SlideShare a Scribd company logo
1 of 39
Download to read offline
By David Perry
 From companies that make education solutions
 From researchers that have noticed the
problem
 Because everyone knows users are the weakest
link
 Because you can’t patch stupid.
 But there is a better reason to focus on user
education…many better reasons
 What assets they are protecting?
 What threatens those assets?
 What measures can be taken against those
threats?
 How can they tell that they are compromised?
 How can they tell that they are protected?
 How long will any prescription be valid?
 In fact, where users are concerned…
 The following slides were written fifteen years
ago for a presentation at EICAR 2001, they
accompany my paper on virus misinformation
disinformation and myth
 The same is true today, maybe even more so, as
today’s, more complex world proves even
harder to describe
 Today’s users face more threats, more
dangeous ones, and have even less
understanding of the world around them
The Other Virus
 There is another virus that was not written in
visual basic, assembler or even C.
 This virus does not operate on any hardware or
software platform developed in this century.
 This virus has no limits to it’s infectious perfidy,
and it’s payloads are capable of anything!
This virus is…..
Is the imaginary virus worth
examining?
 Not just hoaxes, but three categories of error
 Misinformation
 (Getting it wrong, plain and simple)
 Disinformation
 (Lies, exaggeration and practical jokes)
 Myth
 (The oral tradition meets the silicon wave)
The Canon of Misinformation:
“Everyone Knows”
 Viruses destroy hardware.
 Viruses are written by:
 Antivirus companies.
 Thirteen year olds.
 Spies and agents provocateur.
 All system crashes, data loss and mysterious
behavior are caused by viruses.
 And. And. And.
The Canon of Disinformation
“I heard it through the grapevine”
 Urban Legends: Once a strictly oral tradition are
now made both global and nearly instantaneous
by the addition of internetworked personal
computers.
 Who creates virus hoaxes?
 Who hypes viruses to the press?
 How far do these memes reach?
The damage done by bad
semantics (jargon and
restricted use)
 The confusion of map and territory
 (damage equals virus, action equals virus)
 Associative confusion
 As biological viruses are associated with greater
danger (AIDS, Ebola) computer viruses in general take
on the cachet of that danger.
 Extensional relation (actions guided by
language)
The Canon of Myth
 Popular fiction, movies and television all
portray viruses with a decidedly different
twist.
Viruses always have animated GUI’s
Viruses Crash Alien Spacecraft!
 The malware of today is still sometimes a virus,
sometimes a worm, frequently a trojan horse
 But the meanings of these terms is still
generally misunderstood by the general public,
and still by at least one person in this hall
 So in interest of that person, we will stop and
do a basic taxonomy of malware
 'Malware' is an umbrella term used to refer to a
variety of forms of hostile or intrusive
software, including computer viruses, worms,
Trojan horses, ransomware, spyware, adware,
scareware, and other malicious programs. It
can take the form of executable code, scripts,
active content, and other software. Malware is
often disguised as, or embedded in, non-
malicious files. As of 2011 the majority of active
malware threats were worms or Trojans rather
than viruses. (Wikipedia)
 The term ‘malware’ was first coined in
July,1990 by Yisrael Radai—it means all
malicious or unwanted software.
 Although we already had the terms virus
Trojan and worm at the time (along with
others) the word Malware has come to include
all other forms.
 The most basic of taxonomy follows, along
with the sources of the names and what they
imply.
6/20/201
5
18Classification
 We are not emotionally
prepared to handle the
constant rate of
technological change
 New technologies
require new ways of
thinking
 A new tool can extend
our reach in many ways
 Sometimes, new
technologies have
negative effects mixed
in with their blessings
6/20/2015
Patterns and language and
perspective=taxonomy
6/20/2015 20
Classificati
on
6/20/2015 21
Classificati
on
6/20/2015 22
Classificati
on
 A Trojan is a program that hides under a false
pretense
 Or
 A Trojan is a non replicating malware
 Or
 A Trojan is a back door to the system
 Even Inside this field of study—the word has
three different meanings
6/20/2015 23
Classificati
on
 The expert; This particular piece of malware
is a password stealing trojan, delivered by a
downloader connected via a multiple web
redirect using iframe and (ad infinitum)
 End user hears: blah blah blah blah blah
 End user says: What does this mean? What is
the purpose of this malware?
 The expert hears: I am a dummy, ignore me.
6/20/2015 24
Classificati
on
6/20/2015
An example of teaching the basics...
6/20/2015 26
Classificati
on
 The original computer virus was not located on
a pc
 It was not on an apple
 It was not on a mini or mainframe
 It was not located on computer hardware or
software of any kind
6/20/201
5
27Classification
 It was in a work of fiction!
6/20/2015 28
Classificati
on
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
6/20/2015 29
Classificati
on
 Elk Cloner: The program with a personality It will get on all
 your disks
 It will infiltrate your chips
 Yes it's Cloner!
 It will stick to you like glue
 It will modify RAM too
 Send in the Cloner!
 Written by a 9th grader, named RICH SKRENTA
6/20/2015 30
Classificati
on
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
6/20/2015 31
Classificati
on
RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
6/20/2015 32
Classificati
on
 Sometimes getting too close to an object
obscures It’s place in the greater scheme…
6/20/2015 33
Classificati
on
 How does it get on to the victim’s
computer? (method of access)
 What unwanted activities does it perform
on the victim’s computer? (economic
purpose)
 How does it technically accomplish its
purpose? (method of accomplishment)
 How does it protect itself from being
detected, blocked or removed? (self-
defense)
6/20/2015 34
Classificati
on
 Is this already too
complicated for the end user
to understand?
 Can we fix that?
 Do we want to?
 To the end user, the computer is a single,
homogenized unit that is used to connect to the
internet, which is a homogonized place.
 To the expert, a computer is a vast galaxy of
hardware, firmware, operating system, drivers,
applications, browser, web apps, scripts BHO’s
and any variety of cloud based computing and
storage elements, a galaxy with as many as a
trillion distinct elements.
 Far too complex to describe to anyone in any
depth.
 The Advanced Persistent Threat is not some
new kind of malware
 It is an extended attack that might include all
manner of malware, other hacking skills and
possibly the infiltration of your network by
rogue insiders
 It is a term we take from the intelligence
community, and it names any attack that goes
on for a long time with varying techniques
 The Value of data and the possible
repercussions of insecurity
 The nature of internet bad actors and how you
might be a target for many reasons
 The nature of vulnerabilities, rather than the
“starring vulnerability” of marketing
 The difference between vulnerability, exploit,
and attack—and so many other things
 The basics of protection and the need for
continuous education
 And that, dear listener, is the beginning of
wisdom.
6/20/2015 39
Classificati
on

More Related Content

Viewers also liked

Ten Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsTen Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsCisco Services
 
Technologies that will disappear in next 5 years
Technologies that will disappear in next 5 yearsTechnologies that will disappear in next 5 years
Technologies that will disappear in next 5 yearsShrey Kapoor
 
Top 10 discoveries of the decade
Top 10 discoveries of the decadeTop 10 discoveries of the decade
Top 10 discoveries of the decadeHimanshu Gupta
 
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...David Nihill
 
Tweet Tweet Tweet Twitter
Tweet Tweet Tweet TwitterTweet Tweet Tweet Twitter
Tweet Tweet Tweet TwitterJimmy Jay
 
16 things that Panhandlers can teach us about Content Marketing
16 things that Panhandlers can teach us about Content Marketing16 things that Panhandlers can teach us about Content Marketing
16 things that Panhandlers can teach us about Content MarketingBrad Farris
 
Cubicle Ninjas' Code of Honor
Cubicle Ninjas' Code of HonorCubicle Ninjas' Code of Honor
Cubicle Ninjas' Code of HonorCubicle Ninjas
 
Hashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsHashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsModicum
 
The Do's and Don'ts of Presentations
The Do's and Don'ts of Presentations The Do's and Don'ts of Presentations
The Do's and Don'ts of Presentations Cubicle Ninjas
 
Using Color to Convey Data in Charts
Using Color to Convey Data in ChartsUsing Color to Convey Data in Charts
Using Color to Convey Data in ChartsZingChart
 
The no bullet bullet slide
The no bullet bullet slideThe no bullet bullet slide
The no bullet bullet slideGavin McMahon
 
Amazing First Slide Picture Templates
Amazing First Slide Picture Templates Amazing First Slide Picture Templates
Amazing First Slide Picture Templates Abhishek Shah
 
Weekly Inspirational Quotes by Fun Team Building
Weekly Inspirational Quotes by Fun Team BuildingWeekly Inspirational Quotes by Fun Team Building
Weekly Inspirational Quotes by Fun Team BuildingFun Team Building
 
Preparing to fail
Preparing to failPreparing to fail
Preparing to failaweyenberg
 
Effective Use of Icons & Images
Effective Use of Icons & ImagesEffective Use of Icons & Images
Effective Use of Icons & ImagesUIEpreviews
 

Viewers also liked (17)

Ten Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten YearsTen Technology Trends That Will Change the World in Ten Years
Ten Technology Trends That Will Change the World in Ten Years
 
Technologies that will disappear in next 5 years
Technologies that will disappear in next 5 yearsTechnologies that will disappear in next 5 years
Technologies that will disappear in next 5 years
 
Top 10 discoveries of the decade
Top 10 discoveries of the decadeTop 10 discoveries of the decade
Top 10 discoveries of the decade
 
Purpose of life
Purpose of lifePurpose of life
Purpose of life
 
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...
23 Tips From Comedians to Be Funnier in Your Next Presentation (via the book ...
 
Tweet Tweet Tweet Twitter
Tweet Tweet Tweet TwitterTweet Tweet Tweet Twitter
Tweet Tweet Tweet Twitter
 
16 things that Panhandlers can teach us about Content Marketing
16 things that Panhandlers can teach us about Content Marketing16 things that Panhandlers can teach us about Content Marketing
16 things that Panhandlers can teach us about Content Marketing
 
Cubicle Ninjas' Code of Honor
Cubicle Ninjas' Code of HonorCubicle Ninjas' Code of Honor
Cubicle Ninjas' Code of Honor
 
Email and tomorrow
Email and tomorrowEmail and tomorrow
Email and tomorrow
 
Hashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About HashtagsHashtag 101 - All You Need to Know About Hashtags
Hashtag 101 - All You Need to Know About Hashtags
 
The Do's and Don'ts of Presentations
The Do's and Don'ts of Presentations The Do's and Don'ts of Presentations
The Do's and Don'ts of Presentations
 
Using Color to Convey Data in Charts
Using Color to Convey Data in ChartsUsing Color to Convey Data in Charts
Using Color to Convey Data in Charts
 
The no bullet bullet slide
The no bullet bullet slideThe no bullet bullet slide
The no bullet bullet slide
 
Amazing First Slide Picture Templates
Amazing First Slide Picture Templates Amazing First Slide Picture Templates
Amazing First Slide Picture Templates
 
Weekly Inspirational Quotes by Fun Team Building
Weekly Inspirational Quotes by Fun Team BuildingWeekly Inspirational Quotes by Fun Team Building
Weekly Inspirational Quotes by Fun Team Building
 
Preparing to fail
Preparing to failPreparing to fail
Preparing to fail
 
Effective Use of Icons & Images
Effective Use of Icons & ImagesEffective Use of Icons & Images
Effective Use of Icons & Images
 

Similar to Healthcare forum perry-david m-everything you know is wrong!

Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The InternetHeidi Maestas
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Satria Ady Pradana
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious CodeSatria Ady Pradana
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Presentation24190
Presentation24190Presentation24190
Presentation24190KRT395
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Deb Birch
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_virusesLihtnes1
 
Computer viruses
Computer virusesComputer viruses
Computer virusesshopnil786
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Trend Micro
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesUltraUploader
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksDiane M. Metcalf
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYShah Rashedul LastHaque
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 

Similar to Healthcare forum perry-david m-everything you know is wrong! (20)

The malware (r)evolution
The malware (r)evolutionThe malware (r)evolution
The malware (r)evolution
 
Cyber Malware Programs And The Internet
Cyber Malware Programs And The InternetCyber Malware Programs And The Internet
Cyber Malware Programs And The Internet
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Presentation24190
Presentation24190Presentation24190
Presentation24190
 
virus
virusvirus
virus
 
Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...Problems With Battling Malware Have Been Discussed, Moving...
Problems With Battling Malware Have Been Discussed, Moving...
 
Protecting your computer_from_viruses
Protecting your computer_from_virusesProtecting your computer_from_viruses
Protecting your computer_from_viruses
 
MALWARE
MALWAREMALWARE
MALWARE
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009Ghosts In The Machine Today's Invisible Threats Oct 2009
Ghosts In The Machine Today's Invisible Threats Oct 2009
 
Anti virus
Anti virusAnti virus
Anti virus
 
A critical look at the regulation of computer viruses
A critical look at the regulation of computer virusesA critical look at the regulation of computer viruses
A critical look at the regulation of computer viruses
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
NEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGYNEXT GENERATION SITE BUILDING TECHNOLOGY
NEXT GENERATION SITE BUILDING TECHNOLOGY
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 

More from ISSA LA

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenbergISSA LA
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.ISSA LA
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604ISSA LA
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defenseISSA LA
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laISSA LA
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertISSA LA
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529ISSA LA
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015ISSA LA
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumISSA LA
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604ISSA LA
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panelISSA LA
 
Irari rules
Irari rulesIrari rules
Irari rulesISSA LA
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation ISSA LA
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-topISSA LA
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezISSA LA
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarISSA LA
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideISSA LA
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015ISSA LA
 

More from ISSA LA (20)

Microsoft power point closing presentation-greenberg
Microsoft power point   closing presentation-greenbergMicrosoft power point   closing presentation-greenberg
Microsoft power point closing presentation-greenberg
 
Its time to grow up by Eric C.
Its time to grow up by Eric C.Its time to grow up by Eric C.
Its time to grow up by Eric C.
 
Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604Turner.issa la.mobile vulns.150604
Turner.issa la.mobile vulns.150604
 
Technical track kevin cardwell-10-00 am-solid-defense
Technical track   kevin cardwell-10-00 am-solid-defenseTechnical track   kevin cardwell-10-00 am-solid-defense
Technical track kevin cardwell-10-00 am-solid-defense
 
The savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_laThe savvy security leader final dg ppt issa_la
The savvy security leader final dg ppt issa_la
 
Technical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvertTechnical track chris calvert-1 30 pm-issa conference-calvert
Technical track chris calvert-1 30 pm-issa conference-calvert
 
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
Security mgt track turner-aaron-11am-.issa-la.mobile vulns.150529
 
Malcolm issa preso june 2015
Malcolm issa preso june 2015Malcolm issa preso june 2015
Malcolm issa preso june 2015
 
La issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranumLa issa-2015-cyberwar-ranum
La issa-2015-cyberwar-ranum
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
Issala exec-forum-opening-150604
Issala exec-forum-opening-150604Issala exec-forum-opening-150604
Issala exec-forum-opening-150604
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
Issa healthcare panel
Issa healthcare panelIssa healthcare panel
Issa healthcare panel
 
Irari rules
Irari rulesIrari rules
Irari rules
 
Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation Healthcare forum yelorda megan himss presentation
Healthcare forum yelorda megan himss presentation
 
Fssf breach-incident-table-top
Fssf breach-incident-table-topFssf breach-incident-table-top
Fssf breach-incident-table-top
 
Healthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prezHealthcare forum law enforcement panel prez
Healthcare forum law enforcement panel prez
 
Emerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovarEmerging tech track kovar-david-forensics-kovar
Emerging tech track kovar-david-forensics-kovar
 
Digital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collideDigital forensics track schroader-rob when forensics collide
Digital forensics track schroader-rob when forensics collide
 
Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015Cloud flare issa_annual_summit_june_5_2015
Cloud flare issa_annual_summit_june_5_2015
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 

Healthcare forum perry-david m-everything you know is wrong!

  • 2.
  • 3.  From companies that make education solutions  From researchers that have noticed the problem  Because everyone knows users are the weakest link  Because you can’t patch stupid.  But there is a better reason to focus on user education…many better reasons
  • 4.  What assets they are protecting?  What threatens those assets?  What measures can be taken against those threats?  How can they tell that they are compromised?  How can they tell that they are protected?  How long will any prescription be valid?  In fact, where users are concerned…
  • 5.  The following slides were written fifteen years ago for a presentation at EICAR 2001, they accompany my paper on virus misinformation disinformation and myth  The same is true today, maybe even more so, as today’s, more complex world proves even harder to describe  Today’s users face more threats, more dangeous ones, and have even less understanding of the world around them
  • 6. The Other Virus  There is another virus that was not written in visual basic, assembler or even C.  This virus does not operate on any hardware or software platform developed in this century.  This virus has no limits to it’s infectious perfidy, and it’s payloads are capable of anything!
  • 8. Is the imaginary virus worth examining?  Not just hoaxes, but three categories of error  Misinformation  (Getting it wrong, plain and simple)  Disinformation  (Lies, exaggeration and practical jokes)  Myth  (The oral tradition meets the silicon wave)
  • 9. The Canon of Misinformation: “Everyone Knows”  Viruses destroy hardware.  Viruses are written by:  Antivirus companies.  Thirteen year olds.  Spies and agents provocateur.  All system crashes, data loss and mysterious behavior are caused by viruses.  And. And. And.
  • 10. The Canon of Disinformation “I heard it through the grapevine”  Urban Legends: Once a strictly oral tradition are now made both global and nearly instantaneous by the addition of internetworked personal computers.  Who creates virus hoaxes?  Who hypes viruses to the press?  How far do these memes reach?
  • 11. The damage done by bad semantics (jargon and restricted use)  The confusion of map and territory  (damage equals virus, action equals virus)  Associative confusion  As biological viruses are associated with greater danger (AIDS, Ebola) computer viruses in general take on the cachet of that danger.  Extensional relation (actions guided by language)
  • 12. The Canon of Myth  Popular fiction, movies and television all portray viruses with a decidedly different twist.
  • 13. Viruses always have animated GUI’s
  • 14. Viruses Crash Alien Spacecraft!
  • 15.  The malware of today is still sometimes a virus, sometimes a worm, frequently a trojan horse  But the meanings of these terms is still generally misunderstood by the general public, and still by at least one person in this hall  So in interest of that person, we will stop and do a basic taxonomy of malware
  • 16.  'Malware' is an umbrella term used to refer to a variety of forms of hostile or intrusive software, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, scareware, and other malicious programs. It can take the form of executable code, scripts, active content, and other software. Malware is often disguised as, or embedded in, non- malicious files. As of 2011 the majority of active malware threats were worms or Trojans rather than viruses. (Wikipedia)
  • 17.  The term ‘malware’ was first coined in July,1990 by Yisrael Radai—it means all malicious or unwanted software.  Although we already had the terms virus Trojan and worm at the time (along with others) the word Malware has come to include all other forms.  The most basic of taxonomy follows, along with the sources of the names and what they imply.
  • 18. 6/20/201 5 18Classification  We are not emotionally prepared to handle the constant rate of technological change  New technologies require new ways of thinking  A new tool can extend our reach in many ways  Sometimes, new technologies have negative effects mixed in with their blessings
  • 19. 6/20/2015 Patterns and language and perspective=taxonomy
  • 22. 6/20/2015 22 Classificati on  A Trojan is a program that hides under a false pretense  Or  A Trojan is a non replicating malware  Or  A Trojan is a back door to the system  Even Inside this field of study—the word has three different meanings
  • 23. 6/20/2015 23 Classificati on  The expert; This particular piece of malware is a password stealing trojan, delivered by a downloader connected via a multiple web redirect using iframe and (ad infinitum)  End user hears: blah blah blah blah blah  End user says: What does this mean? What is the purpose of this malware?  The expert hears: I am a dummy, ignore me.
  • 25. 6/20/2015 An example of teaching the basics...
  • 26. 6/20/2015 26 Classificati on  The original computer virus was not located on a pc  It was not on an apple  It was not on a mini or mainframe  It was not located on computer hardware or software of any kind
  • 27. 6/20/201 5 27Classification  It was in a work of fiction!
  • 28. 6/20/2015 28 Classificati on RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
  • 29. 6/20/2015 29 Classificati on  Elk Cloner: The program with a personality It will get on all  your disks  It will infiltrate your chips  Yes it's Cloner!  It will stick to you like glue  It will modify RAM too  Send in the Cloner!  Written by a 9th grader, named RICH SKRENTA
  • 30. 6/20/2015 30 Classificati on RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
  • 31. 6/20/2015 31 Classificati on RUNNING HEADER, 14 PT., ALL CAPS, Line Spacing=1 line
  • 32. 6/20/2015 32 Classificati on  Sometimes getting too close to an object obscures It’s place in the greater scheme…
  • 33. 6/20/2015 33 Classificati on  How does it get on to the victim’s computer? (method of access)  What unwanted activities does it perform on the victim’s computer? (economic purpose)  How does it technically accomplish its purpose? (method of accomplishment)  How does it protect itself from being detected, blocked or removed? (self- defense)
  • 34. 6/20/2015 34 Classificati on  Is this already too complicated for the end user to understand?  Can we fix that?  Do we want to?
  • 35.  To the end user, the computer is a single, homogenized unit that is used to connect to the internet, which is a homogonized place.  To the expert, a computer is a vast galaxy of hardware, firmware, operating system, drivers, applications, browser, web apps, scripts BHO’s and any variety of cloud based computing and storage elements, a galaxy with as many as a trillion distinct elements.  Far too complex to describe to anyone in any depth.
  • 36.  The Advanced Persistent Threat is not some new kind of malware  It is an extended attack that might include all manner of malware, other hacking skills and possibly the infiltration of your network by rogue insiders  It is a term we take from the intelligence community, and it names any attack that goes on for a long time with varying techniques
  • 37.  The Value of data and the possible repercussions of insecurity  The nature of internet bad actors and how you might be a target for many reasons  The nature of vulnerabilities, rather than the “starring vulnerability” of marketing  The difference between vulnerability, exploit, and attack—and so many other things  The basics of protection and the need for continuous education
  • 38.  And that, dear listener, is the beginning of wisdom.