Security for Internet Every Day Use Standard Security Practices and New Threats.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
IDENTITY THEFT ARE YOU SAFE?. HOW DOES THIS HAPPEN TO ME? Internet “Security “ When using a public computer, never access any vital accounts like banking.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Protecting Your Computer & Your Information
Cyber Crimes.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
IT Security for Users By Matthew Moody.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
WEBSENSE ® SECURITY LABS™ 2006 Semi-Annual Web Security Trends Report OWASP Presentation November 9, 2006 Jim Young (301)
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
INTERNET: The Good, The Bad and The Ugly
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Computer security By Isabelle Cooper.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Take a tour around my slideshow to learn more about viruses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Travis DeBona COSC  What is Malicious Code  Types of Malicious Code  Who’s Behind It  How To Secure My Computer.
Learn how to protect yourself against common attacks
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Marcial Quinones-Cardona
Presentation transcript:

Security for Internet Every Day Use Standard Security Practices and New Threats.

Why should you be concerned about Security??

Firewalls Firewalls are Standard. No direct access. No spreading of virus and worm.

Spam filters Spam filters are 99.9% effective (sounds pretty good. DIS Hosts 20,000 users. We se trends that spike as high as 6,000,000 s a days. At 99.9% that means a possible 600 bad s can get through.) Stops most Phishing attacks Standard for just about every service

Antivirus Every computer should run AV. Stops all known threats. Make sure updates are as often as possible

Have I bored you enough with standard stuff??? So what is the new threat and…

So, how bad is it, really?

Today’s Headlines

Zeus Trojan continues reign infecting 74,000 PCs in global botnet Investigators said they discovered a 75GB cache, believed to be a hacker drop site tied to the Zeus infections. The cache contained the stolen data from more than 74,000 Zeus infected systems.

Zeus attacks: Zeus Trojan hitting banking customers hard Security experts say the customizable and readily available Zeus Trojan is stealing banking credentials to siphon money from accounts. About 1.6 million infected machines make up hundreds of Zeus botnets, which target 960 banks, Mather said. Criminals have wreaked a lot of havoc with the bank Trojan's advanced capabilities, she said, citing a case reported by the Washington Post, in which cybercriminals stole $415,000 from Bullitt County, Ky., where Zeus infected the county treasurer's computer.

Phishing, Zeus Trojan technique spreads crimeware Researchers are tracking phishing methods that steal a victim's information and spread a Trojan designed to pilfer even more data. The Zeus Trojan is available for sale as a crimeware kit for about $700.. "This means that the Rock group did not need to develop new skill-sets to write Trojan horses; they just purchased it on the open market,"

Botnet platform helps cybercriminals bid for zombie PCs: Infected PCs are sold again and again on a new platform that enables cybercriminals to buy and sell victim's machines.

Really?

No! I mean Really!!

So how does it work? How is it we get these bots on our systems with all the Security in place today?

They trick you into going to a website and it downloads and installs itself on your computer. Phishing Attacks Web advertising Drive by

Example of Phishing attack

Date: Thu, 25 Feb :59: [02/25/ :59:12 PM CST] From: Customer Support To: Subject: Confirm Order N Your Order Id: Accepted. Details Thank you. Amazon.com Customer Support

The “Details” on the is actually a Hyper-link but it does not go to amazon.com. The link actually takes you to which will download the Trojan.

Web Advertising

Facebook, Youtube and other sites advertise for some legitimate companies. Beware of things that want you to click on receiving a free iPhone, or iPod or free anything. Remember nothing is really free.

Drive by You never know you have been hit, Until it is too late.

Standard Security inefective against this Threat. Firewalls Antivirus SPAM filtering

Conclusions: Be careful Pay attention to what you are doing Do not click on s you are not expecting Be careful of the websites you are visiting