Top Banner
Security WeeSan Lee [email protected]
16

Security WeeSan Lee [email protected]@cs.ucr.edu.

Dec 29, 2015

Download

Documents

Chad Lawrence
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security

WeeSan Lee [email protected]

Page 2: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Roadmap

Security Risks Preventions References

Page 3: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks

Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing

Page 4: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Computer Virus A small computer program that infects your

computer without permission or knowledge of the user

Infects others via a host media Floppy disk Email …

http://www.healthinitiative.org/IMAGES/virus_big.jpg

Page 5: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Worm

A self-replicating program, spreads across the Internet

May contain viruses 1st worm was created by Robert T. Morris, a

graduate student at Cornell U. in 1988 Computer Emergency Response Team

(CERT) was created as a result

http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG

Page 6: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Trojan Horse

A program that disguises itself to be something useful or harmless Eg. screensaver

In fact, a backdoor program which allows unauthorized access remotely

http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg

Page 7: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Adware

An advertising-supported software

Page 8: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Spyware

Adware + collecting user’s information without the user’s consent

Page 9: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Browser Hijacker A program that changes the settings on the

web browser Change the homepage to other website

Page 10: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Web Bug

Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users

AKA web beacon, tracking bug, … To avoid that:

Turn off image loading on email clients Use text-based email such as pine

http://www.prospexis.net/images/beatle2.gif

Page 11: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Hoaxes and Chain Letters Hoaxes are fake warnings, instructing you to

delete files, playing on your sympathy, etc Chain letters implore you to pass the

message to as many people as possible For examples

“This is not a hoax.” “Forward this email to 10 people you know for

good luck …” “VIRUS! DELETE NTFS.SYS”

Page 12: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Phishing

Page 13: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Security Risks - Phishing

Page 14: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Preventions

Use anti-virus/firewall software For examples

AVG (http://free.grisoft.com/) Nod32 (http://www.eset.com/) Norton Antivirus (http://www.symantec.com/)

Schedule auto-update

Page 15: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

Preventions (cont)

Backup Use 2 HDs Burn CDs/DVDs and give them to your

mom Use online backup services

http://www.carbonite.com/

Be educated Don’t “fool” around

Page 16: Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu.

References

Internet Effectively Ch 1 Ch 4

Wikipedia http://www.wikipedia.com/