Tackling Malicious Code in a University Environment: A Case Study

ثبت نشده
چکیده

and Selection Criteria This paper is a case study of malicious code incidents in a large public university as seen through the eyes of the security liaison over a one-and-a-half year period. It documents Internet research of these incidents and provides some helpful resources available on the Internet for other university Informa ion Systems Security Officers (ISSOs). This university acts as an Internet Service Provider (ISP) to the students, granting them access to the Internet in a variety of ways with multiple operating systems and platforms supported on multiple subnetworks. Although difficult to configure or control, this variety can have an advantage – diverse operating systems and e-mail applications can sometimes limit the amount of damage a specific instance of malicious code can cause given its dependencies on the operating system and/or applications it uses to spread. As long as there are users, there will be malicious code; so, as long as there are universities, there will be malicious code incidents. Glossary of Terms hybrid – as malicious code becomes increasingly sophisticated, a new type is emerging that combines characteristics from more than one type; e.g., malicious code that contains both worm and virus characteristics. mobile malicious code – viruses that self-propagate. This type of virus not only spreads itself by infecting new files, but it also “transfers the newly infected files to other systems.”[5] Because of this additional functionality, these viruses are only dependent on user action for initial infection and not propagation. security liaison – a university ISSO that acts as a liaison (e.g., being “NICE”) between the “suits” (e.g., administration, faculty, law enforcement) and “ponytails” (e.g., students, information technology (IT) staff) in addition to his/her regularly-defined ISSO duties.[29]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RESCUE: Reputation based Service for Cloud User Environment

Exceptional characteristics of Cloud computing has replaced all traditional computing. With reduced resource management and without in-advance investment, it has been victorious in making the IT world to migrate towards it. Microsoft announced its office package as Cloud, which can prevent people moving from Windows to Linux. As this drift is escalating in an exponential rate, the cloud environ...

متن کامل

Mobile Code Security Techniques

This paper presents a survey of existing techniques for achieving mobile code security, as well as a representative sampling of systems which use them. In particular, the problem domain is divided into two portions: protecting hosts from malicious code; and protecting mobile code from malicious hosts. The discussion of the malicious code problem includes a more in-depth study of the Java securi...

متن کامل

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Client-side cross-site scripting protection

Web applications are becoming the dominant way to provide access to online services. At the same time, web application vulnerabilities are being discovered and disclosed at an alarming rate. Web applications often make use of JavaScript code that is embedded into web pages to support dynamic client-side behavior. This script code is executed in the context of the user’s web browser. To protect ...

متن کامل

Tackling uncertainty in safety risk analysis in process systems: The case of gas pressure reduction stations

Industrial plants are subjected to very dangerous events. Therefore, it is very essential to carry out an efficient risk and safety analysis. In classical applications, risk analysis treats event probabilities as certain data, while there is much penurious knowledge and uncertainty in generic failure data that will lead to biased and inconsistent alternative estimates. Then, in order to achieve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015