- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
Chapter 8The Art of Anti Malicious Software.ppt
Virus Infection Schemes (Diagram) The Code Red Worm Released in July 2001, it infected about 300K computers within the first 24 hours of its release It exploited a buffer overflow in Microsoft’s IIS It arrived as a GET /default.ida request (with 224 N’s) This request starts the worm code execution Virus Defense Prevention: Block viruses from getting into a healthy system Install software patches in time Do not download software from untrusted Web sites Do not open “To-Be-Cautious” email attachments from unknown senders Do not open perilous email attachments Restoration: Disinfect infected systems Scan files with a virus scanner Keep a backup of system and user files Web Security Basic types of Web documents: Static documents: A Web document without executable codes Safe to download Dynamic documents: A Web document containing executable codes CGI executed on the server computer Download resulting document to client Active documents: Also contain executable codes, but run on the client computer Download entire document to client for execution AJAX Security Asynchronous JavaScript and XML (AJAX) AJAX achieves asynchronous interactions to make smooth surfing Examples: Google Maps Face the same security problems as traditional Web applications Cross-site scripting attack Silent calls and cookies Master-Slave-Reflector DDoS Attack Security of Web Documents Server-side: May be attacked by exploiting loopholes in dynamic documents and Web server programs Security measures: Update to newest version of Web server programs Manage rigorously CGI programs and their directories Only designated person can post CGI at Web server Client-side: May be attacked by exploiting loopholes in active documents and Web browser programs Security measures: Install browser patches Disable JavaScript of browser Disable Java applets of browser Cookies Web browser is stateless A new connection with a Web server for each URL request Different, unrelated TCP connections have to be establ
您可能关注的文档
- 8、风的形成.ppt
- 8个 ,每2个放一堆,能分几堆?.ppt
- 8的乘法口诀练习.ppt
- 9 Defining Problems and Generating Solutions.ppt
- 9. Code Scheduling for ILP-Processors.ppt
- 9. Computer Peripherals – Part I.ppt
- 9. L'efficienza e il controllo dei costi.ppt
- 9. Monopolistic Competition& Oligopoly.ppt
- 9. OOP & ADTs Introduction to Inheritance.ppt
- 9. SYSTEM INTEGRATION.ppt
- Chapter 8The Health Process and Self-Care of the Nurse.ppt
- Chapter 8The Uniqueness of Timeshare Resort Operations.ppt
- Chapter 9 SQLPLUS REPORTS.ppt
- Chapter 9 – Designing Classes.ppt
- Chapter 9 –Cooperative Strategy.ppt
- Chapter 9 - Judicial Review.ppt
- Chapter 9 Are We Free or Determined.ppt
- Chapter 9 Balancing Demand and Productive Capacity.ppt
- Chapter 9 Building Bigger Programs.ppt
- Chapter 9 Cinema in an International Frame.ppt
文档评论(0)