Computer Security The problem of insecure PCs – and its consequences Why does this problem exist? Solutions – what you can do – what the industry can do.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Viruses & Destructive Programs
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
PLUG IT IN SIX Protecting Your Information Assets.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
Topic 5: Basic Security.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Call Us: (Toll Free)
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
HCI problems in computer security Mark Ryan. Electronic voting.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
Mark Ryan Professor of Computer Security 25 November 2009
What they are and how to protect against them
Executive Director and Endowed Chair
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
IT Security  .
Unit 4 IT Security.
Personal spaces.
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
ISYM 540 Current Topics in Information System Management
Google search not working on pc. Google Google is basically an American company Google is specialises in internet services Google have internet services.
Network security threats
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Chapter 12: Social Implications of IT
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Malware CJ
Module 7 Questions Prepared by Mr O Seguna next.
HOW DO I KEEP MY COMPUTER SAFE?
ICT Communications Lesson 3: Internet Life and Privacy
How to keep the bad guys out and your data safe
Presentation transcript:

Computer Security The problem of insecure PCs – and its consequences Why does this problem exist? Solutions – what you can do – what the industry can do Research in Computer Security

Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site scripting

data theft (inc. ID theft) create botnet exploit software vulnerabilities DNS spoofing hardware keylogger send spam install malware XS S phishing promotion destruction (inc. vandalism) DDoS α β means β is a possible way to achieve α hardware theft

Malware is –software intended to intercept or take partial control of a computer's operation without the user's informed consent. –It subverts the computer's operation for the benefit of a third party. Also called spyware. –The term “spyware” taken literally suggests software that surreptitiously monitors the user. But it has come to refer more broadly to any kind of malware, Malware covers all kinds of intruder software –including viruses, worms, backdoors, rootkits, Trojan horses, stealware etc. These terms have more specific meanings.

Trojan horse –a malicious program that is disguised as useful and legitimate software. Can be part of, or bundled with, the carrier software. Virus –Self-replicating program that spreads by inserting copies of itself into other executable code or documents. Worm –Self-replicating program, similar to virus, but is self- contained (does not need to be part of another program). Spreads by exploiting service vulnerabilities. Drive-by –installs as side-effect of visiting a website; exploits browser vulnerability. Detail from "The Procession of the Trojan Horse in Troy“, Giovanni Domenico Tiepolo How malware spreads

Why does this problem exist? Why can't engineers create systems that are not vulnerable to this plethora of attacks? Compare: cars aircraft telephone system electricity production

We have the technology...

Why does this problem exist? complexity immaturity – of technology: “release and fix” – of designers/programmers: bad culture – of users: a new one born every day... open platform monoculture

Trusting Trust backdoor How to create an undetectable backdoor: –Change the compiler so that, when compiling the login program, it adds the hard-coded username/password check to the login program. Thus, the login program source code looks completely normal. –As an extra twist, change the compiler so that, when compiling the compiler, it adds the code to add the code to the login program. Thus, even if the compiler is recompiled, the backdoor will still be inserted. And none of the source code reveals the backdoor. Described in a paper by Ken Thompson, Reflections on Trusting Trust, 1995.

What you can do Don't connect directly to the Internet – connect via a router instead Don't install anything! – no third-party toolbars, extensions, helpers, freebies – unless you really know where they came from Be sceptical about from nice people who want to give you $20,000,000 or help you reduce your mailbox usage or help your computer to go faster Stop using Windows – use Linux, *BSD (or derivative, including Mac OS X) Update/patch frequently

What industry is doing better engineering thin clients – cloud computing trusted computing – protected capabilities outside software control – virtualisation, to support throw-away OS

The Trusted Platform Module p := SHA1(p || x)

Computer security research electronic voting trusted computing privacy in the digital world

Electronic voting

ballot secrecy and coercion resistance usability election verifiability ?

Privacy in the digital world Facebook blogs Gmail Web searches instant messaging Oyster card Government űberdatabase IS P Google Docs

“A face is exposed for AOL searcher no ” From New York Times, August 9, 2006 In August 2006, Buried in a list of 20 million Web search queries collected by AOL and recently released on the Internet is user No The number was assigned by the company to protect the searcher's anonymity, but it was not much of a shield. No conducted hundreds of searches over a three-month period on topics ranging from"numb fingers" to "60 single men" to "dog that urinates on everything." And search by search, click by click, the identity of AOL user No became easier to discern. There are queries for "landscapers in Lilburn", and several people with the last name Arnold. It did not take much investigating to follow that data trail to Thelma Arnold, a 62-year-old widow who lives in Lilburn, GA “

Balancing global security and individual privacy securityprivacy