UNDERSTANDING UNDERSTANDING INFORMATION SECURITY INFORMATION SECURITY Lee Ratzan, MCP, Ph.D. Lee Ratzan, MCP, Ph.D. School of Communication, Information & Library Studies at School of Communication, Information & Library Studies at Rutgers University Rutgers University [email protected][email protected]VIRUSES, WORMS, HOAXES, And TROJAN HORSES
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
UNDERSTANDING UNDERSTANDING INFORMATION SECURITYINFORMATION SECURITY
Lee Ratzan, MCP, Ph.D.Lee Ratzan, MCP, Ph.D.School of Communication, Information & Library Studies at School of Communication, Information & Library Studies at
Rutgers University Rutgers University [email protected]@scils.rutgers.edu
VIRUSES,WORMS,HOAXES,
And TROJAN HORSES
IT’S A JUNGLE OUT THEREIT’S A JUNGLE OUT THERE
Computer Viruses
Trojan Horses
Address Book theft
DNS Poisoning
Zombies, IP Spoofing
Password Grabbers
Logic Bombs
Network Worms
Hijacked Home Pages
Denial of Service Attacks
Buffer Overruns
Password Crackers
AND THE EVER POPULAR:AND THE EVER POPULAR:
Hoaxes
Ploys
Pop-Ups
Scams
Spam
In 1980 a computer cracked a 3-In 1980 a computer cracked a 3-character password within one character password within one
minute.minute.
DID YOU KNOW?
In 2004 a computer virus infected 1 In 2004 a computer virus infected 1 million computers within one hour.million computers within one hour.
In 1999 a team of computers cracked a In 1999 a team of computers cracked a 56-character password within one day.56-character password within one day.
STOPPING THE TROJAN HORSESTOPPING THE TROJAN HORSE
The Horse must be “invited in” ….The Horse must be “invited in” ….
How does it get in?
Downloading a file
By:
Installing a program
Opening an attachment
Opening bogus Web pages
Copying a file from someone else
A Trojan Horse exploits computer ports letting its “friends” enter, and
Security patches often close computer ports and vulnerabilities
MORE ON THE HORSE…….
“once a thief gets into your house he opens a rear window for his partners”
NOTE #1NOTE #1 Search engines are NOT reliable sources of Search engines are NOT reliable sources of
virus informationvirus information
Information may be inaccurate, incomplete or out of dateSearch engines generate huge numbers of indiscriminate hitsSome anti-virus Web sites are scams (or contain trojan Horses)
Go directly to authoritative anti-virus sites
NOTE #2NOTE #2
Computer companies are Computer companies are NOTNOT reliable sources of virus informationreliable sources of virus information
are not in the anti-virus business
Usually refer you to an anti-virus vendor
themselves are victims!
Computer companies:
ONLINE RESOURCESONLINE RESOURCES
Authoritative Hoax InformationAuthoritative Hoax Information
some professional library sites have some professional library sites have pointers to reliable anti-virus informationpointers to reliable anti-virus information
PRINT RESOURCESPRINT RESOURCES
Allen, Julia, (2001) Allen, Julia, (2001) The CERT Guide to The CERT Guide to System and Network Security PracticesSystem and Network Security Practices, , Addison-Wesley, New YorkAddison-Wesley, New York
Crume, Jeff, (2000) Crume, Jeff, (2000) Inside Internet SecurityInside Internet Security, , Addison-Wesley, New YorkAddison-Wesley, New York
Ratzan, Lee, (January 2005) Ratzan, Lee, (January 2005) A new role for A new role for librarieslibraries, SC Magazine (Secure Computing , SC Magazine (Secure Computing Magazine), page 26Magazine), page 26
Ratzan, Lee, (2004) Ratzan, Lee, (2004) Understanding Understanding Information SystemsInformation Systems, American Library , American Library Association, ChicagoAssociation, Chicago
A NEW ROLE FOR A NEW ROLE FOR LIBRARIES?LIBRARIES?
THE AUTHOR THE AUTHOR ACKNOWLEDGESACKNOWLEDGES
The cooperation of InfoLink (The cooperation of InfoLink (www.infolink.orgwww.infolink.org) for promoting ) for promoting library professional development library professional development programsprograms
The Monroe Public Library for the use The Monroe Public Library for the use of its facilitiesof its facilities
SC Magazine for publishing an essay SC Magazine for publishing an essay on libraries being at the forefront of on libraries being at the forefront of information securityinformation security
Lisa DeBilio for her production of the Lisa DeBilio for her production of the PowerPoint slides. PowerPoint slides. THANK YOU ALL