Terms 8 Definitions and Questions

advertisement
Terms 8
Definitions and Questions
Virus
A program or piece of code that is loaded onto
your computer without your knowledge and runs
against your wishes. Viruses can also replicate
themselves. All computer viruses are manmade.
A simple virus that can make a copy of itself over
and over again is relatively easy to produce.
Even such a simple virus is dangerous because
it will quickly use all available memory and bring
the system to a halt.
Viruses were first invented in the early 1980s,
but it wasn’t until 1987-8 that they actually
became dangerous ‘in the wild’
Worm
A computer worm is a self-replicating computer program, similar to a
computer virus. A virus attaches itself to, and becomes part of,
another executable program; however, a worm is self-contained and
does not need to be part of another program to propagate itself.
They are often designed to exploit the file transmission capabilities
found on many computers.
The main difference between a computer virus and a worm is that a
virus can not propagate by itself whereas worms can.
A worm uses a network to send copies of itself to other systems and
it does so without any intervention. In general, worms harm the
network and consume bandwidth, whereas viruses infect or corrupt
files on a targeted computer. Viruses generally do not affect network
performance, as their malicious activities are mostly confined within
the target computer itself.
Trojan
A Trojan is a network software application designed to
remain hidden on an installed computer. Trojans
sometimes, for example, access personal information
stored locally on home or business computers, then
send these data to a remote party via the Internet.
Alternatively, trojans may serve merely as a "backdoor"
application, opening network ports to allow other network
applications access to that computer.
The term comes from the a Greek story of the Trojan
War, in which the Greeks give a giant wooden horse to
their foes, the Trojans, ostensibly as a peace offering.
But after the Trojans drag the horse inside their city
walls, Greek soldiers sneak out of the horse's hollow
belly and open the city gates, allowing their compatriots
to pour in and capture Troy.
Virus / Worm / Trojan Q/A
Q: One of the most famous of these is
called “I Love You”, also known as “Love
Letter” and “the Love Bug”. It cost
business an estimated $8 billion. Was it a
virus, worm, or trojan?
A: It was a virus that spread through
emails labeled “I Love You”.
Anti-Virus
Anti-virus software consists of computer programs that
attempt to identify, thwart and eliminate computer viruses
and other malicious software (malware).
Anti-virus software typically uses two different
techniques to accomplish this:



Examining (scanning) files to look for known viruses matching
definitions in a virus dictionary
Identifying suspicious behavior from any computer program
which might indicate infection.
Such analysis may include data captures, port monitoring and
other methods.
Most commercial anti-virus software uses both of these
approaches, with an
emphasis on the virus dictionary approach.
Virus Definition File
Anti-virus software needs virus definition files to
work
These files hold the digital “signatures” of all the
known viruses
Virus definitions are what tell your antivirus
product about the viruses that are out at this
point in time. For example, if you have
definitions from last week, but a new virus came
out this week, then your AV product would not be
able to find that new virus with your "old"
definitions.
Palladium
a set of hardware and software features which Microsoft
and Intel (and AMD) intend to jointly add to future
versions of the Windows operating system, probably in
the 2004-5 timeframe.
Palladium’s goal is to make computers more secure by a
combination of hardware and software that identifies and
authenticates machines to one another (not applications,
data, or individuals) and prevents connections or
transmissions that the enabled policy rules don’t allow.
Much of the furor is about Microsoft (or Intel or another
big software or content company)


Controlling what may come onto your computer, rejecting
anything that doesn’t fit its definition of trustworthy.
Associating individuals to detailed personal information.
DRM
DRM (Digital Radio Mondiale) is the only
universal, open standard digital AM radio system
with near-FM quality sound available to markets
worldwide.
While DRM currently covers the broadcasting
bands below 30 MHz, the DRM consortium
voted in March 2005 to begin the process of
extending the system to the broadcasting bands
up to 120 MHz. The design, development and
testing phases are expected to be completed by
2007-2009.
DRM
Digital Rights Management
A system for protecting the copyrights of data
circulated via the Internet or other digital media
by enabling secure distribution and/or disabling
illegal distribution of the data.
Typically, a DRM system protects intellectual
property by either encrypting the data so that it
can only be accessed by authorized users or
marking the content with a digital watermark or
similar method so that the content can not be
freely distributed.
Palladium / DRM Q/A
Q: What is the Next-Generation Secure
Computing Base (NGSCB) ?
A: The "Next-Generation Secure Computing
Base" (NGSCB), formerly known as Palladium,
is Microsoft’s new trusted computing
architecture. (The name was changed in 2003.
Microsoft claimed it was because a book
publisher of the same name wouldn't allow them
to use "Palladium"; Critics charge that the
change was a reaction to the negative publicity
surrounding the Palladium operating system.)
Digital Watermarking
Also referred to as simply watermarking, a pattern of bits inserted
into a digital image, audio or video file that identifies the file's
copyright information (author, rights, etc.). The name comes from the
faintly visible watermarks imprinted on stationery that identify the
manufacturer of the stationery. The purpose of digital watermarks is
to provide copyright protection for intellectual property that's in
digital format.
Unlike printed watermarks, which are intended to be somewhat
visible, digital watermarks are designed to be completely invisible, or
in the case of audio clips, inaudible. Moreover, the actual bits
representing the watermark must be scattered throughout the file in
such a way that they cannot be identified and manipulated. And
finally, the digital watermark must be robust enough so that it can
withstand normal changes to the file, such as reductions from lossy
compression algorithms.
Digital Watermarking Q/A
Q: Who was caught in early 2004
releasing movie screeners, using digital
watermarking ?
A: Carmine Caridi. He distributed movie
copies sent to him as an Academy Awards
screener.
http://www.geraldpeary.com/essays/stuv/s
opranos.html
DMCA
The Digital Millennium Copyright Act (DMCA) is a
controversial United States copyright law which
criminalizes production and dissemination of technology
that can circumvent measures taken to protect copyright,
not merely infringement of copyright itself, and heightens
the penalties for copyright infringement on the Internet.
Passed on May 14, 1998 by a unanimous vote in the
United States Senate and signed into law by President
Bill Clinton on October 28, 1998, the DMCA amended
title 17 of the US Code to extend the reach of copyright,
while limiting the liability of Online Providers from
copyright infringement by their users.
DMCA Q/A
Q: What is deCSS, and how does it relate
to the DMCA ?
A:
http://cse.stanford.edu/class/cs201/project
s-99-00/dmca-2k/css.html
See also:
http://en.wikipedia.org/wiki/Digital_rights_
management
Download