Top Banner

of 26

Computer Security Chapter 8

Apr 05, 2018

Download

Documents

Chetna Thanvi
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/31/2019 Computer Security Chapter 8

    1/26

    Computer SecurityStd XIChapter 8

  • 7/31/2019 Computer Security Chapter 8

    2/26

    Security Principles

    During

    Data Transmission on theInternet

  • 7/31/2019 Computer Security Chapter 8

    3/26

    Confidentiality

    Content of the message

    should be accessed by Sender &

    Recipient

  • 7/31/2019 Computer Security Chapter 8

    4/26

    Integrity

    Message/data must arrive

    exactly as it was sent

    NO modification done either

    accidentally or maliciously

  • 7/31/2019 Computer Security Chapter 8

    5/26

    Authentication

    Receiver must be sure of thesenders identity

    All users must have a

    user ID &

    password

  • 7/31/2019 Computer Security Chapter 8

    6/26

    Nonrepudiation

    A sender must not denyhaving sent the message to

    the receiver

  • 7/31/2019 Computer Security Chapter 8

    7/26

    For security

    Encryption and Decryptionare used.

  • 7/31/2019 Computer Security Chapter 8

    8/26

    Destructive software Viruses

    Malware

    Spyware

    Worms

    Browser Hijackers Spam

  • 7/31/2019 Computer Security Chapter 8

    9/26

    Viruses

    Vital Information

    Resources Under

    Seize

  • 7/31/2019 Computer Security Chapter 8

    10/26

    Viruses

    Cannotaffect

    hardware

    Attacks

    software

    such asO.S.

    application

    softwaree-mails

    data

  • 7/31/2019 Computer Security Chapter 8

    11/26

    Types ofViruses

    Boot sector virus

    Macro virus

    E-mail virus

    File infector virus (.com,.exe, .sys, .ovl, .prg, .mnu)

  • 7/31/2019 Computer Security Chapter 8

    12/26

    How the virus works

    Clean uninfectedprogram

    Virus Infectedprogram

    Compute A , B

    Perform printing

    End

    Compute A , B

    Delete all files

    Corrupt data

    Send copy of virus

    to all programs

    Perform printing

    End

  • 7/31/2019 Computer Security Chapter 8

    13/26

    Malware & Spyware

    performs malicious action w/o

    users permission

    Spyware gathers information

    relays info to advertisers & others

    installed w/o consent, knowledge(click, pop-up) (adware)

  • 7/31/2019 Computer Security Chapter 8

    14/26

    Worms

    Replicateyourself

    Replicate

    yourself

    Replicateyourself

    Replicate

    yourself

    Replicate

    yourself

    Replicate

    yourself

    Replicate

    yourself

    Replicate

    yourself

    Replicate

    yourself

    Replicate

    yourself

    No destruction

    Eat up

    Computersresources

    Make the

    computer

    unusable

  • 7/31/2019 Computer Security Chapter 8

    15/26

    Trojan Horse Is not self replicatingmain purpose is not make

    modifications in the target computer

    Requires interaction with the hacker

    Reveals confidential info (user ID,

    pwd)Allows hackers remote access to

    target system

  • 7/31/2019 Computer Security Chapter 8

    16/26

    Browser Hijackers alters your browser settings redirects home page to rogue search

    engines

    With sponsored links as results (hit list)

    Could also direct the browser to an

    error pageForces hits

  • 7/31/2019 Computer Security Chapter 8

    17/26

    Spam abuse of e-mail unsolicited mail, bulk e-mail (UBE)

    Commercial content

    Use of spam guard

    Spammers collect e-mail addresses

    from chatrooms, websites, customer lists,newsgroups, and viruses which harvest

    users' address books,

  • 7/31/2019 Computer Security Chapter 8

    18/26

    Antivirus

    protection from virus,

    worm, trojan horse, malware can be purchased or

    downloaded

  • 7/31/2019 Computer Security Chapter 8

    19/26

    Commercial Antivirus

    softwareAVG

    BitDefender

    Norton

    McAfee

    KasperskyeScan

    K7

    Bull Guard

    Dr.Web

    Panda Security

    PC Tools

    Protector PlusRising

    ZoneAlarm

  • 7/31/2019 Computer Security Chapter 8

    20/26

    Freely available Antivirus

    softwareAOL ActiveVirus Shield

    AVG AntivirusFree Avast Home

    Bitdefender 8

    free edition

    Comodo

    McAfee

    VirusScan Plus

    PC Tools AntiVirusFree Edition

    Dr.Web Cureit!

  • 7/31/2019 Computer Security Chapter 8

    21/26

    Antivirus software

    downloadsClamClamWin

    Moon Secure

    Open

    WinpoochAbandonware

    Aidstest

    Antiviral Toolkit

    Pro

    Central PointdLight

    Dr. Solomons

    The Antidote

    Thunderbyte

    Turbo

  • 7/31/2019 Computer Security Chapter 8

    22/26

    Preventive MeasuresDo not open e-mail attachmentsUpdate anti-virus software regularly

    Delete chain letters, forward, virus

    alerts and junk mail

    When Downloading files if unsure of

    their authenticity, scan them firstBackup regularly

    Do not hide file extensions

  • 7/31/2019 Computer Security Chapter 8

    23/26

    Preventive Measures

    Do not download files from strangers

    If you have to then download to a

    removable disk and scan with antivirus

    Protect using Internet firewall

  • 7/31/2019 Computer Security Chapter 8

    24/26

    To Turn on Firewall

    Click start

    Control Panel

    Security Center

    Windows firewall

  • 7/31/2019 Computer Security Chapter 8

    25/26

    For Unhiding File

    Extensions Click My Computer

    Tools Menu Folder Options

    View tab

    Uncheck Hide extensions

    for known file types

  • 7/31/2019 Computer Security Chapter 8

    26/26

    Lab Exercise Find names of Trojan Horses

    Find names of Viruses

    Find names of Worms Find details of Malware

    Find details of spyware

    Find names of Browser Hijackers

    Anti Virus scanning procedure

    details