1. Trang chủ
  2. » Luận Văn - Báo Cáo

midterm examination course title principles of information security

28 0 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Research on malicious codes: Analyzing the malicious codes (malware, ransomware or phishing attack) and methods for preventing the malicious codes.
Tác giả Pham Vu Quynh Anh, Nguyen Chi Nghia, Nguyen Bao Ngoc
Trường học VNU- INTERNATIONAL SCHOOL
Chuyên ngành Principles of Information Security
Thể loại Project + Presentation
Định dạng
Số trang 28
Dung lượng 1,64 MB

Nội dung

Group 3 Project: Research on malicious codes: Analyzing the malicious codes malware, ransomware or phishing attack and methods for preventing the malicious codes.. Motivation for choosi

Trang 1

VIETNAM NATIONAL UNIVERSITY, HA NOI VNU- INTERNATIONAL SCHOOL

MIDTERM-EXAMINATION COURSE TITLE: Principles of Information Security

Project + Presentation

Trang 2

Group 3 Project: Research on malicious codes: Analyzing the malicious codes ( malware, ransomware or phishing attack) and methods for preventing the malicious codes

Contribution

Student’s Name Student ID Task

Pham Vu Quynh Anh 21070633 Introductio, Chapter 1 and

Malware Nguyen Chi Nghia 19071067 Phishing attack and

chapter 3 Nguyen Bao Ngoc 20070963 Ransomware and

Conclusion

Trang 3

CONTENTS

LIST OF TABLES 3

LIST OF FIGURES 3

INTRODUCTION 4

I Motivation for choosing the topic 4

II Purpose of the research project 4

CHAPTER 1 DEFINITION AND DETRIMENTAL EFFECTS OF MALICIOUS CODE 5

I Definition 5

II Significance of Malicious Codes 5

CHAPTER 2 SOME TYPICAL MALICIOUS 6

I Malicious Codes: Malware 6

1 Definition and types of malware (viruses, worms, Trojans, etc.) 6

2 Characteristics and behavior of malware 7

3 Examples of notable malware attacks 8

4 Methods for preventing malware 10

II Malicious Codes: Ransomware 11

1 Definition and explanation of ransomware 11

2 Characteristics and behavior of ransomware 12

3 Examples of notable ransomware attacks 12

4 Methods for preventing ransomware 14

III Malicious Codes: Phishing Attacks 15

1 Definition and explanation of phishing attacks 15

2 Characteristics and methods used in phishing attacks 15

3 Examples of notable phishing attacks 16

4 Methods for preventing phishing attacks 18

CHAPTER 3 COMPARATIVE ANALYSIS 20

I Similarities and differences between malware, ransomware, and phishing attacks 20

Trang 4

2 Significant differences between Ransomware, Malware, and Phishing: 20

II Common prevention methods applicable to all three types of malicious codes 21 CONCLUSION 23

I Recap of key findings on malicious codes and prevention methods 23

II Importance of implementing preventive measures to mitigate risks

23

III Future considerations and emerging trends in malicious codes and prevention 23 REFERENCE 24

Trang 5

LIST OF TABLES Tabe 1: Significant differences between Ransomware, Malware, and Phishing 20

LIST OF FIGURES Figure 1 Stuxnet attack process 9 Figure 2 Mirai attack process 10 Figure 3 Informs you that you have been infected with the Wanna Cry Ransomware virus 13 Figure 4 Screenshots of computers attacked by NotPetya malware show that hackers demand a ransom worth $300 in bitcoin for encrypted data 14 Figure 5 Illustration of hacker attacking Yahoo 17 Figure 6 Illustration of two candidates competing for the 2016 US presidential election 18

Trang 6

INTRODUCTION

I Motivation for choosing the topic

Malicious codes, such as malware, ransomware, and phishing attacks, pose

a significant threat to individuals, organizations, and governments around the world These attacks are becoming increasingly sophisticated and frequent, and they are causing billions of dollars in losses each year Overall, studying malicious codes, such as malware, ransomware, and phishing attacks, is vital

in addressing the ever-growing cybersecurity challenges and protecting individuals, organizations, and critical infrastructures from potential threats

II Purpose of the research project

The research project aims to understand various types of malicious codes, analyze their characteristics, and assess the risks they pose to computer systems and individuals It also aims to explore prevention and mitigation strategies, conduct case studies, and compare different types of malicious codes By doing so, the project seeks to enhance knowledge, raise awareness, and contribute to cybersecurity efforts in protecting against and mitigating the risks of malicious codes

Trang 7

CHAPTER DEFINITION AND DETRIMENTAL EFFECTS OF 1.

MALICIOUS CODE

I Definition

Malicious code is a term for code ( whether it be part of a script or embedded

in a software system) designed to cause damage, security breaches or other threats to application security An important part of this definition is intent NonMalicious attacks do happen and are often accidental or due to negligence Malware can infect a network from a phishing email, for example

Malicious code comes in many forms:

● Trojans

● Viruses

● Ransomware

● Phishing attacks

II Significance of Malicious Codes

Malicious code can cause serious harm to individuals, organizations, and society It poses a security threat, proliferates and becomes more sophisticated over time, has an economic impact, invades privacy, and disrupts operations Implementing cybersecurity practices and preventive measures is crucial to mitigate these risks and protect against malicious code

Trang 8

CHAPTER 2 SOME TYPICAL MALICIOUS

I Malicious Codes: Malware

1 Definition and types of malware (viruses, worms, Trojans, etc.)

Malware is a general term for any software program or code that is designed

to cause harm to a computer system or network It can be used to steal data, damage files, or even take control of a system Malware is becoming increasingly sophisticated and difficult to detect, and it is a serious threat to individuals and businesses alike.Malware can be designed to do a variety of things, including:

● Steal data, such as passwords, credit card numbers, or personal information

● Disrupt or disable computer systems

● Take control of computer systems

● Launch denial- -service attacks of

● Extort money from victims

There are many different types of malware, but some of the most common include:

- Viruses: Viruses are self-replicating programs that can attach themselves to other programs and files Once a virus has infected a system, it can spread to other systems and networks

- Worms: Worms are similar to viruses, but they do not need to attach themselves to other programs or files to spread Instead, they can exploit vulnerabilities in software to spread automatically

- Trojans: Trojans are malicious programs that disguise themselves as legitimate programs Once a Trojan has been installed on a system, it can allow the attacker to take control of the system or steal data

- Spyware: Spyware is malicious software that is designed to monitor a user's activity on their computer Spyware can be used to steal passwords, credit card numbers, and other sensitive information

- Ransomware: Ransomware is malicious software that encrypts a user's files and demands a ransom payment in order to decrypt the files

Other types of malware include:

- Adware: Adware is malicious software that displays unwanted advertisements on a user's computer

Trang 9

- Rootkits: Rootkits are malicious programs that give the attacker complete control over a system Rootkits are often difficult to detect and remove

- Logic bombs: Logic bombs are malicious programs that are designed to trigger a harmful event at a specific time or when a certain condition is met

- Backdoors: Backdoors are malicious programs that create a hidden entrance into a system that the attacker can use to gain access to the system

2 Characteristics and behavior of malware

Malware is any malicious software program or code that is designed to harm

a computer system or network It can be used to steal data, damage files, or even take control of a system Malware is becoming increasingly sophisticated and difficult to detect, and it is a serious threat to individuals and businesses alike

Malware can have a variety of characteristics, depending on the type of malware However, some common characteristics include:

- Self-replication: Malware can often replicate itself, allowing it to spread to other systems and networks

- Stealth: Malware is often designed to be stealthy, making it difficult to detect and remove

- Polymorphism: Malware can often change its form or appearance, making it difficult for security software to detect

- Persistence: Malware can often persist on a system even after it has been detected and removed

Malware can also have a variety of behaviors, depending on the type of malware However, some common behaviors include:

- Stealing data: Malware can be used to steal a variety of data, including passwords, credit card numbers, and other sensitive information

- Disabling security software: Malware can often disable security software, making it easier for other malware to infect the system

- Taking control of the system: Malware can often take control of a system, allowing the attacker to remotely control the system or install other malware

- Encrypting files: Ransomware is a type of malware that encrypts a user's files and demands a ransom payment in order to decrypt the files

Trang 10

3 Examples of notable malware attacks

There have been many notable malware attacks over the years, some of which have had a significant impact on individuals, businesses, and governments Here are a few examples:

a Stuxnet (2010)

Stuxnet was a computer worm that was first discovered in 2010 It is widely believed to have been developed by the United States and Israel to target Iran's nuclear program Stuxnet was designed to attack Siemens SCADA systems, which are used to control industrial processes It was able to infiltrate these systems and cause them to malfunction, leading to damage to centrifuges used to enrich uranium

Stuxnet was a highly sophisticated piece of malware, and it was able to evade detection for a long period of time It is considered to be one of the first examples of a cyberweapon, and it has raised concerns about the potential for cyberwarfare

Stuxnet had a significant impact on Iran's nuclear program, and it is believed

to have delayed the program by several years It also showed that cyberweapons can be used to cause real-world damage

Here are some of the key features of Stuxnet:

● It was a highly targeted attack, designed to specifically attack Iran's nuclear program

● It was very sophisticated and was able to evade detection for a long period

of time

● It was able to cause real-world damage, by damaging centrifuges used to enrich uranium

● It raised concerns about the potential for cyberwarfare

Stuxnet was a highly sophisticated computer worm/malware discovered in June 2010 It targeted Iranian industrial facilities, including a uranium enrichment plant, and raised concerns about the potential for computer worms to be used for sabotage rather than just information theft Stuxnet had

a complex operating mechanism and unique characteristics It exploited previously unknown vulnerabilities to achieve its objectives The detailed process is as follows:

Trang 11

Figure 1 Stuxnet attack process

b Mirai (2016)

Mirai was a botnet malware discovered in 2016, believed to be developed by

a group of hackers in Russia It targeted insecure Internet of Things (IoT) devices, infecting them to create a network of compromised devices Mirai used this botnet to launch distributed denial- -service (DDoS) attacks on ofwebsites and online services It spread rapidly by exploiting vulnerabilities and weak default passwords on IoT devices

The impact of Mirai was significant, as it was responsible for high-profile DDoS attacks in 2016, causing widespread outages of popular websites and services It highlighted the potential threat posed by insecure IoT devices and the need to improve their security

The Mirai botnet attack process can be summarized in three main steps:

- Step 1 Scanning: The botnet scans the internet for vulnerable IoT devices It looks for devices with weak security configurations or default credentials

- Step 2 Compromising: Once vulnerable devices are identified, Mirai exploits their vulnerabilities to gain unauthorized access and control over them It infects the devices with the Mirai malware, turning them into botnet nodes

- Step 3 Launching Attacks: The infected devices, now part of the Mirai botnet, are instructed to carry out distributed denial- -service (DDoS) attacks of

Trang 12

These attacks involve flooding target websites or services with massive amounts of traffic, overwhelming their resources and causing disruptions

Figure 2 Mirai attack process

4 Methods for preventing malware

Malware is a serious threat to individuals, businesses, and organizations of all sizes By taking steps to prevent malware infections, you can help protect yourself and your systems from harm

a Installing reputable antivirus software

Antivirus software plays a crucial role in detecting and removing malware from your system When selecting antivirus software, it's important to consider factors such as effectiveness, features, ease of use, and price There are many antivirus software options available on the market, both free and paid.There are a number of free antivirus software options available that offer a good level of protection Some of the most popular free antivirus software include:Avast Free Antivirus, AVG Free Antivirus, Malwarebytes Free…

Paid antivirus software typically offers more features and protection than free antivirus software Some of the most popular paid antivirus software include: McAfee Total Protection, Norton AntiVirus Plus, Kaspersky Internet Security…

b Keeping software and operating systems updated

Keep your software and operating systems up to date Software developers regularly release updates to their software to patch security vulnerabilities It

is important to install these updates as soon as they are available This will

Trang 13

help to protect your system from malware that exploits known security vulnerabilities

c Exercising caution with downloads and email attachments

Be careful about what links you click on in emails, social media posts, and websites Phishing attacks often use malicious links to trick people into revealing their personal information or installing malware on their systems Only download files from trusted sources and only open email attachments from people you know If you are unsure about a download or email attachment, do not open it

d Enabling firewalls and network security measures

Firewalls and network security measures can help to protect your system from unauthorized access and malware attacks It is important to enable firewalls and network security measures on your system and to keep them

up to date Besides, use strong passwords for all of your online accounts and enable two-factor authentication whenever possible This will help to protect your accounts from being compromised by attackers

Malware is a serious threat to individuals and organizations alike By understanding the different types of malware and taking steps to prevent malware infections, you can help to protect your computer systems and data

II Malicious Codes: Ransomware

1 Definition and explanation of ransomware

Ransomware is a type of malware that encrypts a victim's files and demands

a ransom payment in order to decrypt them Ransomware attacks can target individuals, businesses, and even governments

Ransomware can be delivered in a variety of ways, including:

- Email attachments: Ransomware can be disguised as an attachment to an email message When the victim opens the attachment, the ransomware is installed on their computer

- Malvertising: Malvertising is malicious advertising that can be embedded on websites or in social media posts When a victim clicks on a malvertisement, the ransomware is installed on their computer

- Exploit kits: Exploit kits are malicious software that scans for vulnerabilities

in computer systems When an exploit kit finds a vulnerability, it can install ransomware on the victim's computer

Trang 14

Once ransomware is installed on a victim's computer, it will encrypt the victim's files The encryption process makes the files unreadable and unusable The ransomware will then display a message to the victim demanding a ransom payment in order to decrypt the files

The ransom payment is typically demanded in cryptocurrency, such as Bitcoin or Ethereum This makes it difficult for law enforcement to track the payments and identify the attackers

2 Characteristics and behavior of ransomware

Ransomware exhibits several characteristics and behaviors that distinguish

it from other types of malware:

- Encryption: Ransomware encrypts the victim's files or data, rendering them inaccessible without the decryption key

- Ransom Demand: Attackers demand a ransom payment from the victim in exchange for the decryption key

- Payment in Cryptocurrency: Ransom payments are typically requested in cryptocurrencies like Bitcoin, which provide a certain level of anonymity for the attackers

- Time Pressure: Ransomware often imposes a time limit for the ransom payment, threatening to permanently delete the encrypted files if the payment is not made within the specified timeframe

- Propagation: Ransomware can spread through various means, including malicious email attachments, infected websites, or exploiting vulnerabilities

in software or operating systems

- Evolution: Ransomware continues to evolve, with new variants and techniques emerging over time, making it challenging to detect and mitigate

3 Examples of notable ransomware attacks

a WannaCry

WannaCry is a ransomware worm that spread rapidly through a number of computer networks in May of 2017 After infecting a Windows computer, it encrypts files on the PC's hard drive, making them impossible for users to access, then demands a ransom payment in bitcoin in order to decrypt them WannaCry exploited a known vulnerability in the Microsoft Server Message Block (SMB) protocol, which is used to share files and printers across

Ngày đăng: 08/08/2024, 21:53

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

w