Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses, Worms, Zombies, and other Beasties COS 116: 4/10/2008 Sanjeev Arora.
Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2012 Adam Finkelstein.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
The Internet = A World of Opportunities
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2011 Sanjeev Arora (based on lecture by Alex Halderman)
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Types of Electronic Infection
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Introduction to Computer Security PA Turnpike Commission.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
What is Spam? d min.
Computer Skills and Applications Computer Security.
NetTech Solutions Protecting the Computer Lesson 10.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Computer and Network Security Rabie A. Ramadan Lecture 4.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Protect Your Computer Against Harmful Attacks!
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Computer Basics Rabie A. Ramadan, PhD 6.
Computer Security.
Viruses, Worms, Zombies, and other Beasties
Presentation transcript:

Computer Basics Rabie A. Ramadan, PhD 6

Viruses, Worms, Zombies, and others 2

What is Computer Security? 3

Computer Security is the protection of computing systems and the data that they store or access 4

Why is Computer Security Important? Computer Security allows the University to carry out its mission by: Enabling people to carry out their jobs, education, and research. Supporting critical business processes Protecting personal and sensitive information 5

Why do I need to learn about Computer Security? Isn’t this just an IT Problem? 6

Good Security Standards follow the “90 / 10” Rule: 10% of security safeguards are technical 90% of security safeguards rely on the computer user (“YOU”) to adhere to good computing practices 7

What Does This Mean for Me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is everyone’s responsibility 8

What’s at Stake? Kinds of damage caused by insecurity Nuisance: spam, … Data erased, corrupted, or held hostage Valuable information stolen (credit card numbers, trade secrets, etc.) Services made unavailable ( and web site outages, lost business) 9

Breaking into a Computer 10

Breaking into a Computer What? Run unauthorized software How? Trick the user into running bad software (“social engineering”) Exploit software bugs to run bad software without the user’s help 11

Example of “social engineering”: Trojan Horse 12 CoolScreenSaver.exe

Viruses and Worms Automated ways of breaking in; Use self-replicating programs (Recall self-replicating programs: Print the following line twice, the second time in quotes. “Print the following line twice, the second time in quotes.” ) 13

Computer Viruses Self-replicating programs that spread by infecting other programs or data files Must fool users into opening the infected file 14 Payload Cool Screen Saver NotepadSolitairePaint Payload

Viruses Infected program, screen saver, or Word document launches virus when opened Use social engineering to entice you to open the virus attachment Self-spreading: after you open it, automatically s copies to everyone in your address book Other forms of social engineering: downloadable software/games, P2P software, etc. 15

The Melissa Virus (1999) Social engineering: says attachment contains porn site passwords Self-spreading: Random 50 people from address book Traffic forced shutdown of many servers $80 million damage 20 months and $5000 fine 16 David L. Smith Aberdeen, NJ

Computer Worms Self-replicating programs like viruses, except exploit security holes in OS (e.g., bugs in networking software) to spread on their own without human intervention 17 Payload

18 First Internet worm Created by student at Cornell Exploited holes in servers, other programs Infected ~10% of the net Spawned multiple copies, crippling infected servers Sentenced to 3 years probation, $10,000 fine, 400 hours community service Robert Tappan Morris

“Can we just develop software to detect a virus/worm?” 19 [Adleman’88] This task is undecidable. (so no software can work with 100% guarantee) No real guarantee Current methods: (i) Look for snippets of known virus programs on harddrive (ii) maintain log of activities such as network requests, read/writes to hard-drive and look for “suspicious” trends (iii) look for changes to OS code.

Spyware/Adware 20 Hidden but not self-replicating Tracks web activity for marketing, shows popup ads, etc. Usually written by businesses: Legal gray area

Zombies 21 Bot Bot program runs silently in the background, awaiting instructions from the attacker Attacker’s Program

Can we stop computer crime? 22 Probably not! Wild West nature of the Internet Software will always have bugs Rapid exponential spread of attacks But we can take steps to reduce risks…

Protecting Your Computer 23 Six easy things you can do… Keep your software up-to-date Use safe programs to surf the ‘net Run anti-virus and anti-spyware regularly Add an external firewall Back up your data Learn to be “street smart” online

Keep Software Up-to-Date

Use Safe Software to Go Online Firefox (web browser) Thunderbird ( )

Anti-virus / Anti-spyware Scans Symantec Antivirus (Free from OIT) Spybot Search & Destroy (Free download)

Add an External Firewall Provides layered security (think: castle walls, moat) (Recent operating systems have built-in firewall features)

Back Up Your Data Tivoli Storage Manager (Free from OIT)

Learn Online “Street Smarts” Be aware of your surroundings Is the web site being spoofed? Don’t accept candy from strangers How do you know an attachment or download isn’t a virus, Trojan, or spyware? Don’t believe everything you read may contain viruses or phishing attack – remember, bad guys can forge from your friends

Quiz: A hacked computer can be used to… (select all that apply) Send spam and phishing s. Harvest and sell addresses and passwords. Illegally distribute music, movies and software. Distribute child pornography. Infect other systems. Hide programs that launch attacks on other computers. Record keystrokes and steal passwords. Access restricted or personal information on your computer or other systems that you have access to. Generate large volumes of traffic, slowing down the entire system 30

Next time is an exam 31