- •Ssd2: Introduction to Computer Systems contents
- •Prerequisites
- •Course Textbook
- •Hardware/Software Requirements
- •The purpose of ssd2 is for students to
- •Students successfully completing ssd2 will be able to
- •1.1 Overview of Computer Systems
- •1.1.1 Components of a Computer System
- •Hardware System
- •Software System—Operating System Software and Application Software
- •Network System
- •1.2 Evolution of Computer Systems
- •1.2.1 Brief History
- •1200S—Manual Calculating Devices
- •1600S—Mechanical Calculators
- •1800S—Punched Cards
- •1940S—Vacuum Tubes
- •1950S—Transistors
- •1960S—Integrated Circuits
- •1970S to Present—Microprocessor
- •Pace of Advancement
- •1.2.2 Applications of Computer Systems
- •In Education Multimedia-Facilitated Learning
- •Simulation-Based Education
- •Intelligent Machine-Based Training
- •Interactive Learning
- •In Business Supply Chain Management
- •Project Management
- •Customer Relationship Management
- •Sales and Marketing Using Electronic Commerce
- •Manufacturing Research
- •In Entertainment Movies
- •Video Games
- •1.3 Data Representation in a Computer System
- •1.3.1 Bits and Bytes
- •Data Representation Using Binary Digits
- •Increasing Need for Bytes
- •1.3.2 Number Systems
- •Decimal
- •Hexadecimal
- •Learning Exercise
- •2.1 Processor and Memory
- •2.1.1 Processor Basics
- •Processor
- •Instruction Execution with the cpu
- •Performance: Factors and Measures
- •Types of Processors
- •2.1.2 Types of Memory
- •Cmos Memory
- •Summary
- •2.1.3 Lab: Benchmarking (Optional)
- •2.2 Peripherals
- •2.2.1 Connecting Peripherals
- •Expansion Slots and Cards
- •Usb and FireWire
- •Comparing Different Ports
- •2.2.2 Buses
- •2.2.3 Input/Output Devices
- •Input Devices
- •Cameras
- •Digital Camcorders
- •Scanners
- •Output Devices: Monitors and Projectors
- •Crt Monitors
- •Lcd Monitors
- •Projectors
- •Output Devices: Printers
- •Ink Printers
- •Dye-Sublimation Printers
- •Laser Printers
- •Comparing Printers
- •2.3 Storage Devices
- •2.3.1 Disk Controller Interfaces
- •Ide Interface
- •Eide Master/Slave
- •2.3.2 Mass Storage
- •How Mass Storage Devices Differ from ram
- •Disk Drive Reliability
- •Optical Media: cDs versus dvDs
- •Magnetic Media
- •Optical versus Magnetic
- •Solid State
- •Comparing Storages
- •2.4 Putting Together the Hardware Components
- •2.4.1 How Components Work Together
- •2.4.2 Lab: Researching a Computer System
- •2.4.3 Lab: Online Configuration
- •2.5 Improving Computer Performance
- •2.5.1 Moore's Law
- •2.5.2 Bottlenecks
- •Bottlenecks—Slowing a Process
- •Typical Bottlenecks
- •Eliminating Bottlenecks
- •2.5.3 Throughput and Latency
- •Unit 3. Operating System Software
- •3.1 Structure
- •3.1.1 Layers of Software
- •Layers and Process Management
- •Encapsulation and Abstraction
- •Layers of Software
- •3.1.2 The bios: Life at the Bottom
- •The Role of the bios
- •Changing bios Settings
- •3.1.3 Process Control
- •3.1.4 Lab: The Task Manager
- •3.2 Device Management and Configuration
- •3.2.1 Interrupt Handling
- •Interrupts
- •Interrupt Priority and Nested Interrupts
- •Traps and Faults
- •3.2.2 Hardware Attributes
- •Installing Drivers
- •Changing a Driver's Configuration
- •3.2.3 Configuration
- •3.2.4 Lab: Device Management
- •3.3 Resource Sharing
- •3.3.1 Virtual Memory
- •Managing Memory
- •Relocation
- •Virtual Memory
- •3.3.2 File and Printer Sharing
- •Printers
- •3.4 File Systems
- •3.4.1 File Organization
- •Folders
- •Shortcuts
- •File Names and Types
- •3.4.2 File Allocation Table and nt File System
- •Clusters and File Allocation Tables
- •Nt File System
- •Unit 4. Application Software
- •4.1 Software Basics
- •4.2 Using Software Systems
- •4.2.1 Lab: dos Commands
- •4.2.2 Lab: Macros
- •4.2.3 Lab: Embedding Application Objects
- •4.3 Batch Script Files
- •4.3.1 Advanced Command-Line Functions
- •Dos Command Syntax
- •Review of File System Commands
- •Wildcard Characters
- •Redirection and Piping
- •4.3.2 Batch File Commands
- •Batch Files
- •Commands
- •4.3.3 Lab: Creating a Batch File
- •Example of a Batch File
- •Example of a Batch File with Arguments
- •4.4 Databases
- •4.4.1 Lab: Searching the Library of Congress
- •4.5 Software Engineering
- •4.5.1 Issues in Large-Scale Software Development
- •The Software Development Process
- •Define or Redefine the Problem
- •Plan a Solution to the Problem
- •Code the Solution
- •Evaluate and Test Everything
- •4.5.2 Open Source Model
- •Free Software
- •4.5.3 Tools for Software Creation and Management
- •Editors
- •Compilers
- •Debuggers
- •Integrated Development Environments (idEs)
- •Unit 5. Network Systems
- •5.1 Internet Basics
- •5.1.1 Mime Types
- •5.1.2 Internet Languages
- •JavaScript
- •5.2 Local and Wide Area Networks
- •5.3 Communication Strategies
- •5.3.1 Client-Server Framework
- •5.3.2 Peer-to-Peer Connectivity
- •5.4 Data Transfer Technologies
- •5.5 Internet Architecture
- •5.5.1 Routers and tcp/ip
- •Internet Protocol
- •Routers
- •Transmission Control Protocol
- •5.5.2 Domain Name Service
- •Domain Name Service
- •5.5.3 Connectivity
- •Conventional Analog Phone Lines
- •Isdn: Integrated Services Digital Network
- •Cable Modem
- •XDsl: Digital Subscriber Line
- •Dedicated High Speed Lines
- •5.5.4 Internet Service Providers
- •Unit 6. Computer Security
- •6.1 Security Threats
- •6.1.1 Intruders: Who, Why, and How?
- •6.1.2 Identity Theft and Privacy Violation
- •Password Cracking
- •Packet sniffing
- •Social Engineering/Fraud
- •Spoofing
- •Port Scanning
- •6.1.3 Malicious Software
- •Trojan Horse
- •Prevention
- •Detection
- •Counter Measures
- •6.1.4 Denial of Service
- •Network Connectivity
- •Network Bandwidth
- •Other Resource Consumption Attacks
- •Distributed Denial of Service Attack
- •Prevention
- •6.2 Security Technologies
- •6.2.1 Encryption
- •Substitution Cipher
- •Transmitting the Key
- •Private Key Encryption Scheme
- •Public Key Encryption Scheme
- •Hybrid Encryption Schemes
- •6.2.2 Applications of Encryption
- •Hard Drives
- •Dvd Movies
- •Cellular Phones
- •6.2.3 Authentication
- •Strong Passwords
- •Smart Cards
- •Biometrics
- •Digital Signatures
- •Digital Certificates and Certificate Authorities
- •Ssl Protocol
- •6.3 Prevention, Detection, and Recovery
- •6.3.1 Firewall
- •Application Gateway
- •Packet Filter
- •Application Gateway versus Packet Filter
- •Intruder Attacks Prevented by Firewall
- •Setting up a Firewall
- •6.3.2 Intrusion Detection Tools
- •Intrusion Detection Systems
- •Network Monitoring Tools
- •Anti-Virus Software
- •6.3.3 Data Recovery
- •6.3.4 Summary of Security Tips
Trojan Horse
A Trojan horse is a program that appears to be performing one task while executing a malicious task in the background. It may reach your computer as an email attachment, usually as amusing or seemingly useful software to entice you to open it. Once you open the attachment, the Trojan horse program can search for your user information, steal your login names, and copy your passwords. Some Trojan horse programs can delete, modify, or transmit files on your computer. And, some Trojan horse programs may contain viruses, worms, or other Trojan horse programs. Trojan horse programs can use your account privileges to install other programs such as programs that provide unauthorized network access. Or, they can use your account to attack other systems and implicate your site as the source of an attack.
In addition, these Trojan horse programs can further exploit vulnerabilities in your system to increase the level of access beyond that of the user running the Trojan horse, such as administrative access. Once the intruder obtains administrative access, the intruder can do anything that an administrator can such as changing login and password information on other computers, and installing software applications. When an intruder gains administrative access to your systems, it is very difficult to trust the machine again without reinstalling the system software.
Despite the destructive power of Trojan horse programs, these programs cannot execute unless they are run on the target system. An intruder may trick the user to run the program. By understanding the various methods the intruder may use to manipulate users to execute Trojan horse programs on their systems, you can better identify a Trojan horse attack tactic and avoid being a victim.
An intruder can entice a user to run a Trojan horse program by forging an email as a Microsoft representative instructing the user to open an attachment to perform procedures that would patch a security weakness. The user would then open the attachment, which is actually a Trojan horse program. An intruder may also use social engineering ploys such as calling a system administrator and posing as a legitimate system user who cannot launch a specific software application. The intruder would then manipulate the system administrator to open a Trojan horse program.
Intruders can use compromised software download sites and replace legitimate versions of software with Trojan horse versions. An intruder can trick the users by redirecting them to a website to download a Trojan horse program. In addition, a Trojan horse program may be placed on a website in the form of Java, JavaScript, or ActiveX component. Note that Java, JavaScript, and ActiveX are also known as mobile codes. These programs are executed by your Web browser once you access the site. To avoid Trojan horse attacks via malicious websites, you can disable Java, JavaScript, and ActiveX in your Web browser. However, disabling these features may hamper your viewing of certain websites. A good practice is to disable Java, Java Script, and ActiveX and only enable them when necessary.
You can learn more about ActiveX security from the CERT website.
More information regarding the risks posed by malicious code in web links can be found on the CERT website.
Worm
A worm is malicious software that can execute itself on a vulnerable remote machine. Compared to a viruses, which infect files and spread through the transfer of infected files and email messages, worms can penetrate computer systems more easily because they do not need a user to execute them. Worms can perform trigger events that vary from display of irritating messages to destruction of data.
Most worms travel within email messages and TCP/IP packets, replicating from one computer to another. A worm can arrive as a mass-mailing worm that sends itself to every address in the email address book of an infected computer. To cover its tracks, a mass-mailing worm can set the "From:" line of the message to be a randomly selected address from the email address book.
Worm sample: 911 Worm
This worm is also known as Chode, Worm.Firkin, and other names. It searches through a range of IP addresses of known ISPs to find an accessible computer that has a non-password-protected shared drive. It uses the shared drive to copy its files onto the other computers. Once the infected computer starts Windows, a .vbs script is launched. On the 19th of the month, this script deletes files from the following directories:
C:\windows C:\windows\system C:\windows\command C:\ Then, it displays a message indicating the machine has been infected.
You can learn more about the 911 Worm from Symantec's website.
