460-4054/01 – Computer Viruses and Security of Computer Systems (PVBPS)
Gurantor department | Department of Computer Science | Credits | 4 |
Subject guarantor | prof. Ing. Ivan Zelinka, Ph.D. | Subject version guarantor | prof. Ing. Ivan Zelinka, Ph.D. |
Study level | undergraduate or graduate | Requirement | Optional |
Year | 1 | Semester | summer |
| | Study language | Czech |
Year of introduction | 2011/2012 | Year of cancellation | 2014/2015 |
Intended for the faculties | FEI | Intended for study types | Follow-up Master |
Subject aims expressed by acquired skills and competences
The aim of the course is to acquaint its students with the issue of computer viruses, their definition and classification, the method of spread in computer systems and possible misuse to penetrate computer systems. The course also includes work with sharp malware and construction of sample types of malware and its hybridization with artificial intelligence. The graduate will gain an overview of modern types of malware, their use as spyware and cyber weapons. Upon successful completion of this course, graduates will be able to apply measures to increase the security of computer systems.
Teaching methods
Lectures
Tutorials
Project work
Summary
The course will discuss a wider range of techniques of so-called malicious code. Both historically classical techniques and modern procedures and algorithms will be mentioned. Furthermore, computer viruses, their classification and methods of spread, work with sharp malware and construction of sample types of malware and their hybridization with artificial intelligence will be discussed at the introductory level. Modern types of malware and its use as spyware and cyber weapons. After completing the course, the student should have comprehensive knowledge of the above areas, including the possibility of countermeasure applications, increasing the security of computer systems.
The course will also include individual tasks arising from lectures (or exercises). Their control and presentation will be part of the lectures.
Compulsory literature:
Recommended literature:
7. Kevin Beaver, Hacking For Dummies, For Dummies; 3 edition, ISBN-10: 9780470550939
Way of continuous check of knowledge in the course of semester
Kontrola je založena na vypracovávání protokolů předmětu, pomocí kterých student prokazuje nejen pochopení informací z přednášek, ale i schopnost jejich implementace v daném programovém prostředí. K získání zápočtu je nutno odevzdat cvičícímu všechny požadované protokoly a mít alespoň 80% fyzické účasti na laboratořích. Zápočet je podmínkou NUTNOU k připuštění ke zkoušce.
U studentů kombinovaného studia jsou laboratoře nahrazeny vypracováním zadaných protokolů.
E-learning
Other requirements
It is required the ability to create programs in arbitrary programming language and apply lecture knowledge into algorithms.
Additional requirements are not defined.
Prerequisities
Subject has no prerequisities.
Co-requisities
Subject has no co-requisities.
Subject syllabus:
Lectures:
1. Umělá intelligence and artificial life, Self-replicated structure (the game of life, Fredkin's self-replicated structures, von Neumann and the theory of self-replicated automata). Artificial life and virtual universe (tierra biomorf, SBEAT, SBART, Eden SWIMBOOT). Artificial Life and Complex Systems.
2. Self-replicated structure, finite automata and Turing machines. Virus definitions, common and different features of biological virus. Classification of malicious code (viruses, adware, spyware, worms ,...) and its spreading code. HOAX. Generators viruses.
3. Malicious code and its dependence on the environment (eg OS, file format, processor architecture, compilers, ...)
4. Methods of infection. Infections files (COM, EXE, API, MBR, DBR, infection ...), art (overwriting viruses, connecting viruses, hollow viruses hidden point ...). Infection of memory, using suspension, swap viruses.
5. Basic defensive strategy of viruses. Scanning the memory trace, anti-debugging, armored viruses, retroviruses, defense against heuristic analysis, emulation and reversing disassembled, use undocumented functions.
6. Creation and generation of viruses. Code of the virus encoded by viruses (decryptor, nonlinear decoding W95/fono, W95/Mad2736) oligomorphic viruses, polymorphic viruses, metamorphic viruses. Generators viruses.
7. Basics of computer networks. Network Eavesdropping.Security Web site. Scanning ports.
8.Google Hacking. Buffer overflow - buffer overflows. Windows Security accounts.
9. Spam and antispam. Spam definitions and history. Tools for fighting spam. Anti-spam strategies and tools for Windows and Linux. Bayesian classifier and SpamAssassin. Mail client and filters.
10. Phishing. Phishing subcategories as spam. Right, phishing and spyware.False identity and false redirects identity. Phishing and Malware. Cracking. Protection Program. Anti - debug and anti - disasembler programs.
11. Hacking gathering, scanning and survey scanning programs, network services and research. Operating systems and attack them. Mac OS X, Windows and Linux.
12. Computer networks and attacks on them. Survey networks, autonomous systems, network services. Wireless and network attacks.Firewall.
13. Attacks on the code, runs on the web. Preventing the incident.implementation of security policies and procedures. Investigation procedures and computer investigations. Trace data and network control.
14. Investigation of the OS, Windows, Unix, Web attacks, hacker tools.Computer viruses, antivirus and Artificial Intelligence
Exercise in PC classrooms
- Basics of penetration testing
- Mapping of vulnerability of computer systems
- SQL injection
- Cross Site Scripting (XSS)
- Forgering Cross Site Request and Session Hijacking (CSFR)
- Denial of service (DoS)
- Remote shell command execution
- Password cracking (Brutal force and dictionary attack)
- Testing the vulnerability of WEP and WPA / WPA2
- Use Matasploit framework for penetration testing
- Computer viruses - the basic structure
- Computer viruses - Advanced Techniques
Conditions for subject completion
Occurrence in study plans
Occurrence in special blocks
Assessment of instruction