Ch04_Malware-Malicious_Software_2

Ch04_Malware2

图灵

冯诺依曼

病毒发展史

Worm

Code Red Worm

Bot herder is the owner who centrally controlled the botnets.

Malware Zombies

Malware can turn a computer in to a zombie, which is a machine that is controlled externally to perform malicious attacks, usually as a part of a botnet.

Privacy-Invasive Software

user’s privacy or information that a user considers sensitive or valuable

Two forms of privacy-invasive software:

What does spyware do?

Scareware

The selling approach uses social engineering to cause shock, anxiety, or the perception of a threat, generally directed at an unsuspecting user

Best Practices to safeguard against Malware

  1. Try to limit software installations to systems that come from trusted sources
  2. Avoid freeware and shareware
  3. Avoid peer- to- peer ( P2P) music and video sharing systems
  4. Install a network monitor that blocks the installation of known instances of privacy- invasive software or the downloading of web pages from known malware web sites.
  5. Install a network firewall,
  6. Use physical tokens, e. g., smartcards, or biometrics in addition to passwords for authentication,”Separation of Privilege”
  7. Keep all software up- to- date.