Skip to main content

CS406: Information Security

Page path
  • Home /
  • Courses /
  • Course Catalog /
  • Computer Science /
  • CS406: Information Security /
  • Unit 8: Malicious Software and Software Security
Back to course 'CS406: Information Security'
  • Unit 8: Malicious Software and Software Security

    In this unit, we will explore malicious software, also known as malware. We will also study common software security issues such as buffer overflow, used by several malware to exploit systems' vulnerability. At the end of the unit, we will learn how to use these malware and other security attacks to carry out information warfare.

    Completing this unit should take you approximately 8 hours.

    • Unit 8 Learning Outcomes Page
    • 8.1: Malicious Web

      • University of Washington: Giovanni Vigna's "From Badware to Malware: Taming the Malicious Web" Page

        Watch this video to learn about how malicious actors leverage legitimate websites for the delivery of attacks that target vulnerabilities in client-side software.

    • 8.2: Internet Security Issues

      • Talks at Google: "Vint Cerf" Page

        Watch this video to learn about security issues on the Internet, and what could have been done differently had we realized this was going to be the global information exchange infrastructure of the 21st century.

    • 8.3: Types of Internet Security Issues

      •  Carnegie Mellon University: "Denial of Service" URL

        Read this page. While you read, try to explain the modes of DoS attacks, such as consumption of scarce resources, configuration information alternation, and physical destruction. For DDoS attacks, describe the tools that are used for DDoS, why the DDoS attacks are possible, and the protocol vulnerabilities that are used in DDoS attacks.

      •  Bennett Todd's "Distributed Denial of Service Attacks" URL

        Read this page.

    • 8.4: Secure Coding

      •  Carnegie Mellon University: Robert Seacord's "Top Ten Secure Coding Practices" URL

        Read this page. After you read, describe the top 10 best practices for secure coding and describe the principles for secure coding (e.g., separation of duties, least privilege).

      •  Open Web Application Security Project: "Secure Coding Principles" URL

        Read this page.

    • 8.5: Electronic and Information Warfare

      •  University of Cambridge: Ross Anderson's "Electronic and Information Warfare" URL

        Read this chapter. After you read, describe the different attacks on communication systems and how one could use these attacks to carry out information warfare (in particular, based on the interaction between civil and military uses).

Navigation

Art History
Biology
Business Administration
Chemistry
Communication
Economics
English
History
Mathematics

Creative Commons License
© Saylor Academy 2010-2018 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See www.saylor.org/open/licensinginformation for detailed licensing information.

Saylor Academy and Saylor.org® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

Terms of Use | Privacy Policy