phishing social engineering various malwares
play

Phishing, Social Engineering, Various malwares Week 3 Frank Chen | - PowerPoint PPT Presentation

Ray-Ban phishing scams occur a lot on Facebook CS 88S Phishing, Social Engineering, Various malwares Week 3 Frank Chen | Spring 2017 Agenda Review last weeks material Phishing & Social Engineering Various Malwares Spam


  1. Ray-Ban phishing scams occur a lot on Facebook CS 88S Phishing, Social Engineering, Various malwares Week 3 Frank Chen | Spring 2017

  2. Agenda ● Review last week’s material ● Phishing & Social Engineering ● Various Malwares ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  3. Announcement Frank Chen | Spring 2017

  4. Agenda ● Review last week’s material ● Phishing & Social Engineering ● Various Malwares ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  5. Hack? Def: Maliciously taking advantage of a system's CIA paradigms Frank Chen | Spring 2017

  6. Hack? Def: A slang for innovatively solving a problem or making a product. Frank Chen | Spring 2017

  7. Hackathon? Def: Programming competitions where students are encouraged to build anything they’d like. From websites to apps to hardware products etc. Frank Chen | Spring 2017

  8. Implicit Bias Def: Bias in judgment and/or behavior that results from subtle cognitive processes (e.g., implicit attitudes and implicit stereotypes) that often operate at a level below conscious awareness and without intentional control. UCLA Vice Chancellor Jerry Kang's TED talk video: http://bit.ly/2oaM8Ek Frank Chen | Spring 2017

  9. Agenda ● Review last week’s material ● Phishing & Social Engineering ● Various Malwares ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  10. C Phishing I A Def: The activity of defrauding an online account holder of financial information by posing as a legitimate company Frank Chen | Spring 2017

  11. An Overview Source : http://bit.ly/24tI2V0 Frank Chen | Spring 2017

  12. Spelling Attackers may not speak English at all. Source : http://bit.ly/2oCq1Jj Frank Chen | Spring 2017 Frank Chen | Spring 2017

  13. Suspicious Links Never click on links before Source : http://unfurlr.com/ checking them properly. Most URL shortener websites give you the option to check a URL. Source: https://techhelpkb.com/how-to-check- shortened-urls-for-safety/ Source : https://bitly.com/ Frank Chen | Spring 2017 Frank Chen | Spring 2017

  14. Threats Intended to take advantage of our fear of the unknown Source : http://bit.ly/2kjyos0 Frank Chen | Spring 2017 Frank Chen | Spring 2017

  15. Popular Company or Organization Intended to add credibility to the phish Source : http://bit.ly/2oiuNbo Frank Chen | Spring 2017 Frank Chen | Spring 2017

  16. Phishing via Facebook Source : http://bit.ly/2oiuNbo Frank Chen | Spring 2017

  17. Phishing via Google https://l.facebook.com/l.php?u=http%3A%2 Translate F%2Ftranslate.google.com%2Ftranslate%3Fs l%3Den%26tl%3Dde%26u%3Dhttp%253A%252F%25 2Fyjtdydjyc.es.tl%252F%253F0706155&h=ATP -krBIeekxAKsByfeNch_ZDF70pcQHGSWJdO3V40F _2ZZXQQTCwnH6YwGn8qHIwPq69ICvchuDq82FdPj gV2M7PiciBXVtpxmRiL9Lj52OhFuEh2rJsEc8ijG 6LrJjHXJhVlWNphA&s=1 Source : http://bit.ly/2nYXZIp Frank Chen | Spring 2017

  18. Phishing via Gmail Frank Chen | Spring 2017

  19. A CLoser Look Frank Chen | Spring 2017

  20. More Examples Frank Chen | Spring 2017

  21. C Social Engineering I A Def: Psychological manipulation of people into performing actions or divulging confidential information Frank Chen | Spring 2017

  22. Amazon Customer Service "Backdoor" Def: A backdoor is a method, often secret, of bypassing normal authentication in a secure system. Source : http://bit.ly/2gHurHF Frank Chen | Spring 2017

  23. Amazon Customer Service "Backdoor" Source : http://bit.ly/2gHurHF Frank Chen | Spring 2017

  24. Amazon Customer Service "Backdoor" Source : http://bit.ly/2gHurHF Frank Chen | Spring 2017

  25. Amazon Customer Service "Backdoor" Source : http://bit.ly/2gHurHF Frank Chen | Spring 2017

  26. A semi-realistic example Frank Chen | Spring 2017

  27. Agenda ● Review last week’s material ● Phishing & Social Engineering ● Various Malwares ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  28. Malware Def: Malware is short for malicious software , meaning software that can be used to compromise CIA principles of a system. Malware is a broad term that refers to a variety of malicious programs. **Note: Advanced understanding of how these malware works is out of the scope for this class, but the relevant readings are provided as resources. Frank Chen | Spring 2017

  29. C Adware I Adware (short for A advertising-supported software) is a type of malware that automatically delivers advertisements. Source : http://symc.ly/2pkTubZ Frank Chen | Spring 2017

  30. C Bot I Bots are software A programs created to automatically perform specific operations. Source : http://symc.ly/2pkOp3q Frank Chen | Spring 2017

  31. C Ransomware I Ransomware is a form of A malware that essentially holds a computer system captive while demanding a ransom. Source : http://symc.ly/2oMbU4t Frank Chen | Spring 2017

  32. C Rootkit I A rootkit is a type of A malicious software designed to remotely access or control a computer without being detected by users or security programs. Source : https://www.avast.com/c-rootkit Frank Chen | Spring 2017

  33. C Spyware I Spyware is a type of malware that A functions by spying on user activity without their knowledge. These spying capabilities can include activity monitoring, collecting keystrokes, data harvesting Source : http://bit.ly/2mZDefB Frank Chen | Spring 2017

  34. C Trojan Horse I A Trojan horse, commonly A known as a “Trojan,” is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. (Right: Impact of Zeus Trojan Horse worldwide) Source : http://symc.ly/2joUzZG Frank Chen | Spring 2017

  35. C Virus I A virus is a form of malware A that is capable of copying itself and spreading to other computers. Source : http://symc.ly/2pkOp3q Frank Chen | Spring 2017

  36. C Worm I They spread over computer A networks by exploiting operating system vulnerabilities.Worms typically cause harm to their host networks by consuming bandwidth and overloading web servers. Source : http://bit.ly/2p6Mz6h Frank Chen | Spring 2017

  37. Agenda ● Review last week’s material ● Phishing & Social Engineering ● Various Malwares ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  38. Spam/Ham ฀ 143 Million Americans...they didn't expect this Dear Frank, at all… ฀ Do you have 10 minutes to meet <link to strange website URL: tomorrow about http://difirtyuio.ga/neyJjIjogNzM1NjAsICJmIjog my roommate conflict situation? MCwgIm0iOiA2Mzk3MCwgImwiOiA2NCwgInM iOiAwLCAidSI6IDIzNTYzMTQwMywgInQiOiAxL Thanks, CAic2QiOiAyMH0=> Bob *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  39. Strategy: Count the Words free … 100 free … 1 money … 10 money … 1 . . . . . . . . . . . . account … 2 account … 2 *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  40. Train a Classifier Model Our "Magical" Email labeled as 'ham' Classifier Model Email labeled as 'spam' *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  41. How to train the Classifier Model Given: Training Data Ɗ Goal: Learn some parameters π, θ under some constraints. *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  42. Solve: Constrained Optimization Out of scope for this class! For more information on the math formulations behind Bayes Optimal Classifier and Constrained Optimization using Lagrange Multipliers, check out Prof. Talwalkar's slides on Logistic Regression. http://web.cs.ucla.edu/~ameet/teaching/winter17/cs260/lecture s/lec05.pdf *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  43. Use model to make prediction Our "Magical" OR Classifier Model New, unlabeled email *Slide content credit to Prof. Ameet Talwalkar Frank Chen | Spring 2017

  44. Google ReCaptcha Cursor Movement in the x and y-axis ● Prior Behavior ● Click Location History ● For more information, visit Google's Security Blog: http://bit.ly/2fUMY2G Frank Chen | Spring 2017

  45. Agenda ● Review last week’s material ● Phishing, Social Engineering, Identity Theft ● Extended Examples ● Spam Classification: A Machine Learning Approach ● Resources + Best Practices Frank Chen | Spring 2017

  46. Anti-Virus Software Def: computer software used to prevent, detect and remove malicious software. Frank Chen | Spring 2017

  47. Avast As of 2015, Avast is the most popular antivirus on the market, and it had the largest share of the market for antivirus applications. Avast has both desktop and mobile applications. Frank Chen | Spring 2017

  48. AVG A family of antivirus and Internet security software developed by AVG Technologies, a subsidiary of Avast Software. Frank Chen | Spring 2017

  49. MalwareBytes Primarily a scanner that scans and removes malicious software, including rogue security software, adware, and spyware Frank Chen | Spring 2017

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend