Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

19
Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson

Transcript of Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Page 1: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Malicious Attacks

Nicole Hamilton, Dennis Meng, Alex

Shie, Lio Sigerson

Page 2: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

In terms of computing, a malicious attack can be any physical or electronic action taken with the intent of acquiring, destroying, modifying, or accessing a user’s data without permission.

Physical attacks typically mean either the theft of hardware storing personal/confidential information or the destruction of said hardware.

Electronic attacks (the focus of this presentation) involve unauthorized access or unauthorized modification of the user’s computer.

What is a malicious attack?

Page 3: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Unauthorized Access

The attacker accesses the victim’s data by acquiring the victim’s password

People sometimes pick easy to guess passwords (unless they take C@CM)

People sometimes write down their passwords on paper or tell their friends

Attackers can write a password generator

The password may be acquired through spoofing or phishing (defined in later slides)

Page 4: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Types of malicious attacks

Viruses

Worms

Trojan horses

Logic bombs (a.k.a. Time bombs)

Trapdoors

Phishing/Spoofing

Page 5: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Virus – a program capable of copying itself to another. Viruses usually steal/destroy data, but a very small majority are simply pranks.

Worm – a type of virus that does not need human aid to proliferate. Usually worms will spread via networks or the Internet.

Trojan – a type of virus that disguises itself as a legitimate program.

Page 6: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Logic bombs (Time Bombs)

pieces of code that remain inactive until a certain event specified by the attacker occurs; then the bomb renders the

system inoperable.

Page 7: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Trapdoors – a code placed within

the system that allows a third party to bypass system

security at any convenient time.

Page 8: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Phishing – using a fake website to steal personal information

Spoofing – similar to phishing, except the dummy object is now a log-on screen that asks for a user name

and password that gets passed on to the attacker.

Page 9: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

History of malicious attacks

First viruses distributed through infected floppy disks, originally caused by programming errors

1982 – Logic bomb used in the “Trans-Siberian Pipeline incident”

1984 – Fred Cohen first uses the term “computer virus”

1986 – First “Trojan Horse” appears (PC-Write Trojan, disguised as PC-Write v. 2.72)

1999 – First e-mail virus appears (Melissa)

2001 – Worms first appear

Page 10: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Why are malicious attacks worth the worry?

Billions of dollars of damage are caused each year by malicious attacks.

Countless people have lost important data and even their identities due to a malicious attack.

Malicious attacks can also make their way into computers at the workplace, possibly jeopardizing businesses.

Page 11: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Challenges with combating malicious attacks

- the complexity and time needed for sufficient software to combat the different types of viruses and attacks

- the rapid changes in viruses

- New hackers and evolving methods for hacking and guessing at passwords

Page 12: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

How to prevent becoming a victim

•Education

•Adequate software

•Computing habits

Page 13: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Education subscribe or read monthly a website or newsletter that

tells about new threats

(Ex. Yahoo! Newshttp://news.yahoo.com/fc/tech/computer_viruses

Yahoo news gives a run down of on issues relevant to malicious attacks and provides info as to how handle issues that may arise .

Educate family members or others that may use your computer or network

There is lots of help out there. Just look!!

Page 14: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Software

- install a personal firewall to prevent

unauthorized access

- install spyware and Trojan Horse/anti-virus

protection

- Install more then one type of protection

Page 15: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

Safe Computing habits

Always update: Updates fix problems that may exist within programs. Use Windows Update to find updates on a regular basis.

Computer basics and beyond.com suggest more explicitly the following :

-> Keep your hard drive clean with Disk Cleanup and run Disk Defragmenter periodically (once a month) to consolidate your files.

-> Backup important files often to protect data loss. Read Windows XP Backup Made Easy and Back Up Basics. If a file is important, save it in multiple places (off your pc).

-> Make sure to disconnect your computer from the Internet when you aren't using it.

-> Use strong passwords (Password Generator), change them often and always change passwords after infection cleanup

Page 16: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

PasswordsUse this website to check and see if your password is strong enough. A strong password is one more line of defense you have to use against attackers .

http://www.microsoft.com/protect/fraud/passwords/checker.aspx

6 steps to build a strong password:

1) The strongest passwords look like a random string of characters to attackers. But random strings of characters are hard to remember.

2) Make a random string of characters based on a sentence that is memorable to you but is difficult for others to guess. Think of a sentence that you will remember,

Example: "My son Aiden is three years old”

Turn your sentence into a password Use the first letter of each word of your memorable sentence to create a string, in this case: "msaityo".

Page 17: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

3) Add complexity to your password or pass phrase Mix uppercase and lowercase letters and numbers. Introduce intentional misspellings.For example, in the sentence above, you might substitute the number 3 for the word "three", so a password might be "MsAi3yo".

4) Substitute some special characters Use symbols that look like letters, combine words, or replace letters with numbers to make the password complex.Using these strategies, you might end up with the password "M$8ni3y0.”

5) Test your new password with Password Checker Password Checker evaluates your password's strength as you type.

6) Keep your password a secret Treat your passwords with as much care as the information that they protect.

Page 18: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

More Safety Tips

- Use multiple virus scanners (just in case one particular scanner misses certain viruses).

- Do not open junk mail, or e-mail from unknown sources.

-Check file extensions of attachments. The most dangerous attachments include executable files (.exe, .bat, .com) and script files (.vbs). Also, be wary of files with macro capabilities (like .doc and .xls). Generally, picture files (.jpg, .gif, .bmp, .png) and plain text (.txt) are safe, but be careful nonetheless.

- Scan e-mail attachments and downloaded files for viruses

- For those who still use floppy disks, viruses cannot copy itself onto a write-protected floppy disk. Therefore, keep them write-protected if possible

Page 19: Malicious Attacks Nicole Hamilton, Dennis Meng, Alex Shie, Lio Sigerson.

SourcesBhaskar, Krish. “Threats.” Computer Security: Threats and Countermeasures. Oxford: NCC Blackwell Ltd, 1993. 1-13. Print.

Bocij, Paul. The Dark Side of the Internet: Protecting Yourself and Your Family from Online Criminals. Westport: Praeger, 2006.

DeFrancesco, Angela. “Network Attack Modeling and Simulation.” Carnegie Mellon Information Networking Institute 2005-20 (2005): 1-104.

“Tales of Trojan Horses.” SmartComputing.com. Smart Computing, February 2003. <http://www.smartcomputing.com/editorial/article

.asp?article=articles/archive/l0902/03l02/03l02.asp>. 27 September 2009.

“Logic Bomb.” Wikipedia.com, 11 August 2009. <http://en.wikipedia

.org/wiki/Logic_bomb>. 27 September 2009.

http://www.microsoft.com/protect/fraud/passwords/create.aspx (Microsoft online safety)

http://www.computerbasicsandbeyond.com/tutorials/prevent_attacks.html (Computer Basics & Beyond: Preventing malicious attacks)

News.yahoo.com