Techniques of infection propagation
Beatriz Otero; Eva Rodríguez; Jordi Salazar; Santiago Silvestre; Francesc Torres
Annotation

The study of computer security entails acquiring knowledge about and categorizing the most common infection propagation techniques, as well as understanding the exploitation of security vulnerabilities, both local and remote. It is essential to understand the main software exploitation mechanisms, such as stack and buffer overflows, as well as heap overflows. Additionally, software and hardware infection techniques should be investigated to be prepared for potential attacks. Finally, being aware of the main attacks resulting from social engineering is crucial, as these can compromise the security of computer systems.

Objectives

At the end of this module, the student should be able to:

Identify and categorize the most commonly used infection propagation techniques.

Understand the exploitation of security vulnerabilities that compromise computer systems, encompassing both local and remote exploits.

Understand the main mechanisms for exploiting software vulnerabilities, including stack/buffer overflow, as well as heap overflow.

Recognize common software and hardware infection techniques.

Identify the principal attacks derived from social engineering.

Keywords
Infection propagation, vulnerabilities exploitation, Software/Hardware infection, social engineering.
Date of Creation
01.04.2024
Language
English
License
Literature
  1. R. Zieni, L. Massari and M. C. Calzarossa, "Phishing or Not Phishing? A Survey on the Detection of Phishing Websites," in IEEE Access, vol. 11, pp. 18499-18519, 2023, doi: 10.1109/ACCESS.2023.3247135. Electronic ISSN: 2169-3536
  1. Anti-Phishing Working Group. APWG. Phishing activity trends reports. https://apwg.org/trendsreports/
  1. Anti-Phishing Working Group. APWG. Phishing Activity Trends Report 4th Quarter 2023. https://docs.apwg.org/reports/apwg_trends_report_q4_2023.pdf?_gl=1*2d3izn*_ga*MTQ0MTI4MDUxNy4xNzEwNDMwMzA4*_ga_55RF0RHXSR*MTcxMDQzMzIyMy4yLjEuMTcxMDQzMzY3NS4wLjAuMA.
  1. Making the world’s information safely accesible. Safe Browsing – Google Safe Browsing. https://safebrowsing.google.com/
  1. PhishTank. Join the fight against phishing. Collaborative anti-phishing platform with open API. https://www.phishtank.com/
  1. M. Mena Roa. "Hackeo en Twitter: Los famosos víctimas del hackeo masivo en Twitter," in Statista (julio 2020). https://es.statista.com/grafico/22294/numero-de-seguidores-de-las-cuentas-de-twitter-mas-populares-hackeadas/