Chat with us, powered by LiveChat NEC Ch 5 Cyber Virsus Virus Scanners and Trojan Horse Question | acewriters
+1(978)310-4246 credencewriters@gmail.com
  

Question :Use a search engine to find the names of five different cyber viruses. Using WORD, write a short paragraph on each. Use your own words .
Required Readings
Read Chapter 5 of the Easttom text, MalwareText Book : Easttom, Chuck. Computer Security Fundamentals, (Third Edition). Indianapolis: Pearson, 2016. ISBN-13: 978-0-7897-5746-3 Primary topics: VirusesTrojan HorsesBuffer-Overflow AttacksSpyware————————–
Required Videos
Video. What happens when you date hackers to hack you.Click HERE to watch or click embedded video below.– PPT Attached.
easttom_ppt_05_final.ppt

Unformatted Attachment Preview

Computer Security
Fundamentals
by Chuck Easttom
Chapter 5 Malware
Chapter 5 Objectives




Understand viruses and how they propagate
Have a working knowledge of several specific
viruses
Understand virus scanners
Understand what a Trojan horse is
© 2016 Pearson, Inc.
Chapter 5 Malware
2
Chapter 5 Objectives (cont.)




Have a working knowledge of several specific
Trojan horse attacks
Understand the buffer overflow attack
Understand spyware
Defend against these attacks
© 2016 Pearson, Inc.
Chapter 5 Malware
3
Introduction

Virus outbreaks






How they work
Why they work
How they are deployed
Buffer overflow attacks
Spyware
Other malware
© 2016 Pearson, Inc.
Chapter 5 Malware
4
Viruses

A computer virus



Self-replicates
Spreads rapidly
May or may not have a malicious payload
© 2016 Pearson, Inc.
Chapter 5 Malware
5
Viruses (cont.)
How a virus spreads

Finds a network connection; copies itself to
other hosts on the network

Requires programming skill
OR

Mails itself to everyone in host’s address book

Requires less programming skill
© 2016 Pearson, Inc.
Chapter 5 Malware
6
Viruses (cont.)

E-mail propagation

More common for one major reason;



Microsoft Outlook is easy to work with.
Five lines of code can cause Outlook to send emails covertly.
Other viruses spread using their own e-mail
engine.
© 2016 Pearson, Inc.
Chapter 5 Malware
7
Viruses (cont.)

Network propagation.


Web site delivery.


Less frequent, but just as effective
Relies on end-user negligence
Multiple vectors for a virus are becoming
more common.
© 2016 Pearson, Inc.
Chapter 5 Malware
8
Viruses (cont.)

Virus Types






Macro
Multi-Partite
Armored
Memory Resident
Sparse Infector
Polymorphic
© 2016 Pearson, Inc.
Chapter 5 Malware
9
Viruses (cont.)
Symantic site information on the Sobig virus
© 2016 Pearson, Inc.
Chapter 5 Malware
10
Viruses (cont.)
Information on the Minmail virus from the Sophos site
© 2016 Pearson, Inc.
Chapter 5 Malware
11
Viruses (cont.)
Information on the Bagle virus from the internet.com site
© 2016 Pearson, Inc.
Chapter 5 Malware
12
Viruses (cont.)
Virus hoaxes from the McAfee site
© 2016 Pearson, Inc.
Chapter 5 Malware
13
Viruses (cont.)
Wikipedia information on Robert Tappan Morris, Jr.
© 2016 Pearson, Inc.
Chapter 5 Malware
14
Viruses (cont.)

Examples



Rombertik
Gameover ZeuS
FakeAV
© 2016 Pearson, Inc.
Chapter 5 Malware
15
Viruses (cont.)

Rules for avoiding viruses:


Use a virus scanner.
DO NOT open questionable attachments.


Use a code word for safe attachments from
friends.
Do not believe “Security Alerts.”
© 2016 Pearson, Inc.
Chapter 5 Malware
16
Ransomeware

Examples


Cryptolocker
Cryptowall
© 2016 Pearson, Inc.
Chapter 5 Malware
17
Trojan Horses
A program that looks benign, but is not
◼ A cute screen saver or apparently useful
login box can



Download harmful software.
Install a key logger .
Open a back door for hackers.
© 2016 Pearson, Inc.
Chapter 5 Malware
18
Trojan Horses (cont.)

Competent programmers can craft a Trojan
horse:



To appeal to a certain person or
To appeal to a certain demographic
Company policy should prohibit unauthorized
downloads.
© 2016 Pearson, Inc.
Chapter 5 Malware
19
Trojan Horses (cont.)
Still-valid CERT advisory on Trojan horses
© 2016 Pearson, Inc.
Chapter 5 Malware
20
Trojan Horses (cont.)

Competent programmers can craft a Trojan
horse:



To appeal to a certain person or
To appeal to a certain demographic
Company policy should prohibit unauthorized
downloads.
© 2016 Pearson, Inc.
Chapter 5 Malware
21
The Buffer Overflow Attack

EliteWrap.
© 2016 Pearson, Inc.
Chapter 5 Malware
22
The Buffer Overflow Attack (cont.)
A Microsoft Security Bulletin on a buffer overflow attack
© 2016 Pearson, Inc.
Chapter 5 Malware
23
The Buffer Overflow Attack (cont.)
Web tutorial for writing buffer overflows
© 2016 Pearson, Inc.
Chapter 5 Malware
24
Spyware




Requires more technical knowledge
Usually used for targets of choice
Must be tailored to specific circumstances
Must then be deployed
© 2016 Pearson, Inc.
Chapter 5 Malware
25
Spyware (cont.)

Forms of spyware


Web cookies
Key loggers
© 2016 Pearson, Inc.
Chapter 5 Malware
26
Spyware (cont.)

Legal Uses



Monitoring children’s computer use
Monitoring employees
Illegal Uses

Deployment will be covert
© 2016 Pearson, Inc.
Chapter 5 Malware
27
Spyware (cont.)
Example of free spyware removal software
© 2016 Pearson, Inc.
Chapter 5 Malware
28
Other Forms of Malware

Rootkit

A collection of hacking tools that can




Monitor traffic and keystrokes
Create a backdoor
Alter log files and existing tools to avoid
detection
Attack other machines on the network
© 2016 Pearson, Inc.
Chapter 5 Malware
29
Malicious Web-Based Code

Web-Based mobile code



Code that is portable on all operating systems
Multimedia rushed to market results in poorly
scripted code
Spreads quickly on the web
© 2016 Pearson, Inc.
Chapter 5 Malware
30
Logic Bombs

Go off on a specific condition


Often date
Can be other criteria
© 2016 Pearson, Inc.
Chapter 5 Malware
31
APT

Advanced Persistent Threat


Advanced techniques, not script kiddy’s
Ongoing over a significant period of time
© 2016 Pearson, Inc.
Chapter 5 Malware
32
Detecting and Eliminating Viruses
and Spyware

Antivirus software operates in two ways:

Scans for virus signatures


Keeps the signature file updated
Watches the behavior of executables


© 2016 Pearson, Inc.
Attempts to access e-mail address book
Attempts to change Registry settings
Chapter 5 Malware
33
Detecting and Eliminating Viruses
and Spyware (cont.)

Anti-spyware software




www.webroot.com
www.spykiller.com
www.zerospy.com
www.spectorsoft.com
© 2016 Pearson, Inc.
Chapter 5 Malware
34
Summary




There are a wide variety of attacks.
Computer security is essential to the
protection of personal information and your
company’s intellectual property.
Most attacks are preventable.
Defend against attacks with sound practices
plus antivirus and antispyware software.
© 2016 Pearson, Inc.
Chapter 5 Malware
35

Our essay writing service fulfills every request with the highest level of urgency
attachment

error: Content is protected !!