Harmful Software Code Countermeasures Technologies

Major: Administration of Cybersecurity Systems
Code of subject: 7.125.04.O.006
Credits: 4.00
Department: Information Security
Lecturer: Assoc., Ph.D., Assoc. Otenko V.I.
Semester: 1 семестр
Mode of study: денна
Learning outcomes: RS13. Research, develop, implement and use methods and means of cryptographic and technical information protection of business/operational processes, as well as analyze and provide an assessment of the effectiveness of their use in information systems, objects of information activity and critical infrastructure.
Required prior and related subjects: Previous: 1. Programming technologies 2. Operating systems 3. Cryptographic systems and protocols
Summary of the subject: 1. The subject of the discipline, its goals, structure and tasks. Evolution malware. 2. Classification of malicious software. Naming conventions. 3. Phishing. Using machine learning to analyze and malware detection. 4. Attack vectors and the MITER ATT&CK model. 2 5. Static and dynamic analysis of malicious software software. 6. Technologies of passive and active self-defense against harmful Software. 7. Malicious software of the "ransomware" class.
Assessment methods and criteria: Current control of classroom classes is conducted for the purpose of clarification circumstances of the educational process, determination of its results in the following forms: ? preliminary identification of students' knowledge level before the start of classes; ? current check in the process of assimilation of each studied topic; ? evaluation of the student's activity in the course of lectures; ? verification of the performance of laboratory work; ? checking the performance of control works; ? oral examination of assimilation of knowledge acquired in the process of performing laboratory tests works Final (examination) control is carried out based on the results of the test control and oral survey.
Recommended books: 1. Korchenko O.G., Morozov A.S. Program protection and hacking. Educational manual. K.: NAU.-2021 .-84 p. 2. J. Saxe, H. Sanders. Malware Data Science. Attack detection and Attribution.-2018. 3. Monnappa K A. Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware.-Packt Publishing, Ltd.-2018. 4. M. Sikorski, A. Honig. Practical Malware Analysis.- No Starch Press.-2012. 5. Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code.-Wiley Publishing, Inc.-2015. 6. Malware Reverse Engineering Handbook [Electronic resource]. - NATO Cooperative Cyber ??Defense Center of Excellence (CCDCE).-Tallinn, 2020. Access mode: https://ccdcoe.org/library/publications/malware-reverse-engineering-handbook/. 7. B. Dang, A. Gazet, E. Bachaalany, S. Josse. Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation.-John Wiley & Sons Inc.-2014.