Documente Academic
Documente Profesional
Documente Cultură
Goals of Attackers
1.
2.
3.
4.
5.
Prank
Data
Access
Identity
Damage
Examples
Software
Website forgery
Social Engineering
Keystroke logging
Password Cracking
Viruses
a program that can copy itself and infect a
computer without the owners knowledge
the term virus usually refers to all types of
malware including viruses, worms, trojan
horses, spyware, etc.
Infection
To infect a target, the virus must be allowed
to execute code and write itself to memory
Thus, viruses are often software that attach
to a program (such as Microsoft Word)
As soon as the Word document is opened,
the virus is free to infect target computer
History
1971: First identified virus called the
Creeper Virus was a self-replicating program
1981: Viruses began to be spread via
removable media (floppy disk)
Origins
Factors that lead to the spread of
viruses in the late 1980s:
Use of Personal Computers
Bulletin Boards (download programs)
led to the precursor to viruses- trojan horses
(program would erase files)
Examples
Viruses show the vulnerability, but also the
sophistication of humans
1999: Melissa virus: Microsoft forced to
shut down entire system
2000: ILOVEYOU virus
2004: MyDoom worm: infected a quarter
million people in one day
Phishing
Types of Phishing
- Link manipulation
- Website forgery
- Phone phishing
- Dumpster diving
- Mail theft
Phishing Damages
Recent Developments
Peer-to-peer viruses
Computer espionage
Future Attacks
Peer-to-peer Viruses
2008 Conficker virus
Estimated 15 million computers infected
Used peer-to-peer networks to download
updated versions of itself
Still active today, accepting commands from
spammers
Peer-to-peer nature essential to its success
Computer Espionage
Pentagon and CIA have been warning of
threat since early 2000s
2008 CIA press release reveals Chinese
hacking network targets US Government
websites
Power grids, banking systems, and other
essential services could be at risk, analysts say
Some say threat overstated
Future Attacks
The only truly secure system is one that is
powered off, cast in a block of concrete and
sealed in a lead-lined room with armed
guards. Gene Spafford, Security Expert
As long as there are computers, there will be
attacks targeting them