Assessment For Intro. To Computing (Vicente, Mark Jolo A.)
Assessment For Intro. To Computing (Vicente, Mark Jolo A.)
Part A
1. OS Communication
Definition: In case of distributed systems which are a collection of processors that do not share
memory, peripheral devices, or a clock, the operating system manages communications between all the
processes. Multiple processes communicate with one another through communication lines in the network.
Examples: The OS handles routing and connection strategies, and the problems of contention and security.
Following are the major activities of an operating system with respect to communication:
Both the processes can be on one computer or on different computers, but are connected through a
computer network.
Communication may be implemented by two methods, either by Shared Memory or by Message
Passing.
2. OS Error Handling
Definition: Errors can occur anytime and anywhere. An error may occur in CPU, in I/O devices or in
the memory hardware. Error handling refers to the response and recovery procedures from error conditions
present in a software application. In other words, it is the process comprised of anticipation, detection and
resolution of application errors, programming errors or communication errors.
Examples: Following are the major activities of an operating system with respect to error handling:
The lack of sufficient memory to run an application or a memory conflict with another program.
The OS constantly checks for possible errors.
The OS takes an appropriate action to ensure correct and consistent computing.
3. OS Resource Management
Definition: Resource management is the dynamic allocation and de-allocation by an operating system of
processor cores, memory pages, and various types of bandwidth to computations that compete for those
resources. The objective is to allocate resources so as to optimize responsiveness subject to the finite resources
available.
Example: Following are the major activities of an operating system with respect to resource management
4. OS Protection
Definition: Considering a computer system having multiple users and concurrent execution of multiple
processes, the various processes must be protected from each other's activities. Protection refers to a
mechanism or a way to control the access of programs, processes, or users to the resources defined by a
computer system.
Example: Following are the major activities of an operating system with respect to protection:
Part B
1. History of Malware
The term malware was first used by computer scientist and security researcher Yisrael Radai in 1990.
However, malware existed long before this. One of the first known examples of malware was the Creeper
virus in 1971, which was created as an experiment by BBN Technologies engineer Robert Thomas. Creeper
was designed to infect mainframes on ARPANET. While the program did not alter functions -- or steal or
delete data -- it moved from one mainframe to another without permission while displaying a teletype
message that read, "I'm the creeper: Catch me if you can." Creeper was later altered by computer scientist
Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer
worm. The concept of malware took root in the technology industry, and examples of viruses and worms
began to appear on Apple and IBM personal computers in the early 1980s before becoming popularized
following the introduction of the World Wide Web and the commercial internet in the 1990s. Since then,
malware, and the security strategies to prevent it, have only grown more complex.
In addition.
A brief look at the history of malware shows us that this malicious menace has been with us since the
dawn of computing itself. According to Scientific American, the idea of a computer virus extends back to
1949, when early computer scientist John von Neumann wrote the “Theory and Organization of
Complicated Automata,” a paper that postulates how a computer program could reproduce itself. In the
1950s, employees at Bell Labs gave life to von Neumann’s idea when they created a game called “Core
Wars.” In the game, programmers would unleash software “organisms” that competed for control of the
computer.
The earliest documented viruses began to appear in the early 1970s. Historians often credit the “Creeper
Worm,” an experimental self-replicating program written by Bob Thomas at BBN Technologies with being
the first virus. Creeper gained access via the ARPANET and copied itself to remote systems where it
displayed the message: “I’m the creeper, catch me if you can!”
The term “virus” however, wasn’t introduced until the mid-eighties. Fred Cohen, often considered the
father of what we know today as a computer virus, coined the term in his 1986 Ph.D. thesis. He defined a
“virus” in a single sentence as: “A program that can infect other programs by modifying them to include a,
possibly evolved, version of itself.”
From these simple and benign beginnings, a massive and diabolical industry was born. Today, according
to The Anti-Phishing Workgroup, malware has infected one-third of the world’s computers. The
consequences are staggering. Cybersecurity Ventures reports that losses due to cybercrime, including
malware, are anticipated to hit $6 trillion annually by 2021.
In this post, we’ll take a brief look at the history of malware and how it evolved and impacted the world.
For a more in-depth look at the various types of malware, see Lastline’s blog Malware Types and
Classifications.
Early malware was primitive, often spreading entirely offline via floppy disks carried from computer to
computer by human hands. As networking and the internet matured, malware authors were quick to adapt
their malicious code and take advantage of the new communication medium.
Here’s a representative list of some of the significant early versions of malware and how they impacted
the world[i].
1971 Creeper: An experiment designed to test how a program might move between
computers.
1974 – Wabbit: A self-replicating program that made multiple copies of itself on a
computer until it bogs down the system to such an extent that system performance is reduced and
eventually crashes. Researchers named this virus “wabbit” (rabbit) because of the speed at which
it was able to replicate.
1982 – Elk Cloner: Written by a 15-year-old, Elk Cloner is one of the earliest
widespread, self-replicating viruses to affect personal computers. Elk Cloner displayed a friendly
little poem on the infected system: “It will get on all your disks; It will infiltrate your chips; Yes,
it’s Cloner!”
1986 – Brain Boot Sector Virus: Generally regarded as the first virus to infect MS-
DOS computers. Its origin stems from two brothers in Pakistan who created it to test loopholes in
their company’s software.
1986 — PC-Write Trojan: Malware authors disguised one of the earliest Trojans as a
popular shareware program called “PC-Writer.” Once on a system, it would erase all of a user’s
files.
1988 — Morris Worm: This worm infected a substantial percentage of computers
connected to ARPANET, the forerunner of the Internet, essentially bringing the network to its
knees within 24 hours. Its release marked a new dawn for malicious software. The author, Robert
Morris, became the first malware author convicted for his crimes.
1991 — Michelangelo Virus: It was so named because the virus was designed to erase
information from hard drives on March 6th, the birthday of the famed Renaissance artist. The
virus was at the center of a wild media storm with panicked reporters claiming that it had
infected millions of computers and that the world would see dire consequences on March 6th. In
reality, the virus only impacted about 10,000 systems, but the hype significantly raised public
awareness of computer viruses.
1999 — Melissa Virus: Generally acknowledged as the first mass-emailed virus, Melissa
utilized Outlook address books from infected machines, and mailed itself to 50 people at a time.
History of Malware — Toolkits and Astonishing Rates of Infection
Between 2000 and 2010, malware grew significantly, both in number and in how fast infections spread. At the
start of the new millennium, Internet and email worms were making headlines across the globe. Later, we
witnessed a dramatic increase in malware toolkits, including the now infamous Sony rootkit, which was
instrumental in malware authors including rootkits in most modern malware. Crimeware kits aimed specifically
at websites also rose in popularity, and the number of compromised websites escalated correspondingly. SQL
injection attacks became a leading threat, claiming popular victims such as IKEA.
Here’s a summary of some of the significant malware released between 2000 and 2010:
Between 2010 and the present time, we’ve again observed significant evolution in the sophistication of
malware. Organized crime and state sponsors upped the game dramatically with large, well-funded
development teams. These malicious workgroups continue to evolve today, developing advanced malware with
evasion tactics that outsmart many conventional anti-malware systems. Infiltrating factories and military
systems became a common reality, and the monetization of malware grew rapidly with dramatic growth in
ransomware and other illegal schemes.
Here are some notable varieties of malware that have had a major impact between 2010 and today.
2010 – Stuxnet Worm: Shortly after its release, security analysts openly speculated that
this malicious code was designed with the express purpose of attacking Iran’s nuclear program
and included the ability to impact hardware as well as software. The incredibly sophisticated
worm is believed to be the work of an entire team of developers, making it one of the most
resource-intensive bits of malware created to date.
2011 — Zeus Trojan: Although first detected in 2007, the author of the Zeus Trojan
released the source code to the public in 2011, giving the malware new life. Sometimes called
Zbot, this Trojan has become one of the most successful pieces of botnet software in the world,
impacting millions of machines. It is often used to steal banking information by man-in-the-
browser keystroke logging and form grabbing.
2013 – Cryptolocker: One of many early ransomware programs, Cryptolocker had a
significant impact globally and helped fuel the ransomware era.
2014 – Backoff: Malware designed to compromise Point-of-Sale (POS) systems to steal
credit card data.
2016 – Cerber: One of the heavy-hitters in the ransomware sphere. It’s also one of the
most prolific crypto-malware threats. At one point, Microsoft found more enterprise PCs infected
with Cerber than any other ransomware family.
2017 – WannaCry Ransomware: Exploiting a vulnerability first uncovered by the
National Security Agency, the WannaCry Ransomware brought major computer systems in
Russia, China, the UK, and the US to their knees, locking people out of their data and demanding
they pay a ransom or lose everything. The virus affected at least 150 countries, including
hospitals, banks, telecommunications companies, warehouses, and many other industries.
History of Malware — From PCs to Just About Everything Electronic
Although malware gained much of its initial footing by infecting computers like PCs, today virtually anything
with a microprocessor is at risk. Researchers have demonstrated how malware can infect hundreds of new
targets, including wearables (like watches and Fitbits), light bulbs, automobiles, water supply systems, and
even airliners.
Moving from research and theory to reality, cybercriminals have already successfully deployed malware that
compromised everything from simple devices to complex industrial complexes, including mobile
phones, ATM machines, security cameras, TVs, e-cigarettes, vending machines, and nuclear plants. This
list is of course, just a small representation of actual malware infections.
History of Malware — Is This Just the Beginning?
Most wars involve a specific set of countries and have a defined beginning and end. Regrettably, the war with
malware impacts everyone across the globe and has no end in sight. According to CNBC, cyberattacks are the
fastest growing crime in the United States (and it’s easy to speculate, the fastest growing crime in the rest of the
world as well).
While the cybersecurity industry is feverishly working to control malware—and succeeding in many ways,
cybercriminals show no signs of defeat, or even of slowing down. When cybercriminals are thwarted in one
area, they quickly develop new tactics and attack in another. As a precursor to what may happen in the near
future, see Malware Attack Vectors: What to Expect in 2018.
In all probability, most of the history of malware lies in front of us, not behind us. We can expect to see
cybercrime continue to cause unprecedented damage to both private and public enterprises.
Fortunately, those organizations that diligently deploy the latest anti-malware solutions stand a good chance of
avoiding much of the damage that malware will no doubt inflict on the masses.
2. What is Malware?
Malware, or malicious software, is any program or file that is harmful to a computer user. Types
of malware can include computer viruses, worms, Trojan horses and spyware. These malicious programs
can perform a variety of functions such as stealing, encrypting or deleting sensitive data, altering
or hijacking core computing functions and monitoring users' computer activity.
3. What do Malware do?
Malware can infect networks and devices and is designed to harm those devices, networks and/or
their users in some way. Depending on the type of malware, this harm can take many forms and may
present itself differently to the user. In some cases, the effect malware has is relatively mild and benign,
and in others, it can be disastrous. No matter the method, all types of malware are designed to exploit
devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or
deployed the malware.
4. How do malware infections happen?
Malware authors use a variety of physical and virtual means to spread malware that infects
devices and networks. For example, malicious programs can be delivered to a system with a USB drive
or can spread over the internet through drive-by downloads, which automatically download malicious
programs to systems without the user's approval or knowledge. Phishing attacks are another common
type of malware delivery where emails disguised as legitimate messages contain malicious links or
attachments that can deliver the malware executable file to unsuspecting users. Sophisticated malware
attacks often feature the use of a command-and-control server that enables threat actors to communicate
with the infected systems, exfiltrate sensitive data and even remotely control the compromised device or
server.
Emerging strains of malware include new evasion and obfuscation techniques that are designed to not
only fool users but security administrators and antimalware products as well. Some of these evasion
techniques rely on simple tactics, such as using web proxies to hide malicious traffic or source IP
addresses. More sophisticated threats include polymorphic malware that can repeatedly change its
underlying code to avoid detection from signature-based detection tools; anti-sandbox techniques that
enable the malware to detect when it is being analyzed and to delay execution until after it leaves the
sandbox; and fileless malware that resides only in the system's RAM to avoid being discovered.
5. Common types of Malware
Different types of malware contain unique traits and characteristics. Types of malware include:
A virus is the most common type of malware that can execute itself and spread by infecting other
programs or files.
A worm can self-replicate without a host program and typically spreads without any human
interaction or directives from the malware authors.
A Trojan horse is designed to appear as a legitimate software program to gain access to a system.
Once activated following installation, Trojans can execute their malicious functions.
Spyware is made to collect information and data on the device and user, as well as observe the user's
activity without their knowledge.
Ransomware is designed to infect a user's system and encrypt its data. Cybercriminals then demand
a ransom payment from the victim in exchange for decrypting the system's data.
A rootkit is created to obtain administrator-level access to the victim's system. Once installed, the
program gives threat actors root or privileged access to the system.
A backdoor virus or remote access Trojan (RAT) secretly creates a backdoor into an infected
computer system that enables threat actors to remotely access it without alerting the user or the
system's security programs.
Adware is used to track a user's browser and download history with the intent to display pop-up or
banner advertisements that lure the user into making a purchase. For example, an advertiser might
use cookies to track the webpages a user visits to better target advertising.
Keyloggers, also called system monitors, are used to track nearly everything a user does on their
computer. This includes emails, opened webpages, programs and keystrokes.
There are several ways users can prevent malware. In the case of protecting a personal computer, users can
install antimalware software. Beyond that, users can prevent malware by practicing safe behavior on their
computer or other personal devices. This includes not opening attachments from strange email addresses that
may contain malware disguised as a legitimate attachment -- such emails may even claim to be from legitimate
companies but have unofficial email domains. Users should also update their antimalware software regularly, as
hackers are always adapting and developing new techniques to breach security software. Security software
vendors respond by releasing updates that patch those vulnerabilities. If a user neglects to update their software,
they may miss out on a patch that leaves them vulnerable to a preventable exploit.
In enterprise settings, networks are larger than home networks, and there is more at stake financially. There are
proactive steps companies should take to enforce malware protection. Outward-facing precautions include:
Implementing offline malware and threat detection to catch malicious software before it spreads.