1 Security Hiroshi Toyoizumi

Slides:



Advertisements
Similar presentations
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Chapter 1  Introduction 1 Introduction Chapter 1  Introduction 2 The Cast of Characters  Alice and Bob are the good guys  Trudy is the bad guy 
Chapter 1  Introduction 1 Chapter 1: Introduction.
Chapter 1  Introduction 1 Chapter 1: Introduction “Begin at the beginning,” the King said, very gravely, “and go on till you come to the end: then stop.”
1 MIS 2000 Class 22 System Security Update: Winter 2015.
THE NEED FOR NETWORK SECURITY Thanos Hatziapostolou.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
情報科学 1 Security Hiroshi Toyoizumi Hiroshi Toyoizumi
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Department of Information Engineering1 Major Concerns in Electronic Commerce Authentication –there must be proof of identity of the parties in an electronic.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Factors to be taken into account when designing ICT Security Policies
How to Install Norton Internet Security 2005 Stephen Cooke Veronica McCall Carlos Portillo Vernita Rucker Howard Sanders.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
First of all, set your Keyboard Language. This may have changed correctly when "Time and Currency" option was selected, if not change as needed. Click.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security for Seniors SeniorNet Help Desk
Chapter 10 E-Commerce Security.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Course ILT Internet transactions and security Unit objectives Learn how to purchase goods online by using credit cards and Web-based forms Describe the.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Viruses Reality and Myth. Virus – True or False Computer viruses happen naturally. FALSE.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
SSL with New Client Authentication Takuya Yahagi, S University of Aizu Performance Evaluation Lab.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Chapter 1  Introduction 1 Chapter 1: Introduction.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
E- SAFETY GROUP MEMBERS:  MALINI A/P KUMAR  PREMA A/P PARAMASIVAN.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Encryption CS110: Computer Science and the Internet.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Computer Security and Cryptography Partha Dasgupta, Arizona State University.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Computer virus Done: Aaesha Mohammed ID: H
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
DSS Tips and Tricks A Must-Read for DSS Beginners Rev. Apr 2008.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Windows Tutorial 5 Protecting Your Computer
Unit 3 Section 6.4: Internet Security
Cyber Security By: Pratik Gandhi.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Information Security Session October 24, 2005
Introduction Security Intro 1.
Presentation transcript:

1 Security Hiroshi Toyoizumi

2 Social Engineering Your kindness may put you in danger. You as a team may put you in danger. Your reliable person may put you in danger. What can you do?

3 Malicious Mobile Codes: Viruses and Worms

4 Laroux: Excel Macro Virus

5 Current epidemics

6 Cracking Hijacking your machine. Stepping stone. Tamper with www pages. Leak of important information.

7 Scanning IP addresses

8 Detect Windows shared folder

9 How to protect cracking Anti-virus Pacth Encryption Firewalls IDS:Intrusion Detection System

10 BlackICE: An IDS

11 Secure communication using cryptography Encrypt important information. Certify the other party. Public Key Cryptography PKI : Public Key Infrustructure

12 Common key system Cryptograhpy

13 Give it a try! Cipher communication Alice Bob

14 Any problems? It is easy to eavesdropping the key on thei internet.

15 Public Key Cryptograhpy

16 Give it a try! Public key cipher communication Alice Bob

17 Any problems ? Swiching the public key. Man-in-the-middle-attack. Alice Bob

18 Digital signature

19 電子証明書は印鑑証明

20 Key with digital signature Alice Bob

21 Real cipher communication

22 Public key and digital signature

23 Certificate authority

24 e-Government

25 Topics Stop Blaming the Victims The author of Sasser Adware,Spyware Spoofing, Backdoor Personal Firewall Anti-virus Spam Intrusion Detection System Cookies, Java, Active-x Biometric

26 Role Play Cast  Ohta: Employee of Microsoft  Yamada: Employee of Takada delivery company  Employees of Waseda Hospital  Yamaguchi: accounting section  Yano: freshman in general affair

27 Scene 1: call from waseda delivery 1. Yano: Hello, this is Yano, general affair section in Waseda Hospital. 2. Yamada: Hi, this is Takada delivery calling. It seems that one of our customer wrongly faxed her address to your company. Could you fax it to us? 3. (after checking the fax machine.) 4. Yano: No, we haven’t received your fax. 5. Yamada: You may found it other place… Maybe in your accounting section? If you find it, please fax it to us at Yano: OK.

28 Scene 2: call from Microsoft 1. Ohta: Hello, this Ohta from Microsoft customer service. We found that your PC is sending too much viruses on the internet, and we received many complaints about it. Please download the anti-virus software that I will mention and install it on your PC. 2. Yano: Sure. Where can I find the software?

29 Scene 3: call from other section 1. Tahara: This is Tahara from accounting. Could you do me a favor? 2. Yamaguchi: Yes. What? 3. Thara: Our computers are all infected by viruses, but I need the address of a patient, Ryoko Hirosue. Could you call up the data on your screen and fax it to me at accounting section? 4. Yamaguchi: No problem.

30 Quiz Did you find any security problem in the role-play? Write them down. Describe the counter measures.