0% found this document useful (0 votes)
90 views7 pages

Systems and Network Security CSE 628/628A: Sandeep K. Shukla Indian Institute of Technology Kanpur

This document provides an introduction to systems and network security. It acknowledges contributions from several academics and outlines two key factors impacting computer security: numerous software bugs and vulnerabilities combined with financial incentives for exploiting systems. Statistics are presented on zero-day vulnerabilities in recent years and the rise of mobile malware and banking Trojans, with data showing financial malware increasingly targeting mobile operating systems.

Uploaded by

Harpreet Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views7 pages

Systems and Network Security CSE 628/628A: Sandeep K. Shukla Indian Institute of Technology Kanpur

This document provides an introduction to systems and network security. It acknowledges contributions from several academics and outlines two key factors impacting computer security: numerous software bugs and vulnerabilities combined with financial incentives for exploiting systems. Statistics are presented on zero-day vulnerabilities in recent years and the rise of mobile malware and banking Trojans, with data showing financial malware increasingly targeting mobile operating systems.

Uploaded by

Harpreet Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Systems and Network Security CSE

628/628A
Sandeep K. Shukla
Indian Institute of Technology Kanpur
Module 0.1: Introduction
Introduction to the context
and landscape
Acknowledgements
Dan Boneh (Stanford University)
John C. Mitchell (Stanford University)
Nicolai Zeldovich (MIT)
Jungmin Park (Virginia Tech)
Patrick Schaumont (Virginia Tech)
Web Resources
The computer security
Two factors: problem
Lots of buggy software (and gullible users)

Money can be made from finding and exploiting


vulns.

1. Marketplace for vulnerabilities

2. Marketplace for owned machines (PPI)

3. Many methods to profit from owned client machines

current state of computer security


Vulnerabilities Galore
Zero Day Vulnerabilities in last 3 yearsFor real time map
https://cybermap.kaspersky.com

Data: http://cve.mitre.org/
Source: Symantec Report
Mobile malware (Nov. 2013 Oct. 2014)

date

he rise of mobile banking Trojans (Kaspersky Security Bulletin 201


% in Mobile OS targeted by Financial Malware
2015 vs 2016

You might also like