Title: Vulnerabilities and Viruses in Vista
1 Vulnerabilities and Viruses in Vista
- Keynote Speech for AICE
- Chris Imafidon, PhD, FAAO, MBCS, FRSH
- Acknowledgements Anne-Marie
2Myths of Viruses
- The original computer virus was not located on a
pc - It was not on an apple
- It was not on a mini or mainframe
- It was not located on computer hardware or
software of any kind
3computer virus?
- It was in a work of fiction!
4Fred Cohen, PhD, first theorised viruses
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing1
line
5Virus or vulnerability?
- Computer virus have become todays headline news
- With the increasing use of the Internet, it has
become easier for virus to spread - Virus show us loopholes in software
- Most virus are targeted at the MS Windows OS
6Robert Morris wrote the internet worm in 1988
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing1
line
VIRUS
7Trojan Horse programs come from the Odyssey!
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing1
line
8computer virus/MP?
- Today, viruses are only one type of a whole
menagerie of computer ills that are collectively
known as Malicious programs - malware - From spam to spyware,
- We need to detect, prevent and protect against
all kinds of content security ills
9(No Transcript)
10DEMO ANALYSIS
- Lovebug
- Anna
- Melisa
- Kornikova
11Definition
- Virus A true virus is capable of self
replication on a machine. It may spread between
files or disks, but the defining character is
that it can recreate itself on its own with out
traveling to a new host
12Overview
- Background
- Symptoms
- Classifying Viruses
- Examples
- Protection/Prevention
- Conclusion
13Background
- There are estimated 30,000 computer viruses in
existence - Over 300 new ones are created each month
- First virus was created to show loopholes in
software
14Virus Languages
- ANSI COBOL
- C/C
- Pascal
- VBA
- Unix Shell Scripts
- JavaScript
- Basically any language that works on the system
that is the target
15Symptoms of Virus Attack
- Computer runs slower then usual
- Computer no longer boots up
- Screen sometimes flicker
- PC speaker beeps periodically
- System crashes for no reason
- Files/directories sometimes disappear
- Denial of Service (DoS)
16Virus through the Internet
- Today almost 87 of all viruses are spread
through the internet (source ZDNet) - Transmission time to a new host is relatively
low, on the order of hours to days - Latent virus
17Classifying Virus - General
- Virus Information
- Discovery Date
- Origin
- Length
- Type
- SubType
- Risk Assessment
- Category
18Classifying Virus - Categories
- Stealth
- Polymorphic
- Companion
- Armored
19Classifying MP - Types
20Virus du Jour
1987
Boot Sector
1990
File Infector
Macro Virus
1995
Email Worm
1999
Blended Threat
2001
21Zero day attack brought by network virus is
coming?
SASSER
MSBLAST
NACHI
Days required viruses to appear after
vulnerability announced.
NIMDA
CodeRed
SQLP
Internet
22ADWARE, SPYWARE, UPWARE, DOWNWARE, MEWARE, YOUWARE
23HOW MANY VIRUSES????
24HOW MANY VIRUSES????
- 122,000!all viruses ever discovered including
zoo (never infected anyone) samples. - 2,000!viruses discovered or reported in the wild
(actually infecting computer systems) - 260!mean number of viruses in circulation at any
given month - 5!number of viruses active on any single day
25HOW MANY VIRUSES????
- WHY AM I TELLING YOU THIS?
- It has taken fifteen years for there to have ever
been 1,100 ITW viruses. - In a little less than two years, there are more
than TWENTY THOUSAND spyware. - That is the difference that profit motivation
makes.
26Can you spot the wildlist founders in the photo?
X
X
X
Joe Wells and Sara Gordon
27Wildlist Data
28Spyware-Adware Detection
- What is Spyware?
- Software application that monitors a users
computing habits and personal information, and
sends this information to third parties without
the users authorization or knowledge - Key loggers, event loggers, cookies, screen
captures or a combination of these forms - What is Adware?
- Software application that displays advertising
banners while the program is running - Gray Area
- Some users view them as useful tools or
utilities, while others view them as malicious
applications that should be detected. - Some companies that make Adware have attempted to
sue AV companies that categorize their software
as Spyware or a virus.
29Malware vs. Adware Gray Area
30Anti-spyware Capability of Trend Micro IWSS
- Detects and blocks malicious/illicit spyware via
standard virus pattern file - Can be set by administrator to block legitimate
but unwanted spyware, adware, remote access
tools, hacking tools and more - via a separate
spyware pattern file - Anti-phishing feature can also block
communication to spyware related URLs
31SPAM and Phishing
32How Can We Eliminate SPAM 100
Switch to another medium of communications?
33Trend Micro SPS
Trend Micro Spam Prevention Service
Admin Tools Integration APIs
Postini Anti-Spam Engine
Message Parser Decoder
Rule Weighting file and Engine downloads
2
Content Analysis
Trend Micro Gateway Product
Header Analysis
1
3
4
Internal Mail Server
Sending Mail Servers
End User Machines
34New Threats
35New threats coming...
- Cell phone viruses
- Threats against Windows embedded devices like POS
terminal, ATM and more - Any network enabled devices is facing threats of
malware.
36Windows ATMs raise security issues in XPe platform
37Antivirus for Windows embedded devices
MVP Appliance
?MVP Appliance will protect Windows embedded
devices from network viruses . Itll reside
outside of these devices as separate box.
MVP appliance will monitor packets and
detect/eliminate network viruses before these get
to these devices. Once it detects network virus
infected packets, it'll block them to avoid virus
outbreak.
KIOSK terminal
POS
Clean Packet
ATM
MFP
38Trend Micro EPS
39Our Approach
Trend Micro Antivirus and Content Security
Products
Network Layer
Centralized Management LIFECYCLE management,
deployment, and reporting
40DEMO
41Scholarships/admissions to top 6th form schools
- How many GCSEs in Year 10?
- Mock exams vs Predicted grades
- Relevant subjects vs Best subjects
42The main difference between IB, A-levels and AVCE
- IB coursework, uni simulation
- A-level traditional and theoretical
- AVCE vocational, post-1992 unis
43Scholarships/admissions to top secondary schools
- Years 3 and 4
- Non-verbal and Verbal
- Bond Series
- Drilling and training
44QA?