Registration Form


For any inquiries regarding registration, kindly e-mail at isas.usim2011@gmail.com or wafamohdkharudin@gmail.com

18 Aug 2011

VIRUSES (type)


Types of viruses :-
The different types of viruses are as follows-

1) Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The Virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.

2) File or Program viruses :- Some files/programs, when executed, load the Virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.

3) Multipartite viruses :- A multipartite Virus is a computer Virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the Virus attaches to the boot sector, it will in turn affect the system’s files, and when the Virus attaches to the files, it will in turn infect the boot sector.
This type of Virus can re-infect a system over and over again if all parts of the Virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.
Other examples are Invader, Flip, etc.

4) Stealth viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth Virus feeds the antivirus program a clean image of the file or boot sector.

5) Polymorphic viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific Virus codes unable to detect it's presense.

6) Macro viruses :- A macro Virus is a computer Virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro Virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.

credit to Mr Antrax of Silent Hacker.com

What are computer VIRUSES?


In the early 1980's, if a programmer had said that a computer could be infected by "viruses," he probably would have been greeted with only sympathetic laughter from his colleagues. In the meantime the response to this problem has changed somewhat, due in part to extensive but not always factual publicity. But even today many users are under the false impression that computer viruses refer to viruses in the biological sense.

Of course this is not true. Computer viruses are programs, just like a spreadsheet or a word processor. This distorted picture of computer viruses is the reason that the spectrum of responses to this topic range from sympathetic laughter to a knowing grin up to a panic ova viral infection. Factual explanations about these matters have generally been ignored up to now. There have been reports of "promiscuous disks," of worms which eat through the computer, and "hard viruses which destroy the ROM." To bring a little clarity to this confusion, this book is intended to be a guide in the world of computer viruses.

First we should explain the origin of the term computer virus. We will use parallels between biological viruses and viruses in the computer.

Biological viruses                                                      
1. Attack specific body cells
2. Modify the genetic information of a cell other than originally intended |
3. New viruses grow in the infccted cell itself
4. An infected cell is not infected more than once by the same cell
5. An infected organism may not exhibit symptoms for a long time
6. Not all cells with which the virus comes in contact are infected
7. Viruses can mutate and thus cannot be clearly told apart


Computer viruses      
1. Attack specific programs (all *.COM, all *.EXE, etc.)
2. Manipulate the program: It performs tasks
3. The infected program produces virus programs
4. A program is infected only once by most viruses
5. The infected program can work without error for a long time
6. Programs can be made immune against certain viruses
7. Virus programs can modify themselves and possibly escape detection this way

(Try to compare between biological and computer virus one by one to get clear view and understanding)

30 Jun 2011

Schedule.

24 September 2011 (Sabtu)

8.30 pagi  : Participants arrival
8.50 pagi  : VIPs arrival
9.00 pagi  : Welcome address by Chairperson
                1. Welcome speech by FST Dean, USIM
                   - Prof Dr Jalani Sukaimi
                2.  Opening speech by Vice Canselor / Wakil USIM

10.10 pagi  : Seminar 1 - Digital Forensics vs Cyber Crime
                   - Mr. Sundresan Perumal (Lecturer)
11.10 pagi  : Short Presentation from EC Council
11.25 pagi : Seminar 2 - Quality and Secure Issues of Digital Islamic Content
                   - Ustaz Syed Najihuddin Syed Hassan (USIM)

12.40 t/h  : Break & Lunch & Zuhr Prayer

2.00 ptg   : Computer Workshop I & II
                Bengkel I : Sript Kiddies Guide to Web Application Attack & Defense
                Bengkel II : Linux Sabily

5.00 ptg    : Hi Tea


25 September 2011 (Ahad)

8.30 pagi   : Participants arrival
8.40 pagi   : Welcome address by Chairperson

9.00 pagi   : Seminar 3 - Towards an Effective Detection or Malware Threats by
                                   Understanding Their Behaviours World
                   - Mr. Fadzli Marhusin (USIM)

10.15 pagi : Snack

10.30 pagi : Seminar 4 - Hacking Issue
                   - Mr. Zuraidy Bin Adnan (UNISEL)

11.45 pagi : Seminar 5 - Security Networking  
                   - Mr. Muhammad Hazrul Bin Mohamed Hamzah (Head of R&D and 
                     Best Practise Unit, SCAN)

1.00 t/hari : Lunch & dismissal

31 May 2011

14 May 2011

Updated Poster

Poster of iS@S 11' (Click for a larger version)

Speakers' Profile

Speaker 1:
Mr. Sundresan Perumal 
Lecturer 
“Digital Forensic vs Cyber Crime”


Speaker 2:
Ustaz Syed Najihuddin Syed Hassan
Lecturer of FPQS, USIM
”Quality and Secure Issues of Digital Islamic Content


Speaker 3
En. Mohd Fazdli Marhusin
Tutor of FST, USIM
Towards an Effective Detection or Malware Threats by Understanding their Behaviors”


Speaker 4:
En. Mohamad Hazrul
Head of Department of  R&D and Best Practise, SCAN
”Security Networking”


Speaker 5:
En. Zuraidy 
Lecturer of Selangor Industrial University (Unisel)
“Hacking Issue”

SEMINAR & WORKSHOP

Seminar
  • Security Networking
  • Quality & Secure Issues of Digital Islamic Content
  • Digital Forensic vs Cyber Crime
  • Towards an Effective Detection or Malware Threats by Understanding Their Behaviors
  • Hacking Issue


Workshop
  • Script Kiddies Guide to Web Application Attack and Defence
  • Linux Sabily

Organization Chart

Penaung:
Prof. Dr. Jalani b. Sukaimi
Dean of Faculty of Science & Technology (FST),
Universiti Sains Islam Malaysia (USIM).

Advisors:
Prof Dr Kamaruzzaman Seman,
Professor Of Computer Science (Information Security and Assurance)
FST, USIM
Prof. Madya Dr Norita Md Norwawi,
Head of Program of Computer Science (Information Security and Assurance)
FST, USIM

Coordinator:
Encik Mohd Asri b. Haji Hussain
Vice Registrar
Faculty of Science & Technology (FST), USIM

Director:
Hannah ’Aqilah bt. Amran

Vice Director:
Nur Fatehah bt. Md Din

Secretaries:
Massitah bt. Bustari
Nurul Fatonah bt. Mohd Yusof

Treasurers:
Siti Munawwarah bt. Mahmod
Siti Hasiah bt. Awang Hamat

Executive Committees:

Promotion & Publicity:
Aziha bt. Adnan
Shahrizal bin Arshad

Communication & Transportation:
Nur Afiqah bt. Yusoff
Siti Zahidah bt. Hussin

Food & Welfare:
Mariatul Kibtiah Mohamad
Noordina bt. Mohd Zahidi

Logistic & Academic:
Nuratiqa Syahira bt. Omar
Elmy Eliyana bt. Mohd Zain
Mohd Aiman bin Mohd Adnan

Protocol & Technical:
Ummu Habibah bt. Mohd Hilmi
Normazida bt. Jusoh

Registration:
Wafa bt. Mohd Kharudin
Nurul Izratul Imrah bt. Zolkafle
Norayuni bt. Mohammad Diah

Objectives of iS@S'11

  • To provide a forum as a platform for information sharing as well as to discuss current issues related to Information Security and Assurance.
  • To respond to the call of the government in implementing the concept of human capital among students that not only can apply academic theories have been learned, but also in organizing beneficial programs.
  • To introduce the name of FST and USIM to the agencies and the industries related to Information Security and Assurance, hence to open the way for further collaboration in the future.
  • To provide disclosure and reveal to students about the career prospects for ISA students and to open their minds for being more creative, innovative, and dynamic over time.
  • To produce students with full of confidence level and have high competitiveness in the field of endeavor.

10 May 2011

What is iS@S?

All praises to Allah All Knower, All Expert. Solawat and Salam to our beloved prophet Muhammad s.a.w, his family and sahabah.  Glory to Allah, our knowledge is limited to only that Allah teach us.

iS@S formally known as Information Security and Assurance Seminar is organized by fourth year students of the BSc in Computer Science majoring in Information Security and Assurance (ISA), a program offered by the Faculty of Science and Technology (FST), Universiti Sains Islam Malaysia (USIM). This seminar will be an annual activity which will be organized by ISA students from USIM as part of their professional development activity.


This seminar act as a forum to discuss about the current issues related to the Information Security and Assurance in the field of Computer Science and Information Technology. It will also introduce USIM to other universities so that they will realize the existence of the ISA program in USIM for future collaboration and networking.

Through this program, we hope that it will give the opportunity for social networking among the participants from various public and private universities.  May we gather and part for the sake of Allah.