Erinevus lehekülje "Malware:ITX8042:2014" redaktsioonide vahel

Allikas: Kursused
Mine navigeerimisribale Mine otsikasti
 
(ei näidata sama kasutaja 16 vahepealset redaktsiooni)
1. rida: 1. rida:
 
= Welcome =
 
= Welcome =
  
== About ==
+
===Sentences (need do carried out before 30 th November 2014) ===
  
====This is page for Malware course 2014 Fall ====
+
If you were late les than 3 times Choose one of them :
 +
If you were late more than 2 times you should choose 2 tasks:
  
  
1-8 week  Monday 16:00-17:30  ussualy in room  A1
+
1) Write an essay (6+ pages 12 font size Times New Roman) :
  
Labtime: Wednesday  20:00-21:30 
+
1.1 Forget what you have ever learned about computers and imagine yourself being a person who just bought one, can barely use web browser and has heard from friend about bad thing called "computer virus" that you should protect yourself against.  Try to educate yourself about the "computer virus" using only non-technical mainstream newspapers, believing literally everything that is written there.
  
 +
Describe what your conclusion about nature, sources and motivation of computer viruses would be and how you think you could protect yourself.  Don’t be afraid to include most ridiculous claims (apparent to you as computer literate person), in fact prefer them and provide links to sources.
  
 +
 +
1.2  “Attack Vectors”  Describe top 5 infection vectors. Provide sources and references. Include  examples
  
====Kill meand if you not presented your lab work for this time  you are automaticly Faild cource ! ====
 
  
Between Due and Kill you will be penalized !
+
2) Research work on Exploit kits  -  What are available,  where to get them ,  prices , how they function  Prices should be from original source  - as with lab 1  give links and screenshots. Describe functionality at least 2 of EK-s  that you "can acquire"
  
 +
3) Choose witch [https://drive.google.com/file/d/0BwLcblFEXx61SEw1cjNWQ1pYMVU/view?usp=sharing script] you like an give your  written argumented opinion why you liked this solution. IF you think that you are author of one those scripts this choice is not for you (we know writers :))
 +
 +
== [https://docs.google.com/spreadsheet/embeddedform?formkey=dGFfVG56MVJRR2dpdmFpWVBxS0ZIUHc6MA Final QUIZ will be open until 23.10.2014 21:00] ==
 +
 +
=== [https://docs.google.com/spreadsheets/d/1VtPplkugp78sblq9ay1STtf-1lhFHEvV5hiX5XEA9ag/edit?usp=sharing  Preliminary results ] ===
  
 
== LABS/Homework ==
 
== LABS/Homework ==
21. rida: 29. rida:
  
 
=== 2014.09.03 [[Malware:ITX8042:2014:LAB1 | Lab 1  Due date 12 sept. 2014  Kill date 22 Sept]] ===
 
=== 2014.09.03 [[Malware:ITX8042:2014:LAB1 | Lab 1  Due date 12 sept. 2014  Kill date 22 Sept]] ===
=== 2014.10.03 [[Malware:ITX8042:2014:LAB2 | Lab 2  Due date 23 sept. 2014  Kill date 3 oct ]] ===
+
=== 2014.09.10 [[Malware:ITX8042:2014:LAB2 | Lab 2  Due date 23 sept. 2014  Kill date 3 oct ]] ===
 +
=== [https://docs.google.com/presentation/d/1zeqQVMywsZxsK2h6mSokxW7Da4UkGERbZ1uznsLLDGg/edit?usp=sharing 2014.17.03 Short  presntation + Possibility to ask questions.Introduction to new lab will be presented in next week] ===
 +
===  [[ Malware:ITX8042:2014:LAB3 | 2014.09.24 Lab 3  Due date 15 oct  2014  Kill date 22 oct  ]]  ===
 +
=== 2014.10.01 [[Malware:ITX8042:2014:LAB4 | Lab 4    Due date 17 oct  2014  Kill date 27 oct  ]] ===
 +
=== 2014.10.09 [[Malware:ITX8042:2014:LAB5 | Lab 5    Due date 22 oct  2014  Kill date 27 oct  ]] ===
 +
=== 2014.10.15 [https://docs.google.com/presentation/d/1QbWVo4q2aKRAZsb8iR7t9aP8oIzZ8GKDYuolaKHtoGs/edit?usp=sharing  Lab time 6  ] ===
  
 
== LECTURES ==
 
== LECTURES ==
  
=== 2013.09.01 [https://docs.google.com/presentation/d/1JGfGvThlvWyZgd-dOwlN3DvdsDqtck2ucD2Sg5wDC6g/edit?usp=sharing First lecture/ Introduction] ===
+
=== 2014.09.01 [https://docs.google.com/presentation/d/1JGfGvThlvWyZgd-dOwlN3DvdsDqtck2ucD2Sg5wDC6g/edit?usp=sharing First lecture/ Introduction] ===
 +
 
 +
=== 2014.09.08 [https://docs.google.com/presentation/d/18cnv9uWq1w6-7zBomsxQZGgubrQEFDlNea-wgg9nr2g/edit?usp=sharing Second Lecture] ===
 +
 
 +
 
 +
=== 2014.09.15 [https://docs.google.com/presentation/d/1bzXayPwOemjpU6RVdKdbiiuHCv7kZhxFFvtfYZfdlXU/edit?usp=sharing  State of Malware underground  2011/Third lecture  ] ===
 +
 
 +
 
 +
 
 +
=== 2014.09.22 [https://docs.google.com/presentation/d/1heskOjlsSeaKKXFRFgdVtXWBrfr69sjXRScf8pwSrPo/edit?usp=sharing  Banking trojans , Forth lecture] ===
 +
 
 +
 
 +
 
 +
=== 2013.09.29 [https://docs.google.com/presentation/d/14mzzrXGke_RPlj9cl7XLLH5-oUJ7K0g-xbQfoA7bGlo/edit?usp=sharing Elron ,FastFlux,Chuck Norries/Fift Lecture ] ===
 +
 
  
=== 2013.09.08 [https://docs.google.com/presentation/d/18cnv9uWq1w6-7zBomsxQZGgubrQEFDlNea-wgg9nr2g/edit?usp=sharing Second Lecture] ===
+
=== 2013.10.06 [https://drive.google.com/file/d/0BwLcblFEXx61RGhoLXpZRU1KTEU/view?usp=sharing Tarmo - Malware intcident Handling] ===
  
 +
=== 2013.10.13 [https://docs.google.com/presentation/d/1Vjlo4wNmm1fNBAOfbBtmbBbM3xA8T7bZj7XqEBkGgeY/edit?usp=sharing  7-th lecture  ] ===
  
=== 2013.09.15 [https://docs.google.com/presentation/d/1bzXayPwOemjpU6RVdKdbiiuHCv7kZhxFFvtfYZfdlXU/edit?usp=sharing State of Malware underground  2011/Third lecture  ] ===
+
=== 2013.10.20 [https://docs.google.com/presentation/d/1yhMF7fR_3nat_OXyPAC_XZa-Yrfm4Upbt7ZjS0KcHiU/edit#slide=id.g4e2c18fe5_05 8-th lecture  ] ===

Viimane redaktsioon: 19. jaanuar 2015, kell 15:52

Welcome

Sentences (need do carried out before 30 th November 2014)

If you were late les than 3 times Choose one of them : If you were late more than 2 times you should choose 2 tasks:


1) Write an essay (6+ pages 12 font size Times New Roman) :

1.1 Forget what you have ever learned about computers and imagine yourself being a person who just bought one, can barely use web browser and has heard from friend about bad thing called "computer virus" that you should protect yourself against. Try to educate yourself about the "computer virus" using only non-technical mainstream newspapers, believing literally everything that is written there.

Describe what your conclusion about nature, sources and motivation of computer viruses would be and how you think you could protect yourself. Don’t be afraid to include most ridiculous claims (apparent to you as computer literate person), in fact prefer them and provide links to sources.


1.2 “Attack Vectors” Describe top 5 infection vectors. Provide sources and references. Include examples


2) Research work on Exploit kits - What are available, where to get them , prices , how they function Prices should be from original source - as with lab 1 give links and screenshots. Describe functionality at least 2 of EK-s that you "can acquire"

3) Choose witch script you like an give your written argumented opinion why you liked this solution. IF you think that you are author of one those scripts this choice is not for you (we know writers :))

Final QUIZ will be open until 23.10.2014 21:00

Preliminary results

LABS/Homework

2014.09.03 Lab 1 Due date 12 sept. 2014 Kill date 22 Sept

2014.09.10 Lab 2 Due date 23 sept. 2014 Kill date 3 oct

2014.17.03 Short presntation + Possibility to ask questions.Introduction to new lab will be presented in next week

2014.09.24 Lab 3 Due date 15 oct 2014 Kill date 22 oct

2014.10.01 Lab 4 Due date 17 oct 2014 Kill date 27 oct

2014.10.09 Lab 5 Due date 22 oct 2014 Kill date 27 oct

2014.10.15 Lab time 6

LECTURES

2014.09.01 First lecture/ Introduction

2014.09.08 Second Lecture

2014.09.15 State of Malware underground 2011/Third lecture

2014.09.22 Banking trojans , Forth lecture

2013.09.29 Elron ,FastFlux,Chuck Norries/Fift Lecture

2013.10.06 Tarmo - Malware intcident Handling

2013.10.13 7-th lecture

2013.10.20 8-th lecture