Malware: Malicious Software
|
|
|
- Georgina Franklin
- 10 years ago
- Views:
Transcription
1 Malware: Malicious Software 10/21/2010 Malware 1 Viruses, Worms, Trojans, Rootkits Malware can be classified into several categories, depending on propagation and concealment Propagation Virus: human-assisted propagation (e.g., open attachment) Worm: automatic propagation without human assistance Concealment Rootkit: modifies operating system to hide its existence Trojan: provides desirable functionality but hides malicious operation Various types of payloads, ranging from annoyance to crime 10/21/2010 Malware 2
2 Insider Attacks An insider attack is a security breach that is caused or facilitated by someone who is a part of the very organization that controls or builds the asset that should be protected. In the case of malware, an insider attack refers to a security hole that is created in a software system by one of its programmers. 10/21/2010 Malware 3 Backdoors A backdoor, which is also sometimes called a trapdoor, is a hidden feature or command in a program that allows a user to perform actions he or she would not normally be allowed to do. When used in a normal way, this program performs completely as expected and advertised. But if the hidden feature is activated, the program does something unexpected, often in violation of security policies, such as performing a privilege escalation. Benign example: Easter Eggs in DVDs and software 10/21/2010 Malware 4
3 Logic Bombs A logic bomb is a program that performs a malicious action as a result of a certain logic condition. The classic example of a logic bomb is a programmer coding up the software for the payroll system who puts in code that makes the program crash should it ever process two consecutive payrolls without paying him. Another classic example combines a logic bomb with a backdoor, where a programmer puts in a logic bomb that will crash the program on a certain date. 10/21/2010 Malware 5 The Omega Engineering Logic Bomb An example of a logic bomb that was actually triggered and caused damage is one that programmer Tim Lloyd was convicted of using on his former employer, Omega Engineering Corporation. On July 31, 1996, a logic bomb was triggered on the server for Omega Engineering s manufacturing operations, which ultimately cost the company millions of dollars in damages and led to it laying off many of its employees. 10/21/2010 Malware 6
4 The Omega Bomb Code The Logic Behind the Omega Engineering Time Bomb included the following strings: 7/30/96 Event that triggered the bomb F: Focused attention to volume F, which had critical files F:\LOGIN\LOGIN Login a fictitious user, (the back door) CD \PUBLIC Moves to the public folder of programs FIX.EXE /Y F:\*.* Run a program, called FIX, which actually deletes everything PURGE F:\/ALL Prevent recovery of the deleted files 10/21/2010 Malware 7 Defenses against Insider Attacks Avoid single points of failure. Use code walk-throughs. Use archiving and reporting tools. Limit authority and permissions. Physically secure critical systems. Monitor employee behavior. Control software installations. 10/21/2010 Malware 8
5 Computer Viruses A computer virus is computer code that can replicate itself by modifying other files or programs to insert code that is capable of further replication. This self-replication property is what distinguishes computer viruses from other kinds of malware, such as logic bombs. Another distinguishing property of a virus is that replication requires some type of user assistance, such as clicking on an attachment or sharing a USB drive. 10/21/2010 Malware 9 Biological Analogy Computer viruses share some properties with Biological viruses Attack Penetration Replication and assembly Release 10/21/2010 Malware 10
6 Early History 1972 sci-fi novel When HARLIE Was One features a program called VIRUS that reproduces itself First academic use of term virus by PhD student Fred Cohen in 1984, who credits advisor Len Adleman with coining it In 1982, high-school student Rich Skrenta wrote first virus released in the wild: Elk Cloner, a boot sector virus (c)brain, by Basit and Amjood Farooq Alvi in 1986, credited with being the first virus to infect PCs 10/21/2010 Malware 11 Virus Phases Dormant phase. During this phase, the virus just exists the virus is laying low and avoiding detection. Propagation phase. During this phase, the virus is replicating itself, infecting new files on new systems. Triggering phase. In this phase, some logical condition causes the virus to move from a dormant or propagation phase to perform its intended action. Action phase. In this phase, the virus performs the malicious action that it was designed to perform, called payload. This action could include something seemingly innocent, like displaying a silly picture on a computer s screen, or something quite malicious, such as deleting all essential files on the hard drive. 10/21/2010 Malware 12
7 Infection Types Overwriting Destroys original code Pre-pending Keeps original code, possibly compressed Infection of libraries Allows virus to be memory resident E.g., kernel32.dll Macro viruses Infects MS Office documents Often installs in main document template virus original code compressed 10/21/2010 Malware 13 Degrees of Complication Viruses have various degrees of complication in how they can insert themselves in computer code. 10/21/2010 Malware 14
8 Concealment Encrypted virus Decryption engine + encrypted body Randomly generate encryption key Detection looks for decryption engine Polymorphic virus Encrypted virus with random variations of the decryption engine (e.g., padding code) Detection using CPU emulator Metamorphic virus Different virus bodies Approaches include code permutation and instruction replacement Challenging to detect 10/21/2010 Malware 15 Computer Worms A computer worm is a malware program that spreads copies of itself without the need to inject itself in other programs, and usually without human interaction. Thus, computer worms are technically not computer viruses (since they don t infect other programs), but some people nevertheless confuse the terms, since both spread by self-replication. In most cases, a computer worm will carry a malicious payload, such as deleting files or installing a backdoor. 10/21/2010 Malware 16
9 Early History First worms built in the labs of John Shock and Jon Hepps at Xerox PARC in the early 80s CHRISTMA EXEC written in REXX, released in December 1987, and targeting IBM VM/CMS systems was the first worm to use service The first internet worm was the Morris Worm, written by Cornell student Robert Tappan Morris and released on November 2, /21/2010 Malware 17 Worm Development Identify vulnerability still unpatched Write code for Exploit of vulnerability Generation of target list Random hosts on the internet Hosts on LAN Divide-and-conquer Installation and execution of payload Querying/reporting if a host is infected Initial deployment on a private network Worm template Generate target list For each host on target list Check if infected Check if vulnerable Infect Recur 10/21/2010 Malware 18
10 Worm Propagation Worms propagate by finding and infecting vulnerable hosts. They need a way to tell if a host is vulnerable They need a way to tell if a host is already infected. initial infection 10/21/2010 Malware 19 Propagation: Theory Classic epidemic model N: total number of vulnerable hosts I(t): number of infected hosts at time t S(t): number of susceptible hosts at time t I(t) + S(t) N : infection rate Differential equation for I(t): di dt I(t) S(t) More accurate models adjust propagation rate over time Source: Cliff C. Zou,Weibo Gong, Don Towsley, and Lixin Gao.The Monitoring and Early Detection of Internet Worms, IEEE/ACM Transactions on Networking, /21/2010 Malware 20
11 Propagation: Practice Cumulative total of unique IP addresses infected by the first outbreak of Code-RedI v2 on July 19-20, 2001 Source: David Moore, Colleen Shannon, and Jeffery Brown. Code-Red: a case study on the spread and victims of an Internet worm, CAIDA, /21/2010 Malware 21 Trojan Horses A Trojan horse (or Trojan) is a malware program that appears to perform some useful task, but which also does something with negative consequences (e.g., launches a keylogger). Trojan horses can be installed as part of the payload of other malware but are often installed by a user or administrator, either deliberately or accidentally. 10/21/2010 Malware 22
12 Current Trends Trojans currently have largest infection potential Often exploit browser vulnerabilities Typically used to download other malware in multi-stage attacks Source: Symantec Internet Security Threat Report, April /21/2010 Malware 23 Rootkits A rootkit modifies the operating system to hide its existence E.g., modifies file system exploration utilities Hard to detect using software that relies on the OS itself RootkitRevealer By Bryce Cogswell and Mark Russinovich (Sysinternals) Two scans of file system High-level scan using the Windows API Raw scan using disk access methods Discrepancy reveals presence of rootkit Could be defeated by rootkit that intercepts and modifies results of raw scan operations 10/21/2010 Malware 24
13 Malware Zombies Malware can turn a computer in to a zombie, which is a machine that is controlled externally to perform malicious attacks, usually as a part of a botnet. Botnet Controller (Attacker) Attack Commands Botnet: Attack Actions 10/21/ Victim Financial Impact Malware often affects a large user population Significant financial impact, though estimates vary widely, up to $100B per year (mi2g) Examples LoveBug (2000) caused $8.75B in damages and shut down the British parliament In 2004, 8% of s infected by W32/MyDoom.A at its peak In February 2006, the Russian Stock Exchange was taken down by a virus. 10/21/2010 Malware 26
14 Economics of Malware New malware threats have grown from 20K to 1.7M in the period Source: Symantec Internet Security Threat Report, April 2009 Most of the growth has been from 2006 to 2008 Number of new threats per year appears to be growing an exponential rate. 10/21/2010 Malware 27 Professional Malware Growth in professional cybercrime and online fraud has led to demand for professionally developed malware New malware is often a customdesigned variations of known exploits, so the malware designer can sell different products to his/her customers. Like every product, professional malware is subject to the laws of supply and demand. Recent studies put the price of a software keystroke logger at $23 and a botnet use at $225. Image by User:SilverStar from used by permission under the Creative Commons Attribution ShareAlike 3.0 License 10/21/2010 Malware 28
15 Adware software payload Adware Adware engine infects a user s computer Computer user Advertisers contract with adware agent for content Adware engine requests advertisements from adware agent Adware agent Adware agent delivers ad content to user Advertisers 10/21/2010 Malware 29 Spyware Spyware software payload 1. Spyware engine infects a user s computer. Computer user 2. Spyware process collects keystrokes, passwords, and screen captures. 3. Spyware process periodically sends collected data to spyware data collection agent. Spyware data collection agent 10/21/2010 Malware 30
16 Signatures: A Malware Countermeasure Scan compare the analyzed object with a database of signatures A signature is a virus fingerprint E.g.,a string with a sequence of instructions specific for each virus Different from a digital signature A file is infected if there is a signature inside its code Fast pattern matching techniques to search for signatures All the signatures together create the malware database that usually is proprietary 10/21/2010 Malware 31 Signatures Database Common Malware Enumeration (CME) aims to provide unique, common identifiers to new virus threats Hosted by MITRE ata/list.html Digital Immune System (DIS) Create automatically new signatures 10/21/2010 Malware 32
17 White/Black Listing Maintain database of cryptographic hashes for Operating system files Popular applications Known infected files Compute hash of each file Look up into database Needs to protect the integrity of the database 10/21/2010 Malware 33 Heuristic Analysis Useful to identify new and zero day malware Code analysis Based on the instructions, the antivirus can determine whether or not the program is malicious, i.e., program contains instruction to delete system files, Execution emulation Run code in isolated emulation environment Monitor actions that target file takes If the actions are harmful, mark as virus Heuristic methods can trigger false alarms 10/21/2010 Malware 34
18 Shield vs. On-demand Shield Background process (service/daemon) Scans each time a file is touched (open, copy, execute, etc.) On-demand Scan on explicit user request or according to regular schedule On a suspicious file, directory, drive, etc. Performance test of scan techniques o Comparative: check the number of already known viruses that are found and the time to perform the scan o Retrospective: test the proactive detection of the scanner for unknown viruses, to verify which vendor uses better heuristics Anti-viruses are ranked using both parameters: 10/21/2010 Malware 35 Online vs Offline Anti Virus Software Online Free browser plug-in Authentication through third party certificate (i.e. VeriSign) No shielding Software and signatures update at each scan Poorly configurable Scan needs internet connection Report collected by the company that offers the service Offline Paid annual subscription Installed on the OS Software distributed securely by the vendor online or a retailer System shielding Scheduled software and signatures updates Easily configurable Scan without internet connection Report collected locally and may be sent to vendor 10/21/2010 Malware 36
19 Quarantine A suspicious file can be isolated in a folder called quarantine: E.g,. if the result of the heuristic analysis is positive and you are waiting for db signatures update The suspicious file is not deleted but made harmless: the user can decide when to remove it or eventually restore for a false positive Interacting with a file in quarantine it is possible only through the antivirus program The file in quarantine is harmless because it is encrypted Usually the quarantine technique is proprietary and the details are kept secret 10/21/2010 Malware 37 Static vs. Dynamic Analysis Static Analysis Checks the code without trying to execute it Quick scan in white list Filtering: scan with different antivirus and check if they return same result with different name Weeding: remove the correct part of files as junk to better identify the virus Code analysis: check binary code to understand if it is an executable, e.g., PE Disassembling: check if the byte code shows something unusual Dynamic Analysis Check the execution of codes inside a virtual sandbox Monitor File changes Registry changes Processes and threads Networks ports 10/21/2010 Malware 38
20 Virus Detection is Undecidable Theoretical result by Fred Cohen (1987) Virus abstractly modeled as program that eventually executes infect Code for infect may be generated at runtime Proof by contradiction similar to that of the halting problem Suppose program isvirus(p) determines whether program P is a virus Define new program Q as follows: if (not isvirus(q)) infect stop Running isvirus on Q achieves a contradiction 10/21/2010 Malware 39 Other Undecidable Detection Problems Detection of a virus by its appearance by its behavior Detection of an evolution of a known virus Detection of a triggering mechanism by its appearance by its behavior Detection of a virus detector by its appearance by its behavior Detection of an evolution of a known virus a known triggering mechanism a virus detector 10/21/2010 Malware 40
21 Resources Computer Emergency Response Team Research center funded by the US federal government Vulnerabilities database Symantec Reports on malware trends Database of malware Art of Computer Virus Research and Defense by Peter Szor 10/21/2010 Malware 41
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Malicious Software. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49. Viruses and Related Threats
Malicious Software Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Outline Viruses and Related Threats Malicious Programs The Nature of Viruses Antivirus
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software
Cryptography and Network Security Chapter 21 Fifth Edition by William Stallings Chapter 21 Malicious Software What is the concept of defense: The parrying of a blow. What is its characteristic feature:
Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software
CEN 448 Security and Internet Protocols Chapter 19 Malicious Software Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis
Malicious Software Overview Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
CS549: Cryptography and Network Security
CS549: Cryptography and Network Security by Xiang-Yang Li Department of Computer Science, IIT Cryptography and Network Security 1 Notice This lecture note (Cryptography and Network Security) is prepared
(Self-Study) Identify How to Protect Your Network Against Viruses
SECTION 24 (Self-Study) Identify How to Protect Your Network Against Viruses The following objective will be tested: Describe What You Can Do to Prevent a Virus Attack In this section you learn about viruses
CS 356 Lecture 9 Malicious Code. Spring 2013
CS 356 Lecture 9 Malicious Code Spring 2013 Review Chapter 1: Basic Concepts and Terminology Integrity, Confidentiality, Availability, Authentication, and Accountability Types of threats: active vs. passive,
Intruders and viruses. 8: Network Security 8-1
Intruders and viruses 8: Network Security 8-1 Intrusion Detection Systems Firewalls allow traffic only to legitimate hosts and services Traffic to the legitimate hosts/services can have attacks CodeReds
Chapter 14 Computer Threats
Contents: Chapter 14 Computer Threats 1 Introduction(Viruses,Bombs,Worms) 2 Categories of Viruses 3 Types of Viruses 4 Characteristics of Viruses 5 Computer Security i. Antivirus Software ii. Password,
Computer Viruses: How to Avoid Infection
Viruses From viruses to worms to Trojan Horses, the catchall term virus describes a threat that's been around almost as long as computers. These rogue programs exist for the simple reason to cause you
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
Security Engineering Part III Network Security. Intruders, Malware, Firewalls, and IDSs
Security Engineering Part III Network Security Intruders, Malware, Firewalls, and IDSs Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Trend Micro OfficeScan 11.0. Best Practice Guide for Malware
Trend Micro OfficeScan 11.0 Best Practice Guide for Malware Information in this document is subject to change without notice. The names of companies, products, people, characters, and/or data mentioned
WORMS HALMSTAD UNIVERSITY. Network Security. Network Design and Computer Management. Project Title:
HALMSTAD UNIVERSITY Network Design and Computer Management Course Title: Network Security Project Title: WORMS Project members: - Tchape Philippe 841122-T099 - Jose Enrique Charpentier 830112-9154 Lecturer:
The Value of Physical Memory for Incident Response
The Value of Physical Memory for Incident Response MCSI 3604 Fair Oaks Blvd Suite 250 Sacramento, CA 95864 www.mcsi.mantech.com 2003-2015 ManTech Cyber Solutions International, All Rights Reserved. Physical
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
Malware. Björn Victor 1 Feb 2013. [Based on Stallings&Brown]
Malware Björn Victor 1 Feb 2013 Ask Sofia if anything is unclear/too difficult with the lab. Coordinate meetings between you? BadStore: demo version New York Times, Wall Street Journal attacks from China,
1949 Self-reproducing cellular automata. 1959 Core Wars
114 Virus timeline When did viruses, Trojans and worms begin to pose a threat? Most histories of viruses start with the Brain virus, written in 1986. That was just the first virus for a Microsoft PC, though.
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
Malware: Malicious Code
Malware: Malicious Code UIC 594/Kent Law: Computer and Network Privacy and Security: Ethical, Legal, and Technical Considerations 2007, 2008 Robert H. Sloan Malicious code: Viruses Most famous type of
ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Slides Used In The Course A note on the use of these slides: These
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
(General purpose) Program security These ideas apply also to OS and DB. Read Chapter 3. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.
By:XÇzA A TÅÅtÜ ]A `t{åééw
By:XÇzA A TÅÅtÜ ]A `t{åééw By: Supervised By:Dr.. Lo ai Tawalbeh 1 New York Institute of Technology (NYIT)-Jordan s Campus Eng. Ammar Mahmood Introduction A backdoor in a computer system (or cryptosystem
System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Email Security
Email Security SonicWALL Email Security 7.0 for Microsoft Small Business Server System Compatibility SonicWALL Email Security 7.0 Software is supported on systems with the following: Operating Systems
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security
WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security A World of Constant Threat We live in a world on constant threat. Every hour of every day in every country around the globe hackers
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Information Resource Management Directive 5000.14 USAP Software Management and Protection
The National Science Foundation Polar Programs United States Antarctic Program Information Resource Management Directive 5000.14 USAP Software Management and Protection Organizational Function Policy Category
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
How Spyware and Anti-Spyware Work
22 PART 1 INTERNET SECURITY CHAPTER 3 How Spyware and Anti-Spyware Work 23 THESE days, the biggest danger you face when you go onto the Internet might be spyware a type of malicious software that can invade
Sophos Endpoint Security and Control Help. Product version: 11
Sophos Endpoint Security and Control Help Product version: 11 Document date: October 2015 Contents 1 About Sophos Endpoint Security and Control...5 2 About the Home page...6 3 Sophos groups...7 3.1 About
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Module 5: Analytical Writing
Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Symantec Endpoint Protection Getting Started Guide
Symantec Endpoint Protection Getting Started Guide 12167130 Symantec Endpoint Protection Getting Started Guide The software described in this book is furnished under a license agreement and may be used
Active Threat Control
Active Threat Control Proactive Protection Against New and Emerging Threats Why You Should Read this White Paper The unprecedented rise of new threats has deemed traditional security mechanisms both ineffective
CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006
CSE331: Introduction to Networks and Security Lecture 15 Fall 2006 Worm Research Sources "Inside the Slammer Worm" Moore, Paxson, Savage, Shannon, Staniford, and Weaver "How to 0wn the Internet in Your
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
What Do You Mean My Cloud Data Isn t Secure?
Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Sophos Endpoint Security and Control Help
Sophos Endpoint Security and Control Help Product version: 10.3 Document date: June 2014 Contents 1 About Sophos Endpoint Security and Control...3 2 About the Home page...4 3 Sophos groups...5 4 Sophos
Best Practice Configurations for OfficeScan (OSCE) 10.6
Best Practice Configurations for OfficeScan (OSCE) 10.6 Applying Latest Patch(es) for OSCE 10.6 To find out the latest patches for OfficeScan, click here. Enable Smart Clients 1. Ensure that Officescan
ANTIVIRUS BEST PRACTICES
ANTIVIRUS BEST PRACTICES Antivirus Best Practices 1. Introduction This guideline covers the basics on Antivirus Software and its best practices. It will help to have an overall understanding of the subject
How To Understand What A Virus Is And How To Protect Yourself From A Virus
Viruses, Trojans and Worms Oh My! 2006 Technology Leadership Presentation Series Why is my computer running so slow? What are all of these little windows popping up on my system? Why did my home page change?
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
Spyware Analysis. [email protected]. Security Event - April 28, 2004 Page 1
Spyware Analysis [email protected] Security Event - April 28, 2004 Page 1 Content Definition & types of spyware Statistics Hooks Static vs. dynamic software analysis Test environment for spyware Analysis
Computer Networks & Computer Security
Computer Networks & Computer Security Software Engineering 4C03 Project Report Hackers: Detection and Prevention Prof.: Dr. Kartik Krishnan Due Date: March 29 th, 2004 Modified: April 7 th, 2004 Std Name:
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
CIT 480: Securing Computer Systems. Malware
CIT 480: Securing Computer Systems Malware Topics 1. Anti-Virus Software 2. Virus Types 3. Infection Methods 4. Rootkits 5. Malware Analysis 6. Protective Mechanisms 7. Malware Factories 8. Botnets Malware
What are Viruses, Trojans, Worms & Spyware:
What are Viruses, Trojans, Worms & Spyware: There are many different types of computer viruses circulating in the cyber world, including regular Computer Viruses, Worms, Trojans, and Spyware. Each is different
F-Secure Internet Security 2012
F-Secure Internet Security 2012 F-Secure Internet Security 2012 TOC 3 Contents Chapter 1: Getting started...7 How to use automatic updates...8 Check the update status...8 Change the Internet connection
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
PC Security and Maintenance
PC Security and Maintenance by IMRAN GHANI PC Maintenance and Security-Forecast. Major sources of danger. Important steps to protect your PC. PC Security Tools. PC Maintenance Tools. Tips. PC Security-
Anti-Virus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures Author: Debasis Mohanty www.hackingspirits.com Email ID: [email protected] [email protected] Table of Contents 1. INTRODUCTION............3 2.
ANTI-VIRUS POLICY OCIO-6006-09 TABLE OF CONTENTS
OCIO-6006-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. Purpose II. Authority III. Scope IV. Definitions V. Policy VI. Roles and Responsibilities VII. Exceptions
Symantec Mail Security for Domino
Getting Started Symantec Mail Security for Domino About Symantec Mail Security for Domino Symantec Mail Security for Domino is a complete, customizable, and scalable solution that scans Lotus Notes database
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
Sophos for Microsoft SharePoint Help
Sophos for Microsoft SharePoint Help Product version: 2.0 Document date: March 2011 Contents 1 About Sophos for Microsoft SharePoint...3 2 Dashboard...4 3 Configuration...5 4 Reports...27 5 Search...28
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
How to easily clean an infected computer (Malware Removal Guide)
How to easily clean an infected computer (Malware Removal Guide) Malware, short for malicious (or malevolent) software, is software used or programmed by attackers to disrupt computer operation, gather
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Introduction to Computer Security Table of Contents
Introduction to Computer Security Table of Contents Introduction... 2 1 - Viruses... 3 Virus Scanners... 3 2 - Spyware... 7 Spyware Scanners... 8 3 - Firewalls... 10 Windows Firewall... 10 4 - References...
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
Operation Liberpy : Keyloggers and information theft in Latin America
Operation Liberpy : Keyloggers and information theft in Latin America Diego Pérez Magallanes Malware Analyst Pablo Ramos HEAD of LATAM Research Lab 7/7/2015 version 1.1 Contents Introduction... 3 Operation
Storm Worm & Botnet Analysis
Storm Worm & Botnet Analysis Jun Zhang Security Researcher, Websense Security Labs June 2008 Introduction This month, we caught a new Worm/Trojan sample on ours labs. This worm uses email and various phishing
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005
Application Intrusion Detection
Application Intrusion Detection Drew Miller Black Hat Consulting Application Intrusion Detection Introduction Mitigating Exposures Monitoring Exposures Response Times Proactive Risk Analysis Summary Introduction
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
E-BUSINESS THREATS AND SOLUTIONS
E-BUSINESS THREATS AND SOLUTIONS E-BUSINESS THREATS AND SOLUTIONS E-business has forever revolutionized the way business is done. Retail has now a long way from the days of physical transactions that were
DDos Monitoring System using Cloud AV. 2009.09.30 AhnLab, Inc. SiHaeng Cho, Director of R & D Center
DDos Monitoring System using Cloud AV 2009.09.30 AhnLab, Inc. SiHaeng Cho, Director of R & D Center Table of Contents I. Recent Security Threat Trend II. III. Security Industry Response & Issues AhnLab
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control
Client Guide for Symantec Endpoint Protection and Symantec Network Access Control Client Guide for Symantec Endpoint Protection and Symantec Network Access Control The software described in this book is
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Self Protection Techniques in Malware
DSIE 10 5 th Doctoral lsymposium on Informatics Engineering i January 28 29, 2010 Porto, Portugal Self Protection Techniques in Malware Tiago Santos Overview Introduction Malware Types Why Self Protection?
Security. Definitions
Security While protection has been discussed throughout the class kernel vs. user mode, protected memory, file permissions these mechanisms have generally been focused on protection from accidental misuse
