Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer...
-
date post
21-Dec-2015 -
Category
Documents
-
view
220 -
download
2
Transcript of Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer...
![Page 1: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/1.jpg)
Malicious Attacks
![Page 2: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/2.jpg)
Introduction
• Commonly referred to as: malicious software/ “malware”, computer viruses
• Designed to enter computers without the owner’s permission
![Page 3: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/3.jpg)
Background
• Started out as “pranks,” more annoying than harmful, created by programmers to see range until around 1999
• 2001 viruses started to be used as forms as vandalism: destroying files, corrupting system
• 2003 Broadband Internet profit promotion via email spam, spyware advertising
![Page 4: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/4.jpg)
• Viruses first spread via floppy disks activated when program runs or disk boots
• 1990 Microsoft Windows platform rising of “macro viruses”—damage documents instead of applications
![Page 5: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/5.jpg)
Recovery Methods
• System Restore – restores the registry and critical system files to a previous checkpoint
• Reinstall the operation system – 1. reformat the computer’s hard drive 2. install OS from its original media
• These methods are simpler and faster than most anti-virus software
• However, the computer’s user preferences must be restored every time; while backing up software, one may put another computer in danger
• Anti-virus software prevents, detects, and removes viruses from computers (sometimes downgrades a computer’s performance
![Page 6: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/6.jpg)
Phishing
![Page 7: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/7.jpg)
Phishing
• Phishing: attempting to get private information like usernames and passwords by pretending to be a trustworthy source.
![Page 8: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/8.jpg)
• Usually takes place through email and instant messaging– Links that prompt one to put info into what looks
like a legitimate site.
• First known case of Phishing was done in 1996
• Started with cases in AOL, then moved to financial institutions
![Page 9: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/9.jpg)
• Social Networking Sites are now the target of Phishing
• Most methods of phishing make a link appear to belong to a fake organization. – Misspelled URLs or the use of sub domains are
common tricks– Phishers have used images instead of text to make
it harder for anti-phishing filters to detect text commonly used in phishing e-mails
![Page 10: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/10.jpg)
WHAT IS A COMPUTER VIRUS?
“A COMPUTER PROGRAM ABLE TO INFECT OTHER PROGRAMS BY
MODIFYING THEM TO INCLUDE A POSSIBLY EVOLVED VERSION OF
ITSELF”
![Page 11: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/11.jpg)
TYPES OF VIRUSES
• BOOT PARTITION INFECTING VIRUS• EXECUTABLE FILE INFECTING VIRUS• MULTI-PART VIRUS• DIRECTORY INFECTING VIRUS
![Page 12: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/12.jpg)
WHAT CAN THEY DO?
• FORMAT DISK• COPY, RENAME, AND DELETE FILES• COPY THEMSELVES WITH NEW
CONFIGURATION INFORMATION• MODIFY FILE DATES AND EXTENTIONS• CALL OTHER COMPUTERS TO UPLOAD AND
DOWNLOAD FILES
![Page 13: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/13.jpg)
HOW DO THEY DO IT?
• APPENDING• INSERTION• INTERCEPTION• REDIRECTION• REPLACEMENT
![Page 14: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/14.jpg)
Prevention
• Install software such as; firewalls, a spyware scanner, a Trojan horse program, and antivirus programs• Run up to date scans
• Don’t download materials from questionable sources
• Remove unused communication ports• Understand how an attack could happen
so you see one coming
![Page 15: Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.](https://reader030.fdocuments.us/reader030/viewer/2022032522/56649d615503460f94a4254c/html5/thumbnails/15.jpg)
Conclusion
• There are six types of malicious attacks: trojan horses, worms, viruses, hoaxes, spam, and phishing
• Good computer practices can help a user minimize the threat of a malicious attack