The Dark Side of the Internet

Slides:



Advertisements
Similar presentations
Threats To A Computer Network
Advertisements

Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Definition : Computer Virus A computer program with the characteristic feature of being able to generate copies of itself, and thereby spread. Additionally.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Over 3,000 computers are affected monthly by Malware and Phishing.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Jamel Callands Austin Chaet Carson Gallimore. Downloading
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Protecting Students on the School Computer Network Enfield High School.
COOKIES and SESSIONS. COOKIES A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
COOKIES Gloria Soria Network Security COSC 356. What is a Cookie? A cookie is a piece of text that a Web Server can store on a user's hard disk. Cookies.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
KASPERSKY INTERNET SECURITY FOR ANDROID. YOUR MOBILE DEVICES NEED PROTECTION More online communications and transaction are happening on tablets and phones.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Security Risks Todays Lesson Security Risks Security Precautions
Done by… Hanoof Al-Khaldi Information Assurance
MALWARE Autumn Mattis.
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
ISNE101 Dr. Ken Cosh Week 13.
Staying safe on the internet
Chapter 10: Privacy, Security, and Ethics
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Networking for Home and Small Businesses – Chapter 8
CYBERSAFETY & Personal information
Computer Security By: Muhammed Anwar.
INFS 452 – Computer Ethics & Society
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
INTERNET SECURITY.
Presentation transcript:

The Dark Side of the Internet INFO/CSE 100, Spring 2006 Fluency in Information Technology http://www.cs.washington.edu/100 7/17/2019 fit100-21-spyware © 2006 University of Washington

Readings and References Fluency with Information Technology Chapter 17 References See web page 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington Negative Issues Spam Malware Viruses, et al. Spyware / Adware Phishing Cracking Attacks targeting network service Privacy 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington How Dangerous Is It?!? Any attacks (viruses, spyware,...) you're protected against You may not even notice... Viruses (and virus-carrying spam) that damage your files Cracking that damages your files May destroy your work... May damage your operating system and applications... Viruses that only replicate...if they don't replicate too fast May slow down your machine, annoy others... But you might get in trouble, depending on what it's used for... 7/17/2019 fit100-21-spyware © 2006 University of Washington

Denial of Service Attack A denial-of-service attack (also, DoS attack) is an attack on a computer system or network that causes a loss of service to users Results in the loss of network connectivity and services by consuming the bandwidth of the victim network or overloading the computational resources of the victim system. If they don't affect you directly May slow down your network service... If they do affect you directly May block your network service... 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington Spyware/Adware If they don't collect personal info May slow down your machine... Intrusive and disruptive to your work... If they do collect personal info Can lead to phishing 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington Spam / Phishing If you know not to respond You may not notice If you do respond An annoyance, waste of time and resources... Depends on whether you believe it... Might be psychologically hurtful... May lead to identity theft, financial loss... 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington Is The World in Danger?!? Text-only spam...that delivers lies, hate What if people believe it? act on it? Viruses that "only" replicate May be part of a "denial of service" attack... Viruses that use your computer May be spreading malware... Attacks on network service May prevent vital services from being performed... Cracking that targets utilities, hospitals, government services Could lead to anything up to loss of life... 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington Cookies Although cookies were initially implemented to facilitate shopping carts, a common use of cookies is to uniquely identify users within a web site. Cookies work in the following manner. When a person visits a cookie enabled web site, the server replies with the content and a unique identifier called a cookie, which the browser stores on the user's machine. On subsequent requests to the same web site, the browser software includes the value of the cookie with each request. Because the identifier is unique, all requests that were with the same cookie are known to be from the same browser. Since multiple people may use the same browser, each cookie may not actually represent a single user, but most web sites are willing to accept this limitation and treat each cookie as a single user. Recently, browser vendors have provided users with controls to select the cookie policy that maps to their privacy preferences. 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington A Cookie or a Session? The key difference would be cookies are stored in your hard disk whereas a session aren't stored in your hard disk. Sessions are basically like tokens, which are generated at authentication. A session is available as long as the browser is opened. Sessions are popularly used, as the there is a chance of your cookies getting blocked if the user browser security setting is set high. 7/17/2019 fit100-21-spyware © 2006 University of Washington

Collaborative Filtering Collaborative filtering (CF) is the method of making automatic predictions (filtering) about the interests of a user by collecting taste information from many users (collaborating). The underlying assumption of CF approach is that: Those who agreed in the past tend to agree again in the future. For example, a collaborative filtering or recommender system for music tastes could make predictions about which music a user should like given a partial list of that user's tastes (likes or dislikes). Amazon's recommender is an example http://www.movielens.com is another 7/17/2019 fit100-21-spyware © 2006 University of Washington

fit100-21-spyware © 2006 University of Washington How This Goes Awry? ... suzka@u.washington.edu ... VISA Credit Card # Profile: Suzi Soroczak suzka@u.washington.edu Address Phone number Credit Card # ... LL Bean ... romantic comedies ... 312 Summer Lane Seattle, WA 98195 ... 206-555-1111 7/17/2019 fit100-21-spyware © 2006 University of Washington