0% found this document useful (0 votes)
36 views18 pages

System Security

The document discusses various types of malware and hardware attacks. It describes malware objectives like infecting systems, hiding actions, and generating profit. It explains different types of malware like viruses, worms, trojans, rootkits, and logic bombs. It also discusses hardware attacks targeting the BIOS, USB devices, and network attached storage. The primary goal of malware and hardware attacks is to damage systems, steal data, or take remote control of devices without authorization.

Uploaded by

amir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views18 pages

System Security

The document discusses various types of malware and hardware attacks. It describes malware objectives like infecting systems, hiding actions, and generating profit. It explains different types of malware like viruses, worms, trojans, rootkits, and logic bombs. It also discusses hardware attacks targeting the BIOS, USB devices, and network attached storage. The primary goal of malware and hardware attacks is to damage systems, steal data, or take remote control of devices without authorization.

Uploaded by

amir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

System Security

Software-Based Attacks

• Malicious software, or malware

– Software that enters a computer system without the owner’s knowledge or


consent

– Malware is a general term that refers to a wide variety of damaging or annoying


software

• The three primary objectives of malware

– To infect a computer system

– hide the malware’s malicious actions

– Bring profit from the actions that it performs

Infecting Malware

• Viruses

– Programs that secretly attach to another document or program and execute


when that document or program is opened

– Once a virus infects a computer, it performs two separate tasks

• Replicates itself by spreading to other computers

• Activates its malicious payload

– Cause problems ranging from displaying an annoying message to erasing files


from a hard drive or causing a computer to crash repeatedly
• Types of computer viruses

– File infector virus

– Boot virus

– Companion virus

• Metamorphic viruses

– Avoid detection by altering how they appear

• Polymorphic viruses

– Also encrypt their content differently each time

• Worm

– Program designed to take advantage of a vulnerability in an application or an


operating system in order to enter a system

– Worms are different from viruses in two regards:

• A worm can travel by itself

• A worm does not require any user action to begin its execution

– Actions that worms have performed: deleting files on the computer; allowing the
computer to be remote-controlled by an attacker

Concealing Malware

• Trojan Horse (or just Trojan)

– Program advertised as performing one activity that but actually does something
else

– Trojan horse programs are typically executable programs that contain hidden
code that attack the computer system

• Rootkit

– A set of software tools used by an intruder to break into a computer, obtain


special privileges to perform unauthorized functions, and then hide all traces of
its existence
• Rootkit (continued)

– The rootkit’s goal is to hide the presence of other types of malicious software

– Rootkits function by replacing operating system commands with modified


versions

• That are specifically designed to ignore malicious activity so it can escape


detection

– Detecting a rootkit can be difficult

– Removing a rootkit from an infected computer is extremely difficult

• You need to reformat the hard drive and reinstall the operating system

• Logic bomb

– A computer program or a part of a program that lies dormant until it is triggered


by a specific logical event

– Once triggered, the program can perform any number of malicious activities

– Logic bombs are extremely difficult to detect before they are triggered

• Privilege escalation

– Exploiting a vulnerability in software to gain access to resources that the user


would normally be restricted from obtaining
• Types of privilege escalation

– When a user with a lower privilege uses privilege escalation to access functions
reserved for higher privilege users

– When a user with restricted privileges accesses the different restricted functions
of a similar user

Malware for Profit

• Spam

– Unsolicited e-mail

– Sending spam is a lucrative business

– Costs involved for spamming:

• E-mail addresses

• Equipment and Internet connection

– Text-based spam messages can easily by trapped by special filters

Image spam uses graphical images of text in order to circumvent text-based filters

• Image spam cannot be easily filtered based on the content of the message

• To detect image spam, one approach is to examine the context of the message and
create a profile, asking questions such as:

– Who sent the message?

– What is known about the sender?

– Where does the user go if she responds to this e-mail?

– What is the nature of the message content?

– How is the message technically constructed?

• Spyware

– A general term used for describing software that imposes upon a user’s privacy
or security

• Antispyware Coalition defines spyware as:


– Technologies that are deployed without the user’s consent and impair the user’s
control over:

• Use of their system resources, including what programs are installed on


their computers

• Collection, use, and distribution of their personal or other sensitive


information

• Material changes that affect their user experience, privacy, or system


security

• Spyware has two characteristics that make it very dangerous

– Spyware creators are motivated by profit

• Spyware is often more intrusive than viruses, harder to detect, and more
difficult to remove

– Spyware is not always easy to identify

• Spyware is very widespread

• Although attackers use several different spyware tools

– The two most common are adware and keyloggers

• Adware

– A software program that delivers advertising content in a manner that is


unexpected and unwanted by the user
• Adware can be a security risk

– Many adware programs perform a tracking function

• Monitors and tracks a user’s activities

• Sends a log of these activities to third parties without the user’s


authorization or knowledge

• Keylogger

– A small hardware device or a program that monitors each keystroke a user types
on the computer’s keyboard

– As the user types, the keystrokes are collected and saved as text

• As a hardware device, a keylogger is a small device inserted between the keyboard


connector and computer keyboard port

• Software keyloggers

– Programs that silently capture all keystrokes, including passwords and sensitive
information

– Hide themselves so that they cannot be easily detected even if a user is


searching for them
• Botnets

– When hundreds, thousands, or even tens of thousands of zombie computers are


under the control of an attacker

• Zombie

– An infected computer with a program that will allow the attacker to remotely
control it

• Attackers use Internet Relay Chat (IRC) to remotely control the zombies

• Attacker is knows as a bot herder


Hardware-Based Attacks

• Hardware that often is the target of attacks includes the BIOS, USB devices, network
attached storage, and even cell phones

BIOS

• Basic Input/Output System (BIOS)

– A coded program embedded on the processor chip that recognizes and controls
different devices on the computer system

– Executed when the computer system is first turned on and provides low-level
access to the hard disk, video, and keyboard

• On older computer systems the BIOS was a Read Only Memory (ROM) chip

– Today’s computer systems have a PROM (Programmable Read Only Memory)


chip

• Because it can be flashed, the BIOS can be the object of attacks

– One virus overwrites the contents of the BIOS and the first part of the hard disk
drive, rendering the computer completely dead

– An attacker could infect a computer with a virus and then flash the BIOS to install
a rootkit on the BIOS
USB Devices

• USB devices use flash memory

– Flash memory is a type of EEPROM, nonvolatile computer memory that can be


electrically erased and rewritten repeatedly

• USB devices are widely used to spread malware

• Also, USB devices allow spies or disgruntled employees to copy and steal sensitive
corporate data

• In addition, data stored on USB devices can be lost or fall into the wrong hands

• To reduce the risk introduced by USB devices:

– Disable the USB in hardware

– Disable the USB through the operating system

– Use third-party software

Network Attached Storage (NAS)

• Storage Area Network (SAN)

– Specialized high-speed network for attaching servers to storage devices

– SAN can be shared between servers and can be local or extended over
geographical distances

• Network Attached Storage (NAS)

– Another type of network storage

– Single, dedicated hard disk-based file storage device that provides centralized
and consolidated disk storage available to LAN users through a standard network
connection
• Advantages to using NAS devices on a network

– Offer the ability to easily expand storage requirements

– Allow for the consolidation of storage

• The operating system on NAS devices can be either a standard operating system, a
proprietary operating system, or a “stripped-down” operating system with many of the
standard features omitted

• NAS security is implemented through the standard operating system security features

Cell Phones

• Cellular telephones (cell phones)

– Portable communication devices that function in a manner that is unlike wired


telephones

• Two keys to cellular telephone networks

– Coverage area is divided into smaller individual sections called cells

– All of the transmitters and cell phones operate at a low power level

• Almost all cell phones today have the ability to send and receive text messages and
connect to the Internet

• Types of attacks

– Lure users to malicious Web sites

– Infect a cell phone

– Launch attacks on other cell phones

– Access account information

– Abuse the cell phone service

Attacks on Virtualized Systems

• Just as attacks can be software-based or hardware-based, attacks can also target


software that is emulating hardware
• This type of software, known as virtualization, is becoming one of the prime targets of
attackers

What Is Virtualization?

• Virtualization

– A means of managing and presenting computer resources by function without


regard to their physical layout or location

• Operating system virtualization

– A virtual machine is simulated as a self-contained software environment by the


host system but appears as a guest system

• Server virtualization

– Creating and managing multiple server operating systems

• One of the factors driving the adoption of virtualization is the cost of energy

• Operating system virtualization is playing an increasingly important role in security

– Has allowed increased flexibility in launching attacks

– Is also being used to make systems more secure


Attacks on Virtual Systems

• Virtualization provides the ability to run multiple virtual computers on one physical
computer

• Virtualization can also be beneficial in providing uninterrupted server access to users

– By means of live migration and load balancing

• Security for virtualized environments can be a concern for two reasons

– Existing security tools were designed for single physical servers and do not
always adapt well to multiple virtual machines

– Virtual machines not only need to be protected from the outside world, but they
also need to be protected from other virtual machines on the same physical
computer

• Hypervisor

– Software that runs on a physical computer and manages one or more virtual
machine operating systems

– Can contain security code that would allow the hypervisor to provide security by
default to all virtual machines

• Another option is for security software to function as a separate program that is


“plugged in” to the hypervisor
• Another approach is running security software, such as a firewall and intrusion
detection system

– As a specialized security virtual machine on the physical machine


Hardening the Operating System

• Hardening the operating system to resist attacks is often a three-


pronged approach that involves:

– Managing updates to the operating system

– Protecting against buffer overflows

– Configuring operating system protections

• Update terminology

– The task of writing a secure operating system is daunting

– Due to the increased length and complexity of operating


systems

• Unintentional vulnerabilities were introduced and then


these were exploited by attackers

• Update terminology (continued)

– Security patch
• A general software security update intended to cover
vulnerabilities that have been discovered

– Hotfix addresses a specific customer situation

• Often may not be distributed outside that customer’s


organization

– Service pack

• A cumulative package of all security updates plus


additional features

• Patch management techniques

– Install updates automatically

– Download updates but let me choose whether to install


them

– Check for updates but let me choose whether to download


and install them

– Never check for updates

• Patches can sometimes create new problems


• Automated patch update service

– Used to manage patches locally instead of relying upon the


vendor’s online update service

• Advantages to an automated patch update service

– Can save bandwidth and time

– Computers that do not have Internet access can receive


updates

– Administrators can approve or decline updates for client


systems, force updates to install by a specific date, and
obtain reports on what updates each computer needs

• Advantages to an automated patch update service (continued)


– Specific types of updates that the organization does not test
can be automatically installed whenever they become
available

– Administrators can approve updates for “detection” only

– Users cannot disable or circumvent updates

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy