Level 2 Diploma Unit 11 IT Security

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber Crimes.
Viruses.
Unit 2 - Hardware Computer Security.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT Security for Users By Matthew Moody.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Topic 5: Basic Security.
Malicious Software.
Understand Malware LESSON Security Fundamentals.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Risks Todays Lesson Security Risks Security Precautions
Computer safety Filip Hruby.
Viruses & Destructive Programs
An Introduction to Phishing and Viruses
Three Things About Malware
Malware and Computer Maintenance
Computer Virus’s.
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
COMPUTER VIRUSES Computer Technology.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Level 2 Diploma Unit 11 IT Security
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Technology Notes 5
Computer Applications Unit B
Risk of the Internet At Home
Malware, Phishing and Network Policies
Viruses and Virus Protection
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
WJEC GCSE Computer Science
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Level 2 Diploma Unit 11 IT Security Threats to security (2) Level 2 Diploma Unit 11 IT Security

Categories of threats Covered last week This week Weak external security Unauthorised uses Unauthorised removal or copying This week Malware Theft or loss Poor folder and file permissions

What is malware? Malware - short for malicious software a variety of forms of hostile, intrusive, or annoying software or program code Virus Worm Trojan horse Rootkit Backdoor Spyware Botnet Keystroke logger Dialer Adware

Purpose of malware Started as experiments or pranks, such as the Melissa virus  Then changed to destroy files on a hard disk Worms vandalised web pages Originally spread on diskettes or in Word documents

Melissa Virus Released 26th March 1999 Used stolen e-mail address Caused $80 million dollars damage E-mailed itself to 1st fifty addresses ‘Outlook’ with attachment such as list.doc Looked like e-mail from known associate Opened document infected normal.dot template

Melissa virus Sent document from your pc – data security breach, damage to trust, e-mail delays, cost of removal When the day number equals the number of minutes in the current time (e.g., at 11:06 on the 6th day of the month), the Melissa virus inserted the following text in whatever document was then being edited in Word on the victim's computer: Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game's over. I'm outta here.

Purpose of malware Given Internet access, malicious software is now designed for a profit take control of users' computers for black- market exploitation Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography engage in distributed denial-of-service attacks as a form of extortion

Purpose of malware Spyware programs monitor a users' web browsing display unsolicited advertisements redirect money or advertising revenue to the spyware creator Spyware programs do not spread like viruses they are installed by exploiting security holes or are packaged with user-installed software, such as peer-to-peer applications

Research Task Give a definition and example of one of the following: Virus Worm Trojan horse Rootkit Backdoor Spyware Botnet Keystroke logger Dialler Adware Phishing

Virus or worm Virus Worm a program that has infected some executable software and, when run, causes the virus to spread to other executables. Viruses may contain a payload that performs other actions, often malicious. A virus requires a user to trigger it spreading Worm a program that actively transmits itself over a network to infect other computers. It may carry a payload It does not require a user to do anything

Trojan horses Concealment helps get the malware installed When a malicious program is disguised as something innocuous or desirable, users may be tempted to install it without knowing what it does. Typical e-mail subject: "This is The Free Download Sex Movies, you can find it Here" This is the technique of the Trojan horse or Trojan.

Trojan examples Torpig affects Windows, turning off anti-virus applications. allows access to the computer modifies data steals confidential information (such as user passwords and other sensitive data) installs more malware on the victim's computer has stolen the details of about 500,000 online bank accounts and credit and debit cards

Rootkit Once malware is installed, it needs to remain concealed A rootkit: Modifies the operating system kernel Makes itself invisible in the task and process lists May use the name of legitimate files Makes its own files unreadable Can run copies of itself and restart them if they are stopped

Backdoors A backdoor is a method of bypassing normal authentication malware can install one or more backdoors allows easier access in the future for Installation of more malware Collecting saved key logger data Triggering spam attacks

Spyware Spyware collects small pieces of information about users without their knowledge Spyware programs can collect Internet surfing habits collect sites that have been visited install additional software redirect Web browsers change computer settings, resulting in slow connection speeds different home pages

Botnet a collection of compromised computers (called zombie computers) installed via worms, Trojans or backdoors remotely controlled botnets are rented out to send out spam messages perform denial of service attacks billions of messages can be created per day 

Key stroke loggers Hardware Software Connected between keyboard and PC Can be wirelessly interrogated Software Malware based Captures passwords, form submissions, clipboard, screen shots Transmit data to web sites, e-mail or wireless

Dialler diallers connect non-broadband PCs fraudulent diallers connect to premium-rate numbers some diallers promise special content, such as: software for download (usually illegal)  trojans posing as MP3s trojans posing as pornography, programs such as cracks and keygens

Adware Software which automatically plays, displays, or downloads advertisements to a computer Some adware can be classified as spyware e.g. BonziBUDDY corrupted many of the user's system files displayed obscene advertisements logged browsing details and sent them to various third parties

Loss or theft Devices and data which are easily lost or stolen Laptops Mobile phones USB drives and smart cards (flash memory) CDs and DVDs

Software errors Failing to apply security patches Automatic update turned off Especially important for Operating systems Browsers

Poorly written software complexity increases the probability of operating system design flaws default permissions grant every program and every user full access to the entire system exploitable bugs in a software program unchecked user input can allow unintended direct execution of commands or SQL statements

Folder and file permissions To complete task 1 of your assignment you need to do some research.   Go to : http://www.freeopenbook.com/win-xp-toolkit/32ch04d.htm (for this step only) Access the Word document on Wiki, lesson 3

Tasks (criteria P1, M1 and D1) You have been put in charge of the security of the computing department’s IT systems You have been asked to write a report Describe the potential security threats that might damage the system and compromise its data (P1) Evaluate which of these threats are the most likely to occur and give your reasons (M1) Explain what the impact of these threats would be on the users of the system (D1)