Chapter Two
Chapter Two
Chapter Two
Computer Threat
1
Outline
Malicious code Program flaws
Buffer overflows
Viruses
Time-of-check to time-of-use flaws
Trojan horses Incomplete mediation
Worms
Spy-wares, etc. Controls to protect against program
flaws in execution
Class of Attacks Operating system support and
administrative controls
Reconnaissance
Access Program Security Defenses
Denial of Service, etc. Software development controls
and Testing techniques
Database management systems
security
2
Threat
Threat:- It is any circumstance or event with the potential to
harmfully impact an assets through unauthorized access,
destruction, disclosure, modification of data, and/or denial of
service.
5
Cont.…
(i) Malware:- Malware (“malicious software”) is a type of
computer program that penetrates and damages systems without
the users’ knowledge. It hides itself inside the system. You may
notice that your system is processing at a slower rate than usual.
It modify itself after the infection phase like they source codes,
extensions, new files, etc. so it is harder for an antivirus to detect
them.
7
Cont.…
It always try to hide itself in the operating systems in the
following ways. Encrypts itself into cryptic symbols, and it
decrypt itself when they replicate or execute.
9
Types of Virus
Multipartite Viruses.
Stealth Viruses.
Encrypted Viruses.
Polymorphic Viruses.
10
Cont.…
Boot Sector Infector:- The boot sector is the part of a disk used
to boot the system or mount a disk.
Code in that sector is executed when the system "sees" the disk
for the first time.
When the system boots, or the disk is mounted, any virus in that
sector is executed. (The actual boot code is moved to another
place, possibly another sector.)
Cookie a text file that your browser creates and stores on your hard drive that a
website you have visited downloads to your machine and uses to recognize you
when you return to the site.
Unlike viruses, which spread by infecting a host file, worms are freestanding
programs that do not require a host program or human assistance to multiply.
15
Cont.…
Worms don’t change programs; instead, they replicate
themselves over and over.
16
Virus and Worms
Viruses and worms can be used to infect a system and modify
a system to allow a hacker to gain access.
A virus and a worm are similar in that they’re both forms of
malicious software (malware).
A virus infects another executable and uses this carrier
program to spread itself. The virus code is injected into the
previously kind program and is spread when the program is run.
A worm is similar to a virus in many ways but does not need a
carrier program. A worm can self-replicate and move from
infected host to another host.
A worm spreads from system to system automatically, but
a virus needs another program in order to spread.
17
Cont.…
(v) Trojan horse:- It is malicious software that looks like as a
useful host program. When it run, it performs a harmful/unwanted
action.
Proxy Trojans Used to tunnel traffic or launch hacking attacks via other
systems.
FTP Trojans Used to create an FTP server in order to copy files onto a
system. 19
Cont.…
Wait until after hours to upload this data to some server or to use
your own email to send the data to an anonymous email
address.
There are also some key loggers that take periodic screenshots
from your machine.
22
Other Forms of Malicious Logic
Logic Bombs.
Backdoors.
Spam.
DDoS.
Spoofing.
Sniffer.
Social Engineering.
Hardware Threats ….
23
Logic Bomb
Types of Bomb
Often it is used for marketing purposes, but it can be used for much
more malicious goals.
25
Cont.…
Sniffers add risk to the network, because many systems and users
send information on local networks in clear text.
28
Cont.…
29
Hardware Threats
30
How to make your system secure?
In order to keep your system data secure and safe, you should
take the following measures:-
1. Always keep a backup of your data.
2. Install firewall software and keep it updated every time.
3. Make use of strong and difficult to crack passwords (having capital
& small alphabets, numbers, and special characters).
4. Install antivirus/ anti-spyware and keep it updated every time.
5. Timely scan your complete system.
6. Before installing any program, check whether it is safe to install it
(using Antivirus Software).
7. Take extra caution when reading emails that contain attachments.
8. Always keep your system updated.
31
Malicious code.
Malicious code:- is harmful computer program scripts designed
to create or exploit system vulnerabilities. This code is designed
by a threat actor to cause unwanted changes, damage, or
ongoing access to computer systems.
33
Class of Attacks
1. Reconnaissance attacks.
2. Access attacks.
34
Cont.…
There are four common tools or methods for gathering network data
are:-
echo reply.
38
Cont.…
40
Cont.…
Servers that communicate from the trusted machine may have a trust
relationship established. An attacker can then compromise the trusted
server and initiate a connection to the internal network.
43
Cont.…
Man-in-the-Middle Attacks:- happens when a hacker listens for network
traffic and intercepts a data transmission. hacker capture credentials, hijack
a session, or instigate a DoS attack.
Proper data encryption, with the use of an encryption protocol, makes the
captured data useless.
47
Cont.…
The answer to that lies as to what is adjacent to arr [4] (the last
element of array). The number 22‘ will be written in adjacent
block of arr [4]. If that location contained any user‘ data- that
data will be over-written.
If at the same spot any program is located (system or user), an
attacker can create a fake overflow and place his own
software(code) at that location next to arr [4].
In such manner, an attacker can gain privileges or full control of
the OS.
49
Cont.…
51
Cont.…
http://www.somesite.com/subpage/userinput.asp?
parm1=(808)555-1212&parm2=2015Jan17
As a security professional trying to find and fix problems before
they occur, you might examine the various parts of the URL to
determine what they mean and how they might be exploited.
53
Cont.…
54
Cont.…
Apply Modularity.
56
Cont.…
57
Cont.…
Integration testing.
System testing.
Acceptance testing.
58
Cont.…
Performance testing.
Security testing.
Usability testing.
Compatibility testing.
59
Cont.…
The goal of security testing is to find gaps and security risks in the
system that could result in unauthorized access by probing the
application weaknesses. There are multiple types of this testing method,
each of which aimed at verifying six basic principles of security:-
Integrity.
Confidentiality.
Authentication.
Authorization.
Availability.
Non-repudiation.
60
Cont.…
Database Management Systems Security:- Company databases
always contain sensitive information that must be protected from
vulnerabilities and exploits. The following are some of the threats related to
databases:-
o Default or weak passwords.
o SQL injection.
o Buffer overflows.
o Denial of service.
o Un-patched RDBMS.
61
End.
62