Week 7 - Wednesday CS363.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Cyber Stalking Cyber Stalking Phishing Hacker 1. Never reveal your home address !!! This rule is especially important for women who are business professionals.
Threats To A Computer Network
Quiz Review.
How It Applies In A Virtual World
Threats to I.T Internet security By Cameron Mundy.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Internet Safety By Stephanie Jarrard. What is the Internet?  “Internet” is a shortened name for “Interconnected networks”  The internet is a global.
Cyber Crimes.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
Profile Support Team Setting Up Your Staff User Account on Profile e-portfolio Click to progress through this tutorial.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Saphe surfing! 1 SAPHE Secure Anti-Phishing Environment Presented by Uri Sternfeld.
What is Spam? d min.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Cybersecurity Test Review Introduction to Digital Technology.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Any criminal action perpetrated primarily through the use of a computer.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Cyber Security and Computer Safety
Internet Safety.
Safety.
An Introduction to Phishing and Viruses
Done by… Hanoof Al-Khaldi Information Assurance
Malware and Computer Maintenance
PHISHING Hi, The comms team asked if I could refresh everyone about Phishing after a fairly successful phishing circulated last week that led to.
IT Security  .
Unit 4 IT Security.
How to use the internet safely and How to protect my personal data?
How to use the internet safely and How to protect my personal data?
I S P S loss Prevention.
Conveying Trust Serge Egelman.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Computer Security Elaine Munn Introduction to Computer Security.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Malware, Phishing and Network Policies
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Introduction to From the Saint Paul Public Library.
Cyber Security and Computer Safety
Introduction to Computers
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
9 ways to avoid viruses and spyware
Faculty of Science IT Department By Raz Dara MA.
Security Hardening through Awareness August 2018
Unit 4 IT Security Kerris Davies.
King Saud University- College OF Applied Studies
CYBERSAFETY & Personal information
Internet Safety – Social Media
Computer Security By: Muhammed Anwar.
Unit 1.6 Systems security Lesson 1
Introduction-Cyber Safety
Cybersecurity Simplified: Phishing
Presentation transcript:

Week 7 - Wednesday CS363

Last time Secure design principles Testing Secure coding practices

Questions?

Project 2

Tyler Latshaw Presents

Web Security – User Side

Browser security issues Browsers are how most of the world interacts with the Internet There are lots of problems when trying to maintain security: Browsers often connect to more than just the URL listed in the address bar Fetching a page automatically fetches lots of other data If the browser is corrupted, you have no protection Most browsers support plug-ins, which can be malicious or badly implemented Browsers can access data on the user computer The user does not know what data the browser is sending

Browser attacks The goal of an attack on a browser may be to get sensitive information or to install software on the user machine Approaches for attacking a browser: Attack the OS Attack the browser itself or its plug-ins Intercept communication to or from the browser

Man-in-the-Browser The browser controls all the interactions with the world wide web If your browser has been compromised, it doesn't matter how good your encryption is The browser sees all the data before it is encrypted SilentBanker is an example of a plug-in that stole bank information The banking websites still worked!

Keystroke logging It’s possible to install software that logs all the keystrokes a user enters If designed correctly, these values come from the keyboard drivers, so all data (including passwords) is visible Browser interaction is a great target for keystroke logging There are also hardware keystroke loggers Many are $40 or less Is your keyboard free from a logger?

Page-in-the-middle A page-in-the-middle attack is one in which you are redirected to a page that looks like the one you wanted For example, a copy of your banking website Such a page might be arrived at because of a phishing link or DNS cache poisoning A browser-in-the-middle attack is worse, since your browser is compromised and no websites can be trusted

Program download substitution A page could trick you into downloading a file that appears to be an application you want In reality, it's a virus, Trojan horse, or other malware How do you know what you're downloading? Often, there's no way to be sure

CAPTCHAs You're all familiar with CAPTCHAs by now: The name is an acronym for Completely Automated Public Turing test to tell Computers and Humans Apart They are used primarily to stop bots from doing things like signing up for free e-mail accounts to use for spam

User-in-the-middle A user-in-the-middle attack tricks an unsuspecting user to do something only a human can do, like solve a CAPTCHA Spam and porn companies often have the same owners People get offers for free porn in their e-mail, provided that they fill out a CAPTCHA This attack is not very damaging to the individual, but it wastes time and fills the world with more spam

Browser authentication issues We've already talked about how people authenticate One of the problems here is that computers are failing to authenticate You're not sure that the site you're connecting to is really your bank The problem is hard because computers authenticate based almost entirely on what they know It's possible to eavesdrop on such information Some banks let you to pick a picture and a caption GOAT POLITICS

Authentication approaches Web authentication can be done with approaches beyond or in addition to a password Shared secret Secret questions asked earlier One-time password Password provided by a SecurID Out-of-band communication Sending a PIN and a credit card in separate mailings Texting a one-time password to a registered cell phone

Quiz

Upcoming

Next time… Obtaining user or website data E-mail attacks OS background

Reminders Read sections 4.3, 4.4, and 5.1 Start on Project 2