CS574 Computer Security. San Diego State University Spring 2008 Lecture #7



Similar documents
(General purpose) Program security. What does it mean for a pgm to be secure? Depends whom you ask. Takes a long time to break its security controls.

Malicious Software. Ola Flygt Växjö University, Sweden Viruses and Related Threats

CS549: Cryptography and Network Security

Intruders and viruses. 8: Network Security 8-1

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

Computer Security DD2395

Malicious Programs. CEN 448 Security and Internet Protocols Chapter 19 Malicious Software

Chapter 14 Computer Threats

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Computer Networks & Computer Security

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Hackers: Detection and Prevention

Security. Definitions

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Network and Host-based Vulnerability Assessment

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

(Self-Study) Identify How to Protect Your Network Against Viruses

Incident categories. Version (final version) Procedure (PRO 303)

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Data Management Policies. Sage ERP Online

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Introduction to Computer Security Table of Contents

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Malware. Björn Victor 1 Feb [Based on Stallings&Brown]

WHITE PAPER. Understanding How File Size Affects Malware Detection

Advanced Endpoint Protection Overview


Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

Network Incident Report

Incident Reporting Guidelines for Constituents (Public)

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Computer Viruses: How to Avoid Infection

Malware: Malicious Code

Incident Categories (Public) Version (Final)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

INFORMATION SECURITY INCIDENT MANAGEMENT PROCESS

CIT End User Device Policy

Data Management & Protection: Common Definitions

Network Security and the Small Business

CS 356 Lecture 9 Malicious Code. Spring 2013

Computer Security Threats

COB 302 Management Information System (Lesson 8)

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Internet Security. For Home Users

EXIN Information Security Foundation based on ISO/IEC Sample Exam

CS52600: Information Security

Executable Integrity Verification

Optimizing and Protecting Hard Drives Chapter # 9

Cyril Onwubiko Networking and Communications Group ncg.kingston.ac.

CS 392/681 - Computer Security. Module 16 Vulnerability Analysis

Penetration Testing Service. By Comsec Information Security Consulting

ANTI-VIRUS POLICY OCIO TABLE OF CONTENTS

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Information Resource Management Directive USAP Software Management and Protection

Weighted Total Mark. Weighted Exam Mark

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Network Security Policy

Application Intrusion Detection

IDS or IPS? Pocket E-Guide

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

1949 Self-reproducing cellular automata Core Wars

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Department of Computer & Information Sciences. INFO-450: Information Systems Security Syllabus

Seminar Computer Security

BBM 461: SECURE PROGRAMMING INTRODUCTION. Ahmet Burak Can

SECURITY THREATS: A GUIDE FOR SMALL AND MEDIUM BUSINESSES

N-CAP Users Guide. Everything You Need to Know About Using the Internet! How Worms Spread via (and How to Avoid That)

Network Security Foundations

Data Security Incident Response Plan. [Insert Organization Name]

IT Security Procedure

CSE331: Introduction to Networks and Security. Lecture 15 Fall 2006

Optimizing Windows Security Features to Block Malware and Hack Tools on USB Storage Devices

ANTIVIRUS BEST PRACTICES

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

Sophos Endpoint Security and Control Help

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Network Security. Chapter 12. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Transcription:

CS574 Computer Security San Diego State University Spring 2008 Lecture #7

Today s Structure Administrivia Questions Recent News Lecture

Administrivia Assignment #1 - AS1_Template.jar Alternative Tools You sending email to me Me sending email to you

Questions?

Recent News Dangers of encrypting everything Security Blackmail Lost laptop and $54 million lawsuit Networked (multifunction) printers

Lecture

On Trust Ken Thompson - On Trusting Trust Leonid A. Broukis s one-line program: char*a= char*a=%c%s%c;main(){printf(a,34,a,34);} ;main(){printf(a,34,a,34);}

Terms agent The creator or distributor of malicious programs. flaw An observable departure from specification (typically unexpected / undesired behavior). fault The incorrect step/process/etc. that causes a flaw.

(Malicious) Software Intentional versus Inadvertent Violation of Policy Benign/Beneficial versus Harmful/Destructive

Policy Violations Intrusion / monitoring Data theft System destruction Data destruction or modification Theft / denial of services Make vulnerable to future attack Use as a base to attack others

Types of Malicious Software Bomb Back door Trojan horse Virus Rabbit Worm

Bombs A device set to go off under specified conditions. A logic bomb is a piece of malicious code triggered by some event (after the agent has left). A time bomb is a specific type of logic bomb triggered by the data or an elapsed interval.

Example Bombs A directory bomb is a program that exhausts some filesystem resource, such as available inodes or directory-depth limits. A fork bomb is a program that exhausts the available PIDs for a system.

Back Door A back door (or trap door) is a way in to a system that allows the agent to (re)gain control. May be a standalone program, trojan horse, or system modification. Often part of a virus or worm payload. May systems (used to) ship with back doors.

Trojan Horse A trojan horse is a program that does something other than what is advertised. Obviously a reference to Greek mythology. Often part of a root kit. Examples

Virus A virus is a trojan horse that makes other programs into trojan horses. Alternatively, a virus is a malicious program that can alter non-malicious programs, making them malicious. Typically made up of at least one vector and a potentially multi-part payload.

Virus Deliberate analogy to biological viruses. Concept described ~ 1970. First personal computer viruses in the 1980s. Typically infects files on a single computer.

Virus Infection A virus attaches itself to a program. Can insert itself virtually anywhere in the program (most often beginning or end). May run before, after, or concurrently with the program. Nearly always changes file size, checksum, digital hash value, etc.

Virus - Vector The vector of a virus is the means it uses to spread itself. Process: Find other (executable) programs locally; Insert self in to those programs. May or may not know about the program it is infecting.

Virus Types Memory-resident Application-resident (aka transient) Document Boot Sector / Auto Run

Virus Payload The payload of a virus are those additional functions beyond what is needed to replicate the virus. Payloads are frequently time or other logic bombs. A non-malicious (or proof-of-concept ) virus can easily be made malicious by adding or changing the payload.

Example delayed functions: Virus Payload Wait for a specified date. Count the reboots. Wait for some interval after infection. Wait for the disk to be full. Watch for some specific program to be run.

Virus Payload Example payloads: Format drives Modify or erase files Display messages Re-infect system

Virus Design Objectives Difficult to detect. Not easily destroyed or deactivated. Attaches to many other programs. Reinfection should not cause problems. Easy to create or adapt. Machine / Operating System independent.

Non-Malicious Viruses? Is it possible to have a non-malicious virus? Examples often include: look for malicious viruses to remove compress programs to save disk space fix vulnerabilities in the host system Inadvertent effects range from negligible to disastrous (might as well be malicious).

Rabbit A piece of malicious code that replicates without bound in order to exhaust resources (e.g., a fork bomb). Less commonly used to refer to a piece of malicious code that is difficult to catch.

Aside: Exploits An exploit (or sploit) is a program that takes advantage of known flaws to gain control or access to a system. Also refers to the act of using such a program. Often via unpublicized back doors, buffer overflows, etc. Often packaged for easy/widespread use.

Further Aside: Vulnerability Scanner A vulnerability scanner is a program that automates the process of locating vulnerable hosts on a network. Generally built on a database of known vulnerabilities and way to check for them. A legitimate tool for a system administrator. And ideal tool for an opportunistic intruder.

Worm A worm is a program that spreads among computers without human intervention. A worm s vector typically includes some network-aware functions: scan networks for vulnerable hosts exploit remote vulnerabilities copy self to victim, and run

Worm Vectors Shares many techniques with viruses. Often have a vulnerability scanner. Have one or more exploits. Can be (but don t have to be) multi-platform.

Worm Payloads Trojan horse(s) Back doors Time / logic bombs Just about any other malicious code

Next Time Worm examples Software flaws More malicious code Controls

Lecture References Pfleeger, Security in Computing, 3rd & 4th edition Bishop, Introduction to Computer Security

End Lecture

Reading (For the next few classes) Pfleeger, Chapter 3 (finish) Pfleeger, Chapter 4 (start)

Finis