+ All Categories
Home > Documents > Presented by: Melissa Dark CERIAS, Purdue University.

Presented by: Melissa Dark CERIAS, Purdue University.

Date post: 14-Dec-2015
Category:
Upload: drew-crittenden
View: 218 times
Download: 3 times
Share this document with a friend
Popular Tags:
20
Presented by: Melissa Dark CERIAS, Purdue University
Transcript

Presented by: Melissa Dark

CERIAS, Purdue University

Software Security:(Viruses, Trojans, Unwanted Access)

• Only install necessary and trusted software.

• Beware of *free* games, screen savers, and graphics.

• Run and UPDATE anti-virus software!!

• Keep a hard copy of the copyright release for all free products!

• 1988: Less than 10 known viruses• 1990: New virus found every day• 1993: 10-30 new viruses per week• 1999: 45,000 viruses and variants

Source: McAfee

Virus Growth

0

10000

20000

30000

40000

50000

60000

1988 1990 1993 1999

Pikachu Worm: A K-12 Nightmare

This dialog box appears after the

PIKACHUPOKEMON.EXE file has been activated. Worm:

• Accesses Outlook Address Book

• Embeds code to delete Windows and Windows Subfolders upon Restart.• +: Does ask for permission to delete files with a “Y” command.

Examples of Nasty Stuff:

• Trojan Horse • Viruses• Worms• Logic Bomb• Trapdoors

Trojan Horse:• Trojan Horse: a malicious

program that pretends to be a benign application; a Trojan horse program purposefully does something the user does not expect.

Trojans are not viruses since they do not replicate, but Trojan horse programs can be just as destructive.

Viruses:

• Viruses: a computer program file capable of attaching to disks or other files and replicating itself repeatedly, typically without user knowledge or permission.

. ...what if the Greek soldiers in the Trojan Horse had the plague??

Worms:

• Worms: reproducing programs that run independently and travel across network connections.

The main difference between viruses and worms is the method in which they reproduce and spread. A virus is dependant upon a host file or boot sector, and the transfer of files between machines to spread, while a worm can run completely independently and spread of its own will through network connections.

Logic Bomb:

• Logic Bomb: A logic bomb is a type of Trojan Horse that executes when specific conditions occur. Triggers for logic bombs can include a change in a file, by a particular series of keystrokes, or at a specific time or date.

Trapdoor:

• Trapdoors: allows access to a system by skipping the usual login routine.

Mattel Example...

Virus Information Activity

• Teach teachers to learn about viruses.

• Directions: Each of you has been given a keyword associated with a virus. Go to the McAfee virus information library (http://vil.mcafee.com/) and search for information dealing with your selection.

• Skim through the choices and pick the best one to share with the group! Explain what the virus is, what it will do, and steps to fix it.

Virus Awareness Activity: Debriefing Pok Snoopy Love Backdoor Bud Frogs

Pretty Cobra Sorry Funny Perrin

Using Anti-Virus Software

• Many different kinds– Norton Antivirus– McAffee– Dr. Solomon

• Critical Component: UPDATES– Download definitions OFTEN– Continuous update packages

Firewalls 101:• A firewall examines all traffic

routed between the systems to see if it meets certain criteria.

– If it meets this criteria...it is allowed to pass. Otherwise, it is blocked.

• Filters both inbound and outbound traffic.

– Hardware or software based.

Zone Alarm: http://www.zonealarm.com• Highly recommended FREE

firewall.• Allows for high level of user

control.• Easy to use and understand.• First step in preventing

unauthorized access.

Standard Menu

Pop-Up Alert Dialog

Program Permission Menu

Lock Settings

Security Settings

Configure Settings

Task Bar Indicator

Shut Down Notification


Recommended