Computer Malware and Security Concepts Study Notes
Information Attacks
- Attacks on computer systems and networks involve broader considerations beyond just the immediate threat.
Malware Components
- Delivery Method: Determines how malware is introduced to a system (e.g., phishing emails).
- Payload: The effect or damage caused by the malware once it is delivered (e.g., ransomware encrypting files).
- Combination of delivery method and payload allows classification into specific malware types (e.g., virus, worm, Trojan).
Malware Definition
- Malicious software causing unwanted effects or damages, compromising integrity, confidentiality, or availability of information systems.
- Centered around the CIA Triad:
- Confidentiality: Protection of data from unauthorized access.
- Integrity: Ensuring data is accurate and trustworthy.
- Availability: Ensuring authorized users have access to data when needed.
Malware Examples
- Ransomware: Locks and encrypts files, demanding payment for decryption keys.
- Viruses: Require human action (like opening a file) to spread and cause damage. Examples include:
- Melissa Virus (1999): Spread via email by using contacts to send itself, causing significant confusion and financial damages primarily through loss of productivity and repair efforts (approximately 80,000,000).
Types of Attacks
- Availability Attacks: Deny users access (e.g., denial-of-service attacks).
- Confidentiality Attacks: Involve loss or theft of personal information.
- Integrity Attacks: Result in altered credible data (e.g., erroneous bank account totals).
Computer Viruses
- Defined as a software program harming computer files and systems, needing a host to spread.
- Distinction from biological viruses: computer viruses cannot replicate independently.
- Spread by human interaction (e.g., infected USB drives, email attachments).
- Types of viruses include:
- Overwriting viruses
- Inserting or appending code to existing files
Worms
- Autonomous malware that propagates without human interaction by exploiting software vulnerabilities.
- Can cause network disruptions through aggressive scanning.
- Damage is primarily due to network traffic overload.
Key Terminology
- Vulnerability: A flaw in software that can be exploited.
- Exploit: Code/technique that takes advantage of a vulnerability.
- Patch: A fix for a discovered vulnerability.
Vulnerability Cycle
- The lifecycle includes:
- Discovery
- Disclosure
- Patch creation
- Patching systems in the wild
Zero-Day Exploits
- Vulnerabilities that remain unknown to vendors and users until exploitation occurs, very valuable on the black market.
The MS Blaster Worm
- Originated from a vulnerability in Microsoft's RPC, allowing remote exploitation.
- Patched on the same day it was discovered, decreasing vulnerability exposure time.
Differences Between Viruses and Worms
- Viruses require human action to spread; Worms self-propagate.
- Viruses depend on hosts; Worms exploit vulnerabilities directly.
- Viruses often cause direct damage; Worms can cause network disruptions without malicious payloads.
Conclusion: The discourse on security should include understanding different types of malware, how they spread, the significance of vulnerabilities, and the consequences of these attacks across various sectors and systems.