Computer Security Tools.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Penetration Testing & Countermeasures Paul Fong & Cai Yu CS691 5 May 2003.
Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Free and Inexpensive Software Alternatives By Michael Gazdzik.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Vulnerability Analysis Borrowed from the CLICS group.
Microsoft Security Resources. URL’s for this talk All URL’s mentioned in this talk can be found here: All URL’s mentioned in this talk can be found here:
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
No.24 Prerawat Denvutivorkarn M.2/2. Definition: "antivirus" is protective software designed to defend your computer against malicious software. Malicious.
Security for Seniors SeniorNet Help Desk
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Client-based Application Attacks Adli Abdul Wahid Dept. of Comp. Science, IIUM
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Network Monitoring.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Google Apps and Education Jack Nieporte St James of the Valley
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Changes in Computer Security Will You Be Better Off?
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Firewalls Fighting Spyware, Viruses, and Malware Ch 5.
Security Issues Introduction.. Security All the connectivity schemes you will hear about have security implications. –4 computer security incidents in.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SECURITY ANALYSIS TOOLS FOR INFORMATION MANAGEMENT Alicia Coon.
 client  client/server network  communication hardware  extranet  firewall  hacker  Internet  intranet  local area network (LAN)  Network 
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Advancing Workplace Technologies An MCCA Workshop presented by: Ed Weber, President Weber Enterprises, Inc. in association with: East Central College.
Avast Mail Scanner When we talk about antivirus, Avast has never disappointed us. With the inclusions of latest features all the time, it is able to.
Which is better Avast Free Edition or Avast Pro Version?
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Backdoor Attacks.
Systems Security Keywords Protecting Systems
TET1 Task 1: Ethics Charles Rich 5 November, 2016.
Name Job Title Library Name
Introduction to Computer Forensics
Kennesaw State University
CIT 480: Securing Computer Systems
TexPREP Summer Camp Computer Science
Software basics on the Internet
Protect Your Computer Against Harmful Attacks!
What is Web Browsers - What is Blogs-
Information Security Session November 11, 2004
Information Security Session October 24, 2005
Information Security Session October 23, 2006
Computer Security Fundamentals
CSC 382/582: Computer Security
Cybersecurity and Cyberhygiene
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Using Software Restriction Policies
INTERNET SECURITY.
Presentation transcript:

Computer Security Tools

Tools Here is a list of potentially useful tools and utilities with which to fight the onslaught of viruses, worms, Trojan horses, and other malware. Don’t consider it in any way a complete list! There are lots of other tools out there, which you can find easily via Google, et. al. Also, I’ve tended to focus on Windows-based tools (with some mention of Unix/Linux-based tools), because most of you have Windows machines. Also, I don’t really have access to a Unix/Linux machine. 9/19/2018 Bryan J. Higgs, 2006

Resources Malware: Fighting Malicious Code, by Ed Skoudis, Lenny Zeltser, Prentice Hall PTR, 2003, ISBN: 0131014056 Counter Hack: A Step-by-Step Guide to Computer Attacks and Effective Defenses by Ed Skoudis, Prentice Hall PTR , 2001, ISBN: 0130332739 How to Break Web Software : Functional and Security Testing of Web Applications and Web Services, by Mike Andrews, James A. Whittaker, Addison-Wesley Professional, 2006, ISBN: 0321369440 The Software Vulnerability Guide (Programming Series) (Programming Series) (Paperback), by Herbert H Thompson, Scott G Chase, Charles River Media, 2005, ISBN: 1584503580 Web Security, Privacy and Commerce, 2nd Edition (Paperback), by Simson Garfinkel, O'Reilly Media, Inc., 2002, ISBN: 0596000456 Hands-On Ethical Hacking and Network Defense (Paperback), by Michael T. Simpson, Thomson Course Technology, 2005, ISBN: 0619217081 9/19/2018 Bryan J. Higgs, 2006

Use a Powerful Editor to be Able to Look at Lots of Different File Formats

The TextPad Editor http://www.textpad.com/ 9/19/2018 Bryan J. Higgs, 2006

Safer Browsing

The Mozilla Firefox Browser http://www.mozilla.com/firefox/ 9/19/2018 Bryan J. Higgs, 2006

Safer eMail

The Mozilla Thunderbird Mail Client http://www. mozilla 9/19/2018 Bryan J. Higgs, 2006

The Mozilla Thunderbird Mail Client 9/19/2018 Bryan J. Higgs, 2006

Anti-Virus Protection

AVG Anti-Virus http://free.grisoft.com/doc/2/lng/us/tpl/v5 9/19/2018 Bryan J. Higgs, 2006

Firewall

ZoneAlarm Firewall http://www. zonelabs 9/19/2018 Bryan J. Higgs, 2006

Anti-Spyware

Spybot Search & Destroy http://www.safer-networking.org/ 9/19/2018 Bryan J. Higgs, 2006

Ad-Aware http://www.lavasoft.de/software/adaware/ 9/19/2018 Bryan J. Higgs, 2006

Microsoft Windows Defender http://www. microsoft 9/19/2018 Bryan J. Higgs, 2006

SpyCatcher Express http://www. tenebril 9/19/2018 Bryan J. Higgs, 2006

Tracing HTTP and Other Protocols

The Ethereal Network Protocol Analyzer http://www.ethereal.com/ 9/19/2018 Bryan J. Higgs, 2006

The IEHttpHeaders Browser Plug-in http://www. blunck 9/19/2018 Bryan J. Higgs, 2006

The IEHttpHeaders Browser Plug-in 9/19/2018 Bryan J. Higgs, 2006

The Paros HTTP Proxy http://www.parosproxy.org/index.shtml 9/19/2018 Bryan J. Higgs, 2006

Checking the Security of Web Site SSL

SSLDigger http://www. foundstone. com/index. htm 9/19/2018 Bryan J. Higgs, 2006

SSLDigger 9/19/2018 Bryan J. Higgs, 2006

Security/Vulnerability Scanners

The Nessus Security Scanner http://www.nessus.org/ Nessus is a vulnerability scanner, originally for Unix/Linux systems. It is being ported to other systems, such as MacOS and Windows. There is a version of Nessus for Windows called NeWT. 9/19/2018 Bryan J. Higgs, 2006

NeWT http://www.tenablesecurity.com/products/newt.shtml 9/19/2018 Bryan J. Higgs, 2006

Microsoft Baseline Security Analyzer http://www. microsoft 9/19/2018 Bryan J. Higgs, 2006

Port Scanning Tools Nmap (http://www.insecure.org/nmap/) Foundstone Vision (http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/vision.htm ) Foundstone Fport (http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/fport.htm ) Foundstone Superscan (http://www.foundstone.com/index.htm?subnav=resources/navigation.htm&subcontent=/resources/proddesc/superscan.htm ) Others… 9/19/2018 Bryan J. Higgs, 2006

Foundstone Vision 9/19/2018 Bryan J. Higgs, 2006

Foundstone Superscan 9/19/2018 Bryan J. Higgs, 2006

There are lots more out there… That’s Just a Sample! There are lots more out there…