Lecture Note 1
Lecture Note 1
Lecture Note 1
Points to be Covered:
• Threats to security
• Avenues of Attack, steps in attack
• Security Basics – Confidentiality, Integrity,
Availability
• Types of attack
Threats to security
• Virus
• Worms
• Intruders
• Insiders
• Information warfare
Virus
• Programming code that replicates by being copied or
initiating its copying to another program
• Viruses can be transmitted as attachments to mail or
in a downloaded file
• Once a virus infects a computer,it performs two
separate tasks
•Replicates itself by spreading to other computers by
human intervention
•Activates its malicious payload
BootSector Virus
Email Virus
Macro Virus
Worm
• A computer worm is a standalone malware
computer program that replicates it self in order to
spread to other computers
• Self Replicate
• Action perform: Deleting Files, allow remote control
• Worms are different from viruses in two regards:
– A worm can travel by itself
– A worm does not require any user action to begin its
execution
Concealing Malware
• Trojan Horse
– Program advertised as per forming one activity that but
actually does something else.
– Trojan horse programs are typically executable programs
that contain hidden code that attack the computer system
• Rootkit
– Unauthorized access and often mask its existence
– Detection: behavioural-based methods, signature scanning,
difference scanning, and memory dump analysis.
– UserMode v/s Kernel Mode
Malware for Profit
• Spam
• Spyware
• Adware
• Key logger
Virus V/s Worms
Virus Worm
A virus is a piece of code that A worm is a malicious program
attaches itself to legitimate that spread automatically.
program
Virus modifies the code. Worm does not modifies the code
Virus does not replicate itself Worm replicate itself
Virus is a destructive in nature Worm is non-destructive in nature
Aim of virus is to infect the code Aim of worm is to make computer
or program stored on computer or network unusable
system
Virus can infect other files Worm does not infect other files
but it occupies memory space
replication.
Virus may need a trigger for Worm does not need any trigger
execution
Intruders V/s Insiders
INTRUDERS INSIDERS
Intruders are less dangerous than Insiders are more dangerous than
Insiders Intruders.
Intruders do not have access to system Insiders have easy access to the
system because they are authorized
users
Many security mechanisms are used There is no such mechanism to protect
to protect system from Intruders. system from Insider
Steps in Attack
Security Basics
• Confidentiality
– Helps to set secret communication
– The goal of confidentiality is to ensure that only
those individuals who have the Authority can view
a piece of information.
Security Basics
• Authentication:
– helps to establish proof of identities
– Authentication deals with the desire to ensure
that an individual is who they claim to be. The
need for this in an online transaction is obvious
Security Basics
• Integrity :
– helps to determines originality of message
Security Basics
• Authorization:
– Permissible usage of the resources
– Id password credentials
• Non repudiation
– The sender should not be able to deny sending the
message. The receiver should not be able to deny
receiving the message
Types of Security Attacks
Active attacks
Masquerade.
Replay.
Modification of Message.
Traffic Analysis
Release Of Message Contents
Traffic Analysis
• Traffic analysis is the process of intercepting
and examining messages in order to deduce
information from patterns in communication.
• In this attack the attacker observe the patterns
of message that is being transferred from
source to destination
BASIS FOR
COMPARISON ACTIVE ATTACK PASSIVE ATTACK
Basic Active attack tries to change Passive attack tries to read or make
the system resources or affect use of information from the system
their operation. but does not influence system
resources.
2.TCP/IP Hacking
3.Phishing
4.Sniffing
5.Spoofing
6. SQL Injection