Skip to main content
  • Courses
  • Programs
  • Help
    Getting Started Discussion Forums Help Center & FAQ
Saylor Academy
    Close
    Toggle search input
  • Log in or Sign up
Courses
Programs
Help
Getting Started
Discussion Forums
Help Center & FAQ
  • CS406: Information Security (2018.01)
  • Announcements
  • Sections
  • Course Introduction
  • Unit 1: Computer Security Concepts
  • Unit 2: Basic Cryptographic Concepts
  • Unit 3: Public-Key Encryption
  • Unit 4: Access Control Mechanisms
  • Unit 5: Security Solutions
  • Unit 6: Firewalls, Intrusion Detection, and Intrusion Prevention
  • Unit 7: Physical Security
  • Unit 8: Malicious Software and Software Security
  • Unit 9: Security Risk Management
  • Final Exam
  • Resources
  • Activities
  • Forums
  • Quizzes
  • Home
  • My programs

CS406: Information Security (2018.01)

Competencies
  1. Home
  2. Courses
  3. (hidden)
  4. CS406: Information Security (2018.01)
  5. Sections
  6. Unit 8: Malicious Software and Software Security

Learn new skills or earn credit towards a degree at your own pace with no deadlines, using free courses from Saylor Academy. We're committed to removing barriers to education and helping you build essential skills to advance your career goals. Start learning here, or check out our full course catalog.

Log in or Sign up to enroll in courses, track your progress, gain access to final exams, and get a free certificate of completion!

Sign up now
Back to course 'CS406: Information Security (2018.01)'
  • Unit 8: Malicious Software and Software Security

    In this unit, we will explore malicious software, also known as malware. We will also study common software security issues such as buffer overflow, used by several malware to exploit systems' vulnerability. At the end of the unit, we will learn how to use these malware and other security attacks to carry out information warfare.

    Completing this unit should take you approximately 8 hours.

    • Unit 8 Learning Outcomes Page
    • 8.1: Malicious Web

      • University of Washington: Giovanni Vigna's "From Badware to Malware: Taming the Malicious Web" Page

        Watch this video to learn about how malicious actors leverage legitimate websites for the delivery of attacks that target vulnerabilities in client-side software.

    • 8.2: Internet Security Issues

      • Talks at Google: "Vint Cerf" Page

        Watch this video to learn about security issues on the Internet, and what could have been done differently had we realized this was going to be the global information exchange infrastructure of the 21st century.

    • 8.3: Types of Internet Security Issues

      • Carnegie Mellon University: "Denial of Service" URL

        Read this page. While you read, try to explain the modes of DoS attacks, such as consumption of scarce resources, configuration information alternation, and physical destruction. For DDoS attacks, describe the tools that are used for DDoS, why the DDoS attacks are possible, and the protocol vulnerabilities that are used in DDoS attacks.

      • Bennett Todd's "Distributed Denial of Service Attacks" URL

        Read this page.

    • 8.4: Secure Coding

      • Carnegie Mellon University: Robert Seacord's "Top Ten Secure Coding Practices" URL

        Read this page. After you read, describe the top 10 best practices for secure coding and describe the principles for secure coding (e.g., separation of duties, least privilege).

      • Open Web Application Security Project: "Secure Coding Principles" URL

        Read this page.

    • 8.5: Electronic and Information Warfare

      • University of Cambridge: Ross Anderson's "Electronic and Information Warfare" URL

        Read this chapter. After you read, describe the different attacks on communication systems and how one could use these attacks to carry out information warfare (in particular, based on the interaction between civil and military uses).

Skip Activities
Activities
  • ForumForums
  • QuizQuizzes
  • Resources
Skip Recent activity
Recent activity
Activity since Tuesday, March 28, 2023, 7:26 PM
Full report of recent activity...

No recent activity

Saylor Academy
  • About

  • Partners

  • Blog

  • Contact

Saylor Academy

© Saylor Academy 2010-2023 except as otherwise noted. Excluding course final exams, content authored by Saylor Academy is available under a Creative Commons Attribution 3.0 Unported license. Third-party materials are the copyright of their respective owners and shared under various licenses. See detailed licensing information.

Saylor Academy®, Saylor.org®, and Harnessing Technology to Make Education Free® are trade names of the Constitution Foundation, a 501(c)(3) organization through which our educational activities are conducted.

"CCBY"

Sitemap | Terms of Use | Privacy Policy

Data retention summary
Get the mobile app
Policies