distributed authentication
need to access different servers throughout the day
need to have different passwords for each service
hard to remember
centralised authentication
server gives user key to access other services
however, tickets can be captured and sent from attacker system (spoofing)
Kerberos
protection against replay attacks
maintain a replay cache on ticket granting server
if duplicated authentication request detected, error
kerberos limitation
malware
malicious software
stuxnet
worm spreads using vulnerability
downloads payload and affect temperature controller
cross platform malware
worm must be cross platform as unable to guarantee specific platform. if worm on wrong platform, cause errors and reveals itself
malware types
virus
mutated virus (metamorphic)
change instructions but still does the same thing
eg. a=1 to a=2-1 ….
encrypted virus (polymorphic)
decrypts itself to run
keys changes to prevent identification
encryption algorithm can change
virus anatomy
virus triggers
logic bomb
time bomb
worms
trojan
malware infection mediums
vulnerabilities caused by:
malware defence
malware detection
signs of malware infection
malware analysis process