system and is hard to detect by users. Users will continue their daily activity without being aware of the intrusion of Trojan horse. Key logging is one of the main effects caused by Trojan horse. Once Trojan horse invades a machine, it will implement a key logger program on that machine. This program will record all buttons that are being pressed by the user on their keyboards and send a report of it to the hacker. Private and confidential information such as banking password, online purchases and online transaction will be tracked through key logger program and sent to hackers. Some hackers who might be interested in vandalism will 46

6 create a Trojan horse to attack victim s computer. This type of Trojan horse can corrupt delicate data of the operating system and can even cause an operating system to crash. There is another type of Trojan horse that will install a remote access program on victim s computer which is known as backdoor. Backdoor allows hackers to access victim s computer system freely and modify the personal files inside. It will cause the victim s private and confidential information stored inside the computer to be leaked and compromised Spyware A new category of malware has gained momentum and it is called Spyware. Spyware can be defined as Any software that monitors user behavior, or gathers information about the user without adequate notice, consent, or control from the user [11]. Another definition of Spyware is given as Software that gathers information about use of a computer, usually without the knowledge of the owner of the computer, and relays the information across the Internet to a third party location [12]. Spyware is sometimes known as scumware, stealware, theftware and occasionally mixed up with computer virus and worm [13]. Spyware as the term appeared on 16 October 1995 in a Usenet post in which hardware which can be used for espionage was given this name. In 2000 the founder of Zone Labs, Gregor Freund used Spyware as a term in a press release for their firewall product [14]. Many Spyware usually come as part of a software (pre-installed software, downloaded from the web or software purchased). Parallel to this, Spyware may come via as an attachment, part of the message or may through a hyperlink on . Spyware can be capable of capturing keystrokes, taking screen shots of user activity, saving or storing personal information. Unfortunately, it can lead to financial loss as in identity theft and credit card fraud [15] Adware In 1987, the first publicly recorded use of the word adware appeared on the Internet in the Usenet Newsgroup comp.sys.mac. Amusingly, the post refers to a Macintosh application rather than normal application. Until 15 years later, Permissioned Media, INC released a software program that sent a link to itself to everyone in the Outlook contact list [16]. Adware and spyware have several similarities, where both try to gather information from the user. However, Adware focuses on marketing, advertisements (by using popup) or tries to redirect a user to other web pages rather than Spyware. 3. Malware Detection Techniques A malware detector (commonly known as virus scanner) is the implementation of some malware detection techniques. The malware detector attempts to determine whether a program has malware behavior [17]. The malware detectors use a pattern matching approach which is susceptible to obfuscations used by hackers. A malware detector identifies and contains malware before it can reach a computer or network. Current malware detectors are based on scan string or signatures, suspicious byte sequences of instructions and data. The antivirus software will compare their database with the files on hard disk, USB as well as within RAM. Malware detectors take two inputs: Knowledge of the malware signature or behavior and the other is the program under inspection. Once the malware detector has the knowledge of what is considered malicious behavior and the program under inspection, it can employ its detection technique to decide if the program is malware or benign [17]. Besides that malware detector is usually a part of Intrusion Detection Systems (IDS). Techniques used for detecting malware have two main categories as illustrated in figure 4: behaviorbased detection and signature-based detection. 47

7 3.1. Behavior-based Detection Figure 4. Malware detection Techniques. Behavior based detection has a big difference with surface scanning method. Behavior based detection detects malware by identifying actions performed by the malware, while surface scanning method detects malware by binary pattern. Behavior-based detection doesn t rely on virus signature database to detect malware. The programs having the same behavior but different syntax are collected. Thus, various samples of malware can be identified with this single behavior signature. Behavior based detection can help to detect the malware that keep on generating new mutants. The new mutants generated will always use the services and system resources in the same similar manner. The behavior based detection is basically made up of three components, which are data collection, interpretation and matching algorithm. For the data collection, this component is used to collect the captured static and dynamic information. For interpretation, this component s main function is to convert collected raw information into intermediate representations. For matching algorithm, this component will compare each representation with the behavior signature. Figure 5 illustrates the behavior malware detection technique. Figure 5. Behavior detectors [18] 48

8 3.2. Specification-based Detection Specification-based detection is one of the types of behavior-based detection. However, the limitation of specification-based detection system is that it is usually difficult to accurately specify the entire set of valid behaviors a system should exhibit. Dynamic Specification-based Detection: use behavior observed at runtime to determine the maliciousness of an executable. Static Specification-based Detection: The malware is determined with PUI s structural properties. Hybrid Specification-based Detection 3.3. Signature-based Detection According to [19], each virus will have the signature of the developer and the signatures usually are a sequence of bytes within the malware code to declare that the program scanned is malicious in nature. Malware are categorized into three groups: basic, polymorphic and metamorphic malwares. Figure 3 shows that the program entry points have been changed and the malicious code has been added behind the program s original code. Figure 6 shows that basic kind of virus [19]. Figure 6. Basic kind of virus [19] The difference between basic malware and polymorphic is that polymorphic malware have involved the encrypted malicious code with the decryption code. Inside the virus code, there is a polymorphic engine to enable the polymorphic virus. Each time when the polymorphic virus is executed, the polymorphic engine will produce or mutate the new virus. According to [19], using signature-based detection to detect the virus is such a difficult task because each transformed virus will auto generate a new signature. Therefore, it is the difficult part for signature-based detection. Figure 7 shows polymorphic virus [19]. Figure 7. Polymorphic virus [19] Metamorphic malware is self-replicated. It will be able to reprogram itself by using the certain obfuscation techniques. When each new variant is produced, the signature will be different with the previous signature. Besides that, it is hard to store each signature that comes from the same malware after it is generated. According to [19], after disassembly, the engine will alter the program code and create a new code that keeps the previous functionality, but the interface will be different between the original and the new code. Figure 8 shows metamorphic malware [19]. Figure 8. Metamorphic virus [19] In addition, there were several works on analysis of cloud and virtualized environments [20-22], privacy issues that may arise during forensics investigation [23-28], mobile device investigation [29-30] and greening digital forensics process [31-32]. 49

9 4. Conclusion and future work The malware threats faced by computer users have been increasing from year to years. Malware nowadays is getting more intelligent and able to attack user computer in many different ways. It is impossible to detect and eliminate all malware as new malware is being created every day; there are no ways a computer user can escape from threat of these malwares. For sure, the information security and malware prevention technologies need to be constantly updated as the malware evolves continuously. The defensive communities against malware need to continuously improve their capabilities and invent new defensive and security technologies that can help to give a better protection to computer user against malware threats. Keeping up-to-date about the newest malware threat is essential for every computer user if they don t want to fall inside the trap of malware and become the next victim of malware. The law should be reinforced and heavier penalties or punishments need to be enforced to those who are involved in the illegal activity over internet. 5. Acknowledgments This work has been supported by the MOSTI- Science Fund project SF1677. The views and opinions expressed in this article are those of authors alone and not the organizations with whom authors are or have been associated/supported. 6. References [1] ED Skoudis, Lenny Zeltser, Malware: Fighting Malicious Code, Pearson, [2] John Aycock, Computer Viruses and Malware, Springer, pp.25-26, [3] ED Skoudis, Lenny Zeltser, Malware: Fighting Malicious Code, Pearson, Chapter 1, [4] John Aycock, Computer Viruses and Malware, Springer, pp.28-29, [5] ED Skoudis, Lenny Zeltser, 2004, Malware: Fighting Malicious Code, Pearson, Chapter 2 Viruses. [6] John Aycock, 2006, Computer Viruses and Malware, Springer, pp [7] ED Skoudis, Lenny Zeltser, 2004, Malware: Fighting Malicious Code, Pearson, Chapter 5 Backdoors. [8] Lenny (2003) Malware Fighting Malicious Code. Prentice Hall PTR. [9] P. Ferrie and F. Perriot. Detecting complex viruses. SecurityFocus, 6 December [10] Lenny (2003) Malware Fighting Malicious Code. Prentice Hall PTR. [11] M. Boldt, B. Carlsson, Privacy-Invasive Software and Mechanisms, Systems and Networks Communications, International Conference, pp 21, Oct [12] Lenny (2003) Malware Fighting Malicious Code. Prentice Hall PTR. [13] Richard H. Stern, FTC cracks down on Spyware and PC hijacking, but not true lies, IEEE Computer Society, [14] Mathias Klang, Spyware: Paying for Sofware with our Privacy, International Review of law Computers & Technology, vol. 17, no. 3, pages , November [15] Zone Alarm, Press Release 2000, (Date access: ). [16] Spyware. (Date access: ) [17] Eric Chien, Techniques of Adware and Spyware, Symantec security, [18] Greoigre Jacob,Herve Debar,Eric Fillol, Behavioral detection of malware:from a survey towards an established taxonomy,springer-verlag France 2008 [19] Vinod P.,Survey on Malware Detection Methods. [20] Farid Daryabar, Ali Dehghantanha, Farhood Norouzi, Farbod Mahmoodi, Analysis of Virtual Honeynet and VLAN-Based Virtual Networks, in the 2011 IEEE International Symposium on Humanities, Science & Engineering Research (SHUSER2011), 5-8 Jun 2011, Kuala Lumpor- Malaysia. [21] Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida binti Mohd Sani, and Solahuddin bin Shamsuddin, "Towards secure model for SCADA systems", In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, pp IEEE, [22] Farhood Norouzizadeh Dezfouli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, and Solahuddin bin Shamsuddin, "Volatile memory acquisition using backup for forensic investigation", In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on, pp IEEE, [23] M. Damshenas, A. Dehghantanha, R. Mahmoud, S. Bin Shamsuddin, Forensics investigation challenges in cloud computing environments, Cyber Warfare and Digital Forensics (CyberSec), pp , [24] S. H. Mohtasebi, A. Dehghantanha, Defusing the Hazards of Social Network Services, International Journal of Digital Information, pp ,

10 [25] A. Dehghantanha, R. Mahmod, N. I Udzir, Z.A. Zulkarnain, User-centered Privacy and Trust Model in Cloud Computing Systems, Computer And Network Technology, pp , [26] A. Dehghantanha, Xml-Based Privacy Model in Pervasive Computing, Master thesis- University Putra Malaysia [27] C. Sagaran, A. Dehghantanha, R Ramli, A User-Centered Context-sensitive Privacy Model in Pervasive Systems, Communication Software and Networks, pp , [28] A. Dehghantanha, N. Udzir, R. Mahmod, Evaluating user-centered privacy model (UPM) in pervasive computing systems, Computational Intelligence in Security for Information Systems, pp , [29] A. Dehghantanha, R. Mahmod, UPM: User-Centered Privacy Model in Pervasive Computing Systems, Future Computer and Communication, pp , [30] S. Parvez, A. Dehghantanha, HG. Broujerdi, Framework of digital forensics for the Samsung Star Series phone, Electronics Computer Technology (ICECT), Volume 2, pp , [31] S. H. Mohtasebi, A. Dehghantanha, H. G. Broujerdi, Smartphone Forensics: A Case Study with Nokia E5-00 Mobile Phone, International Journal of Digital Information and Wireless Communications (IJDIWC),volume 1, issue 3, pp , [32] Nor Fazlida Binti Mohd Sani, Solahuddin bin Shamsuddin, "A Data-centric Model for Smartphone Security", IJACT, Vol. 5, No. 9, pp. 9-17,

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are: Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define

More information

ANTIVIRUS BEST PRACTICES

ANTIVIRUS BEST PRACTICES ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject

More information

What are Viruses, Trojans, Worms & Spyware:

What are Viruses, Trojans, Worms & Spyware: What are Viruses, Trojans, Worms & Spyware: There are many different types of computer viruses circulating in the cyber world, including regular Computer Viruses, Worms, Trojans, and Spyware. Each is different

More information

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and

More information

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

PROTECT YOUR COMPUTER AND YOUR PRIVACY! PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That

More information

COMPUTER-INTERNET SECURITY. How am I vulnerable?

COMPUTER-INTERNET SECURITY. How am I vulnerable? COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer

More information

Computer Security DD2395

Computer Security DD2395 Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

OCT Training & Technology Solutions [email protected] (718) 997-4875

OCT Training & Technology Solutions Training@qc.cuny.edu (718) 997-4875 OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,

More information

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent

More information

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft) 1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction

More information

Chapter 14 Computer Threats

Chapter 14 Computer Threats Contents: Chapter 14 Computer Threats 1 Introduction(Viruses,Bombs,Worms) 2 Categories of Viruses 3 Types of Viruses 4 Characteristics of Viruses 5 Computer Security i. Antivirus Software ii. Password,

More information

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats

Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ Ola.Flygt@vxu.se +46 470 70 86 49. Viruses and Related Threats Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus

More information

Computer Viruses: How to Avoid Infection

Computer Viruses: How to Avoid Infection Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you

More information

Introduction to Computer Security Table of Contents

Introduction to Computer Security Table of Contents Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...

More information

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS

ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions

More information

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:

More information

Countermeasures against Spyware

Countermeasures against Spyware (2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?

More information

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor

More information

Don t Fall Victim to Cybercrime:

Don t Fall Victim to Cybercrime: Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project

WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure

More information

Student Tech Security Training. ITS Security Office

Student Tech Security Training. ITS Security Office Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

Network Incident Report

Network Incident Report To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850

More information

Understanding Virus Behavior in 32-bit Operating Environments

Understanding Virus Behavior in 32-bit Operating Environments Understanding Virus Behavior in 32-bit Operating Environments Executive Summary Computer Viruses and How They Spread Types of Viruses How Viruses Spread Virus Damage Viruses in a Windows 95 Environment

More information

Computer Security Maintenance Information and Self-Check Activities

Computer Security Maintenance Information and Self-Check Activities Computer Security Maintenance Information and Self-Check Activities Overview Unlike what many people think, computers are not designed to be maintenance free. Just like cars they need routine maintenance.

More information

WHITE PAPER. Understanding How File Size Affects Malware Detection

WHITE PAPER. Understanding How File Size Affects Malware Detection WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through

More information

Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

Module 5: Analytical Writing

Module 5: Analytical Writing Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop

More information

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK Prepared By: Raghda Zahran, Msc. NYIT-Jordan campus. Supervised By: Dr. Lo ai Tawalbeh. November 2006 Page 1 of 8 THE WAR AGAINST BEING AN INTERMEDIARY

More information

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/

More information

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs

Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer

More information

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are

More information

(Self-Study) Identify How to Protect Your Network Against Viruses

(Self-Study) Identify How to Protect Your Network Against Viruses SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses

More information

By:XÇzA A TÅÅtÜ ]A `t{åééw

By:XÇzA A TÅÅtÜ ]A `t{åééw By:XÇzA A TÅÅtÜ ]A `t{åééw By: Supervised By:Dr.. Lo ai Tawalbeh 1 New York Institute of Technology (NYIT)-Jordan s Campus Eng. Ammar Mahmood Introduction A backdoor in a computer system (or cryptosystem

More information

PC Security and Maintenance

PC Security and Maintenance PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-

More information

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define the term, computer security risks, and briefly

More information

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY Hector J. Garcia, Jr., Texas A&M University-Kingsville Dr. Ralph Reilly, University of Hartford Dr. Jack D. Shorter, Texas A&M University-Kingsville,

More information

Intruders and viruses. 8: Network Security 8-1

Intruders and viruses. 8: Network Security 8-1 Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds

More information

CS 356 Lecture 9 Malicious Code. Spring 2013

CS 356 Lecture 9 Malicious Code. Spring 2013 CS 356 Lecture 9 Malicious Code Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That)

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) N-CAP Users Guide Everything You Need to Know About Using the Internet! How Worms Spread via Email (and How to Avoid That) How Worms Spread via Email (and How to Avoid That) Definitions of: A Virus: is

More information

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the

More information

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware

Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Application of Data Mining based Malicious Code Detection Techniques for Detecting new Spyware Cumhur Doruk Bozagac Bilkent University, Computer Science and Engineering Department, 06532 Ankara, Turkey

More information

Security A to Z the most important terms

Security A to Z the most important terms Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from

More information

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans

More information

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12 Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,

More information

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar

More information

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

How To Understand What A Virus Is And How To Protect Yourself From A Virus

How To Understand What A Virus Is And How To Protect Yourself From A Virus Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?

More information

Remote Deposit Quick Start Guide

Remote Deposit Quick Start Guide Treasury Management Fraud Prevention How to Protect Your Business Remote Deposit Quick Start Guide What s Inside We re committed to the safety of your company s financial information. We want to make you

More information

BE SAFE ONLINE: Lesson Plan

BE SAFE ONLINE: Lesson Plan BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take

More information

Executable Integrity Verification

Executable Integrity Verification Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network

More information

Spyware. Summary. Overview of Spyware. Who Is Spying?

Spyware. Summary. Overview of Spyware. Who Is Spying? Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it

More information

Anti-Virus Evasion Techniques and Countermeasures

Anti-Virus Evasion Techniques and Countermeasures Anti-Virus Evasion Techniques and Countermeasures Author: Debasis Mohanty www.hackingspirits.com Email ID: [email protected] [email protected] Table of Contents 1. INTRODUCTION............3 2.

More information

ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Computer Security And Privacy Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Slides Used In The Course A note on the use of these slides: These

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

COB 302 Management Information System (Lesson 8)

COB 302 Management Information System (Lesson 8) COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this

More information

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005

More information

Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1

Spyware Analysis. jan.monsch@csnc.ch. Security Event - April 28, 2004 Page 1 Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:[email protected] Outline of Information Security Introduction Impact of information Need

More information

What is Web Security? Motivation

What is Web Security? Motivation [email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

Secure Your Mobile Workplace

Secure Your Mobile Workplace Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in

More information

Keystroke Encryption Technology Explained

Keystroke Encryption Technology Explained Keystroke Encryption Technology Explained Updated February 9, 2008 [email protected] (800) 650-3670 www.bluegemsecurity.com Executive Summary BlueGem Security is introducing keystroke encryption

More information

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data

Avoiding Malware in Your Dental Practice. 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice 10 Best Practices to Defend Your Data Avoiding Malware in Your Dental Practice Like most small business owners, you must protect your dental practice s computer

More information

PROACTIVE PROTECTION MADE EASY

PROACTIVE PROTECTION MADE EASY PROACTIVE PROTECTION AUTHOR: ANDREW NIKISHIN KASPERSKY LAB Heuristic Analyzer Policy-Based Security Intrusion Prevention System (IPS) Protection against Buffer Overruns Behaviour Blockers Different Approaches

More information

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications Learning objectives E-commerce Security Threats and Protection Mechanisms. This lecture covers internet security issues and discusses their impact on an e-commerce. Nov 19, 2004 www.dcs.bbk.ac.uk/~gmagoulas/teaching.html

More information

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices 350 PIERS Proceedings, Cambridge, USA, July 5 8, 2010 Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices Dung Vu Pham 1, Malka N. Halgamuge 2, Ali Syed 1, and Priyan

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

CS549: Cryptography and Network Security

CS549: Cryptography and Network Security CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared

More information

CIT 480: Securing Computer Systems. Malware

CIT 480: Securing Computer Systems. Malware CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware

More information

IBM Protocol Analysis Module

IBM Protocol Analysis Module IBM Protocol Analysis Module The protection engine inside the IBM Security Intrusion Prevention System technologies. Highlights Stops threats before they impact your network and the assets on your network

More information

A Proposed Architecture of Intrusion Detection Systems for Internet Banking

A Proposed Architecture of Intrusion Detection Systems for Internet Banking A Proposed Architecture of Intrusion Detection Systems for Internet Banking A B S T R A C T Pritika Mehra Post Graduate Department of Computer Science, Khalsa College for Women Amritsar, India [email protected]

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

How Spyware and Anti-Spyware Work

How Spyware and Anti-Spyware Work 22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade

More information

Computer Networks & Computer Security

Computer Networks & Computer Security Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

Computer Virus Strategies and Detection Methods

Computer Virus Strategies and Detection Methods Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008 Computer Virus Strategies and Detection Methods Essam Al Daoud 1, Iqbal H. Jebril 2 and Belal Zaqaibeh 3 1 Department of Computer Science,

More information

Information Security Threat Trends

Information Security Threat Trends Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing

More information

Threat Events: Software Attacks (cont.)

Threat Events: Software Attacks (cont.) ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to

More information

Hackers: Detection and Prevention

Hackers: Detection and Prevention Computer Networks & Computer Security SE 4C03 Project Report Hackers: Detection and Prevention Due Date: March 29 th, 2005 Modified: March 28 th, 2005 Student Name: Arnold Sebastian Professor: Dr. Kartik

More information

Cyber Security Awareness

Cyber Security Awareness Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure

More information