Chapter 1 - Introduction To Computer Security
Chapter 1 - Introduction To Computer Security
Virus
– One of the two most common types
– Usually spreads through e-mail
– Uses system resources, causing slowdown or
stoppage
According to Symantec (makers of Norton antivirus and
other software products), a virus is “a small program
that replicates and hides itself inside other programs,
usually without your knowledge”
Introduction to computer security
8/10/22
11
504088 - Introduction
Malware (cont.)
Trojan Horse
– The other most
common kind of
malware
– Named after the
wooden horse of
ancient history
Spyware
– The most rapidly growing types of malware
• Cookies
• Key logger
Logic Bomb
– Lays dormant until some logical condition is met,
often a specific date.
Intrusions
– Attacks that break through
system resources
• Hackers
• Crackers
• Social engineering
• War-driving
• SQL injection
SELECT * FROM tblUsers WHERE USERNAME = ’ " + txtUsername.Text +' AND
PASSWORD = ’ " + txtPassword.Text +” '
SELECT * FROM tblUsers WHERE USERNAME = ’ ' or '1' = '1' AND PASSWORD = ’ '
or '1' = '1'
• Cross-site scripting
<script> window.location = "http://www.fakesite.com"; </script>
People:
– Hackers
• White hats
• Black hats
• Gray hats
– Script kiddies
– Sneakers (penetration tester = pentester)
– Ethical hackers
Devices
– Firewall
• Filters network traffic
– Proxy server
• Disguises IP address of internal host
– Intrusion Detection System
• Monitors traffic, looking for attempted attacks
• CERT
– www.cert.org
• Microsoft Security Advisor
– www.microsoft.com/security/default.mspx
• F-Secure
– www.f-secure.com
• SANS
– www.sans.org
• What is malware?
• What is a penetration tester?
• What is spyware?
• What is a computer virus?
• What is war-driving?
• What is the most common threat on the Internet?
• Hacker Terminology ?