Computer Network Security

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Cyber crime & Security Prepared by : Rughani Zarana.
computer Viruses Ever MAde To Protect What Matters
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Technical Implementation: Security Risks
Chapter 40 Internet Security.
Are our smart devices really that smart ?
International Conflict & Cyber Security
What they are and how to protect against them
Intro to Malware Attacks
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
CYBER SECURITY...
Instructor Materials Chapter 7 Network Security
FYE Cybersecurity Dr. X.
Network security threats
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Securing Information Systems
Computer Technology Notes 5
Risk of the Internet At Home
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
The Internet of Unsecure Things
Internet Safety Vocabulary
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
Computer Viruses Standard A-4 (Safety Unit)
Chap 10 Malicious Software.
How to keep the bad guys out and your data safe
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
Securing your system, protecting your digital data and devices.
WJEC GCSE Computer Science
Test 3 review FTP & Cybersecurity
Marcial Quinones-Cardona
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Network Security Dr. X

Internet Problems Computer Viruses, Trojans and Worms Financial Fraud and Identity Theft Crimes against minors Anonymous Libel Denial of Service

Computer Viruses What is a computer virus? a piece of code that is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

Examples Melissa Virus ILOVEYOU OSX/RSPlug Trojan Storm Worm Melissa virus in March 1999 was spectacular in its attack. Melissa spread in Microsoft Word documents sent via e-mail, and it worked like this: Someone created the virus as a Word document and uploaded it to an Internet newsgroup. Anyone who downloaded the document and opened it would trigger the virus. The virus would then send the document (and therefore itself) in an e-mail message to the first 50 people in the person's address book. The e-mail message contained a friendly note that included the person's name, so the recipient would open the document, thinking it was harmless. The virus would then create 50 new messages from the recipient's machine. At that rate, the Melissa virus quickly became the fastest-spreading virus anyone had seen at the time. As mentioned earlier, it forced a number of large companies to shut down their e-mail systems to control the spread. The Love Bug flooded internet users with ILOVEYOU messages in May 2000, forwarding itself to everybody in the user's address book. It was designed to steal internet access passwords for its Filipino creator. OSX/RSPlug Trojan In November 2007, the first example of financially-motivated malware for Apple Macs was discovered in the wild. The launch of the OSX/RSPlug Trojan increased fears that Apple's platform may be targeted more by hackers in the future. 10. Storm worm The Storm worm, originally posing as breaking news of bad weather hitting Europe, infected computers around the world in 2007. Millions of infected PCs were taken over by hackers and used to spread spam and steal identities.

Malware Case Study: Stuxnet Stuxnet is a famous computer worm that was first discovered in June of 2010. It was used to sabotage Iran’s nuclear enrichment facilities. In cyber security, an undisclosed vulnerability in a system is called a “zero day.” Stuxnet exploited several different zero days to change the way nuclear facilities were operating while reporting that everything was operating normally. https://youtu.be/7g0pi4J8auQ June 2011

How can you avoid viruses? Kahoot time!

Computer Network Attacks Passive: Scanning, Reconnaissance Active: Distributed Denial of Service Spoofing Man in the middle https://en.wikipedia.org/wiki/Attack_(computing)#Types_of_attacks Students can research and discuss about different attacks

Case Study Computer Network Attacks: DDoS Distributed Denial of Service Traffic flood Makes resources (e.g. websites) unavailable to users Can target small and large businesses Stuxnet had a very specific target, and an average business or computer user is not likely to have problems with it. But DDoS attacks are much more common. A DDoS attack is when a flood od traffic is sent to a target to make its resources unavailable to its users. Like when a crowd of people all try to go through a door at once. DDoS attacks are used to shut down businesses websites temporarily, causing them to lose traffic.

Case Study Computer Network Attacks: DDoS In a survey of 270 North American companies, 45% said they have experienced a DDoS attack at some point in time About 2/3 of DDoS attacks last 6 hours or more Cost of a DDoS attack estimated at $40,000/hr Non-financial costs Hardware Customer trust Loss of data DDoS attacks are fairly common and can last for several hours. Because hey cost around $40,000/hr, the average cost of a DDoS attack is around $500,000. DDoS attacks also cause damage that is not financial. You may have to replace hardware, lose your customer’s trust, or even have theft of important data.

Case Study Computer Network Attacks: DDoS http://www.digitalattackmap.com/ http://map.norsecorp.com/#/ Watch the attacks for a while. What trends do you notice? What do they show? The second map is the live one. After watching it for a while, it should become obvious that the US is the top attacker and victim. This may be because many big global corporations are in the US, and the US has many political enemies who want to attack the US. The importance of this is to show that DDoS attacks are global, and that attacks are often from one country to another. Remember Iran hiring an “army” of hackers to counterattack the US?

What is a botnet? https://www.youtube.com/watch?v=s0sgiY93w9c

Distributed DoS (DDoS) Attack Attacker Unidirectional commands Handler Zombies Coordinating Communications Agent Zombies Attack Traffic Target http://www.cisco.com/c/dam/en_us/about/ac123/ac147/images/ipj/ipj_7-4/dos_figure_4.gif

Mirai Botnet Large distributed denial of service attack - GBps… one billion bytes per second Weaponized the Internet of Things devices: web cameras etc. Took down websites such as: Amazon, Spotify, Twitter, Reddit Code was distributed openly! Mirai means… the future in Japanese 1,073,741,824 bytes, 1 Gigabyte: The bed of a pickup truck filled with paper.

IoT Security … or saving the world, one fitbit at a time

What is IoT? http://thehackernews.com/2015/08/hacking-internet-of-things-drone.html the interconnection via the Internet of computing devices embedded in everyday objects, enabling them to send and receive data.

(Image Credit: The Connectivist) Why is IoT so important?

Why is IoT so important? ...

Cybersecurity X Lab approach Hypothesis Penetration Testing Experimentation Theoretical framework Rinse, repeat!

Drone security Help needed! Known attack vectors: New ideas: Flood of traffic Large file Corrupted traffic Man in The Middle New ideas: Spreading malware Flood attack with drone Your ideas!

Amazon Echo Security Assessment Daniel Baczmaga,... your name! Ideas: Energize echo without permission Unauthorized purchases Surveillance Your ideas!

Fitbit Vulnerabilities Logan Smith… your name! Spreading malware with Fitbit Weaponizing fitbit for network attacks Your ideas?

Shodan.io Search Engine for IoT Gives information about devices (your printer needs toner!) Logs known vulnerabilities