Malicious Attacks LOGO Brian Duff • Nidhi Doshi • Timmy Choi Dustin Hellstern

advertisement
Malicious Attacks
Brian Duff • Nidhi Doshi • Timmy Choi
Dustin Hellstern
Company
LOGO
Malicious Attacks
1. Introduction
2. Background and Evolution
3. Preventative Steps
4. Challenges
Introduction
What are malicious attacks?
Malicious attacks can be defined
Text
as any attempt to
undermine the privacy or security of a computer
system, usually taking one of the following forms:
Text
• Virus
A program that copies itself into other programs
Textare executed, in order to wreak havoc.
that
• Trojan Horse
A program that appears to be harmless, but which
causes damage when run.
• Phishing Text
The use of various forms of social engineering to
trick computer users into giving away personal
information.
Introduction
What are the goals of malicious attacks?
The hackers, or people who engage
Text in cyber attacks
often have one or more of the following goals:
• Identity Theft
Hackers often want to steal personal information,
such as social security numbers or credit card
Text
numbers
from a person or group of people.
• Denial-of-Service Attack
Some viruses infect many computers, which
combine to overload a secondary target, such as a
government- or company-owned network.
Text
• Just for Fun
Some hackers simply enjoy destroying other
people’s computers.
Background and Evolution
1980s
Popularization of the
personal computer.
Malicious software
first takes the form of
trojan horses posted
to bulletin boards
(early messaging
system) and simple
viruses on floppy
disks.
1990s – early 2000s
The Internet
becomes popular.
Viruses become
common as e-mail
attachments.
Examples include the
Melissa virus in 1999
and the ILOVEYOU
virus in 2000.
2000s - Present
Phishing and other
social engineering
attacks are on the
rise. Viruses occur
on a large scale in
computers that are
not protected.
Preventative Steps
What can be done to prevent malicious attacks?
The following measures can beText
taken to help prevent
a malicious attack:
• For Viruses, Trojan Horses, and Worms
• Install and maintain up-to-date antivirus software.
• Install all security updates.
•Text
Never download files from the Internet unless it is from
a trusted source.
• If you think your computer has a virus, get help right
away.
• For Phishing
Text
•Be careful
never to send personal information over email or click hyperlinks within e-mail text.
• If you ever doubt the authenticity of a message, contact
the sender or legitimate organization before taking
further action.
Challenges
What inhibits the prevention of attacks?
Various factors make it difficultText
for people to stay
protected from malicious computer attacks:
• Effective antivirus software is often too expensive for some
people to afford.
• TheText
source a virus is often difficult or impossible to
pinpoint.
• File sharing via the Internet or other means such as USB
drives is increasing and will continue to increase.
Text
• Many people
simply have not been taught how to recognize
phishing attempts and scams.
• Hackers are smart and are often one step ahead.
Our Opinion
How can we help?
We think the following would help
Textto decrease the
success of malicious attacks:
• Increased awareness of the dangers of the Internet and
file-sharing
Text
• Development
by trusted organizations of freely available
protective software
• Education about phishing and how to identify likely phishing
attempts
Text
• Government
involvement in countering large-scale viruses
and cyber attacks
Download