Erinevus lehekülje "Malware:ITX8042:2014" redaktsioonide vahel
(ei näidata sama kasutaja 14 vahepealset redaktsiooni) | |||
1. rida: | 1. rida: | ||
= Welcome = | = Welcome = | ||
− | == | + | ===Sentences (need do carried out before 30 th November 2014) === |
− | + | If you were late les than 3 times Choose one of them : | |
+ | If you were late more than 2 times you should choose 2 tasks: | ||
− | 1 | + | 1) Write an essay (6+ pages 12 font size Times New Roman) : |
− | + | 1.1 Forget what you have ever learned about computers and imagine yourself being a person who just bought one, can barely use web browser and has heard from friend about bad thing called "computer virus" that you should protect yourself against. Try to educate yourself about the "computer virus" using only non-technical mainstream newspapers, believing literally everything that is written there. | |
+ | Describe what your conclusion about nature, sources and motivation of computer viruses would be and how you think you could protect yourself. Don’t be afraid to include most ridiculous claims (apparent to you as computer literate person), in fact prefer them and provide links to sources. | ||
+ | |||
+ | 1.2 “Attack Vectors” Describe top 5 infection vectors. Provide sources and references. Include examples | ||
− | |||
− | + | 2) Research work on Exploit kits - What are available, where to get them , prices , how they function Prices should be from original source - as with lab 1 give links and screenshots. Describe functionality at least 2 of EK-s that you "can acquire" | |
+ | 3) Choose witch [https://drive.google.com/file/d/0BwLcblFEXx61SEw1cjNWQ1pYMVU/view?usp=sharing script] you like an give your written argumented opinion why you liked this solution. IF you think that you are author of one those scripts this choice is not for you (we know writers :)) | ||
+ | |||
+ | == [https://docs.google.com/spreadsheet/embeddedform?formkey=dGFfVG56MVJRR2dpdmFpWVBxS0ZIUHc6MA Final QUIZ will be open until 23.10.2014 21:00] == | ||
+ | |||
+ | === [https://docs.google.com/spreadsheets/d/1VtPplkugp78sblq9ay1STtf-1lhFHEvV5hiX5XEA9ag/edit?usp=sharing Preliminary results ] === | ||
== LABS/Homework == | == LABS/Homework == | ||
21. rida: | 29. rida: | ||
=== 2014.09.03 [[Malware:ITX8042:2014:LAB1 | Lab 1 Due date 12 sept. 2014 Kill date 22 Sept]] === | === 2014.09.03 [[Malware:ITX8042:2014:LAB1 | Lab 1 Due date 12 sept. 2014 Kill date 22 Sept]] === | ||
− | === 2014.10 | + | === 2014.09.10 [[Malware:ITX8042:2014:LAB2 | Lab 2 Due date 23 sept. 2014 Kill date 3 oct ]] === |
− | === 2014.17.03 Short presntation + Possibility to ask questions.Introduction to new lab will be presented in next week === | + | === [https://docs.google.com/presentation/d/1zeqQVMywsZxsK2h6mSokxW7Da4UkGERbZ1uznsLLDGg/edit?usp=sharing 2014.17.03 Short presntation + Possibility to ask questions.Introduction to new lab will be presented in next week] === |
− | === [[ Malware:ITX8042:2014:LAB3 | 2014.24 | + | === [[ Malware:ITX8042:2014:LAB3 | 2014.09.24 Lab 3 Due date 15 oct 2014 Kill date 22 oct ]] === |
+ | === 2014.10.01 [[Malware:ITX8042:2014:LAB4 | Lab 4 Due date 17 oct 2014 Kill date 27 oct ]] === | ||
+ | === 2014.10.09 [[Malware:ITX8042:2014:LAB5 | Lab 5 Due date 22 oct 2014 Kill date 27 oct ]] === | ||
+ | === 2014.10.15 [https://docs.google.com/presentation/d/1QbWVo4q2aKRAZsb8iR7t9aP8oIzZ8GKDYuolaKHtoGs/edit?usp=sharing Lab time 6 ] === | ||
== LECTURES == | == LECTURES == | ||
− | === | + | === 2014.09.01 [https://docs.google.com/presentation/d/1JGfGvThlvWyZgd-dOwlN3DvdsDqtck2ucD2Sg5wDC6g/edit?usp=sharing First lecture/ Introduction] === |
+ | |||
+ | === 2014.09.08 [https://docs.google.com/presentation/d/18cnv9uWq1w6-7zBomsxQZGgubrQEFDlNea-wgg9nr2g/edit?usp=sharing Second Lecture] === | ||
+ | |||
+ | |||
+ | === 2014.09.15 [https://docs.google.com/presentation/d/1bzXayPwOemjpU6RVdKdbiiuHCv7kZhxFFvtfYZfdlXU/edit?usp=sharing State of Malware underground 2011/Third lecture ] === | ||
+ | |||
+ | |||
+ | |||
+ | === 2014.09.22 [https://docs.google.com/presentation/d/1heskOjlsSeaKKXFRFgdVtXWBrfr69sjXRScf8pwSrPo/edit?usp=sharing Banking trojans , Forth lecture] === | ||
+ | |||
+ | |||
+ | |||
+ | === 2013.09.29 [https://docs.google.com/presentation/d/14mzzrXGke_RPlj9cl7XLLH5-oUJ7K0g-xbQfoA7bGlo/edit?usp=sharing Elron ,FastFlux,Chuck Norries/Fift Lecture ] === | ||
+ | |||
− | === 2013. | + | === 2013.10.06 [https://drive.google.com/file/d/0BwLcblFEXx61RGhoLXpZRU1KTEU/view?usp=sharing Tarmo - Malware intcident Handling] === |
+ | === 2013.10.13 [https://docs.google.com/presentation/d/1Vjlo4wNmm1fNBAOfbBtmbBbM3xA8T7bZj7XqEBkGgeY/edit?usp=sharing 7-th lecture ] === | ||
− | === 2013. | + | === 2013.10.20 [https://docs.google.com/presentation/d/1yhMF7fR_3nat_OXyPAC_XZa-Yrfm4Upbt7ZjS0KcHiU/edit#slide=id.g4e2c18fe5_05 8-th lecture ] === |
Viimane redaktsioon: 19. jaanuar 2015, kell 15:52
Welcome
Sentences (need do carried out before 30 th November 2014)
If you were late les than 3 times Choose one of them : If you were late more than 2 times you should choose 2 tasks:
1) Write an essay (6+ pages 12 font size Times New Roman) :
1.1 Forget what you have ever learned about computers and imagine yourself being a person who just bought one, can barely use web browser and has heard from friend about bad thing called "computer virus" that you should protect yourself against. Try to educate yourself about the "computer virus" using only non-technical mainstream newspapers, believing literally everything that is written there.
Describe what your conclusion about nature, sources and motivation of computer viruses would be and how you think you could protect yourself. Don’t be afraid to include most ridiculous claims (apparent to you as computer literate person), in fact prefer them and provide links to sources.
1.2 “Attack Vectors” Describe top 5 infection vectors. Provide sources and references. Include examples
2) Research work on Exploit kits - What are available, where to get them , prices , how they function Prices should be from original source - as with lab 1 give links and screenshots. Describe functionality at least 2 of EK-s that you "can acquire"
3) Choose witch script you like an give your written argumented opinion why you liked this solution. IF you think that you are author of one those scripts this choice is not for you (we know writers :))