Top Banner
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware
36

1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

Dec 18, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

1

Protecting Your Computer

Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft

phishing hoaxes Spyware

Page 2: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

2

Computer Threats Cyber-crimes are

criminal acts conducted through the use of computers by Cyber-criminals.

Hacker: Anyone who unlawfully accesses a computer system

Page 3: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

3

What Hackers Do Steal information from computers:

Credit card numbers Bank account numbers

Internet packet sniffing Commit identity theft

Page 4: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

4

Denial of Service Attacks Web servers are sent millions of bogus

requests Overloads the system Consequently they shut down Service is denied legitimate users

Page 5: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

5

Denial of Service Attacks Distributed denial of

service attacks use many computers

Backdoor programs Trojan horse Zombies

Page 6: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

6

How Hackers Gain Access Direct access:

Hacking software

Indirect access: Internet connection Logical ports

Page 7: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

7

Computer Safeguards: Firewalls Software programs or

hardware devices designed to close logical ports to invaders A firewall is built into Windows

XP More robust firewalls are

available from other vendors. Firewalls are critical if you

have an always-on broadband connection.

Page 8: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

8

Firewall Always on Internet service is a problem

use a router or firewall software see IT website for Firewall information

Page 9: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

9

Firewall Objective: to keep the internal network secure

from the outside It is a hardware device or software through which

all traffic must pass

Firewall

LAN WAN

Page 10: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

10

Firewall

LAN WAN

RouterDoes dynamic address translation

IP address

111.22.3.44

IP addresses known only to the router, not to the ISP

ISP

Page 11: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

11

Protecting a Wireless Network Wireless network range doesn’t stop at the

property line. Default device and network ID settings allow

intruders to enter the network. Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion

and takeover.

Page 12: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

12

Secure Your Wireless Router Change Your Network Name (SSID) Disable SSID Broadcast Change the Default Password on Your Router Turn on Encryption (WAP is best) Implement Media Access Control Apply Firmware Upgrades

Page 13: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

13

Change Your Network Name

Disable SSID Broadcast

Change the Default Password

Turn on Encryption

Implement Media Access Control

Page 14: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

14

Software Sabotage Risks

Virus Worm Trojan horse Spyware DOS Attacks

Protection

Page 15: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

15

Computer Threat - Viruses

A virus is a program that attaches itself to another program

It hides within the code of the host program When host program executes the virus

code executes also and copies itself to other programs

Page 16: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

16

Page 17: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

17

What Viruses Do Replicate themselves:

Slow down networks

Secondary objectives: Annoying messages Delete files on the hard drive Change computer settings

Page 18: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

18

How Does a Computer Catch a Virus

Page 19: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

19

Virus Macro virus

Attach to documents

Email virus Attachments

Page 20: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

20

Antivirus Software Programs designed to detect viruses:

Scan files looking for virus signatures (unique code) Provides options for deleting or fixing infected files

Detect known viruses Antivirus programs need to be updated frequently

Page 21: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

21

Use Anti-virus Software Install and update anti-virus software

UofC IT anti-virus web page Free software: McAffee

ISP might provide free Otherwise buy it (McAffee, Norton, …)

Page 22: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

22

Email Virus Detection ISP mail server (UofC IT and CPSC)

Scans incoming and outgoing messages, notifies user if finds virus (strips attachments), and quarantines the message

User can recover message from quarantine If you suspect: don’t open the attachment

Delete the message Scan in email program or save to disk and then scan with

virus detection software

Page 23: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

23

Sober

Source: Calgary Herald

Page 24: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

24

Email Virus Detection

From: [email protected]

Subject: WARNING - VIRUS (Worm.Sober.U) IN MAIL TO YOU

Date: November 25, 2005 10:20:55 AM MST (CA)

My email

Page 25: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

25

*** VIRUS ALERT ***Dear user,This is an automatically generated message from the University ofCalgary, Department of Computer Science (CPSC).

The CPSC email system has detected a piece of email with a virus called: Worm.Sober.Uin an email addressed to you from:<[email protected]>The Subject of this email was:Mail delivery failedDelivery of the original email has been stopped. A copy of the message hasbeen placed under quarantine.Please visit the CPSC Maia Mailguard system located:http://imgw1.cpsc.ucalgary.ca/mailto view your quarantined messages. You will be required to log intothis system using your CPSC Email address and your CPSC Login Password.

For your reference, here are some selected headers from the email:------------------------------------------------------------------Date: Fri, 25 Nov 2005 10:20:55 -0700 (MST)From: [email protected] (Empty if virus is known to forge sender address)To: Subject: Mail delivery failed

Received: dpwtlcd.com (S010600112f1f983b.cg.shawcable.net [68.147.104.66])

Page 26: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

26

Worm Program that travels independently over

computer networks, seeking uninfected sites

Replicates and starts up thousands of processes

Overloads a system

Page 27: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

27

The Cost of Worms Nimba, Sept. 18, 2001 In 24 h infected 2.2 million computers Microsoft Windows Huge traffic disabled web and email servers Damaged system files

Page 28: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

28

Trojan Horse Program that performs a useful task while

also being secretly destructive A logic bomb responds to a particular event Cannot replicate E.G. Logon Trojan horse

Page 29: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

29

Denial of Service Attacks Web servers are sent millions of bogus

requests Overloads the system Consequently they shut down Service is denied legitimate users

Page 30: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

30

Protection from Viruses and Security Risks Use anti-virus software

Update frequently Use anti-spyware software Update your operating system

Automatic updates and security patches Microsoft Macintosh

Page 31: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

31

Computer Security: Reducing Risks

Disaster Planning backup power monitoring, alarms backup of data redundant sites or hot sites

Page 32: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

32

Computer Security: Reducing Risks

Physical Access Restrictions something

you have: key, ID card you know: password, personal information you do: signature, … About you: Biometrics

Page 33: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

33

Passwords The most common tool for restricting

access to computer systems Weakness

user sustained guessing

program guesses words from online dictionaries

Page 34: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

34

Password Guidelines Don’t use

real words names plurals common expressions reversal

Page 35: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

35

Passwords Do

mix letters and numbers change frequently keep secret

Page 36: 1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

36

Biometrics