Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

James Harland COSC1078 Introduction to Information Technology Lecture 12 System Fundamentals James Harland
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 1 Introduction James Harland
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lecture 14: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 15 Operating Systems James Harland
Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
1 Enabling Secure Internet Access with ISA Server.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
THREATS TO MOBILE NETWORK SECURITY
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Lecture 24: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Future of IT James Harland
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
CERN’s Computer Security Challenge
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Introduction to Firewalls
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
E-Commerce & Bank Security By: Mark Reed COSC 480.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Network System Security - Task 2. Russell Johnston.
What they are and how to protect against them
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
NET 311 Information Security
Information Security Session October 24, 2005
Implementing Client Security on Windows 2000 and Windows XP Level 150
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland

Lecture 22: Internet SecurityIntro to IT Introduction to IT 1-4 Introduction, Images, Audio, Video 5-6 Computer Fundamentals Assignment 1, WebLearn Test 1 7 Review 8 Operating Systems WebLearn Test 2 9 Operating Systems Assignment 2 10 Internet 11 Internet Security WebLearn Test 3 12 Future of ITAssignment 3, Peer and Self Assessment

Lecture 22: Internet SecurityIntro to IT Overview  Questions?  Assignment 3  Internet Security  Questions?

Lecture 21: Internet SecurityIntro to IT Intro to IT Schedule WeekLecture 1Lecture 2 11Internet ProtocolsInternet Security 12Future of IT Review by request or more Future of IT 13Mock Exam Wednesday 2 nd June

Lecture 21: Internet SecurityIntro to IT Mock Exam  on Wednesday 2 rd June in  Bring your own paper, pens, etc.  Calculators allowed  Answers will be available from me when you leave Schedule:  Access to room  Reading time commences  Writing time commences  1.00 Exam concludes

Lecture 21: Internet SecurityIntro to IT Assignment 3 Review (re-) answer What is IT? questions from Tutorial 1 Identify difficult parts of the course Suggest new questions Include favourites from Assignments 1 and 2 Reflect Answer reflection questions from tutorials Research Write about a particular IT topic of your choice (5-6 paragraphs)

Lecture 21: Internet SecurityIntro to IT Internet Security password patch spam fire wall virus war driving key logger proxy wormphishing Trojan horse

Security vs access  It is always a trade-off (a balance between two competing forces)  More security means less access  More access means less security  Redundancy can be either fatal or vital  Nothing is perfect!

Freedom vs security  `Everything which is not forbidden is allowed’ -- Principle of English Law  `Everything which is not allowed is forbidden’ -- Common security principle  `Anything not mandatory is forbidden’ -- “military policy”  `Anything not forbidden is compulsory’ (??) — T.H. White (The Once and Future King)

Lecture 7: Internet SecurityIntro to IT Passwords  Should be:  Long (8 characters or more)  Not obvious or from a dictionary  Contain capitals, numerals and non- alphanumeric characters …)  Recorded securely somewhere  Transmitted in encrypted form only  Older programs such as FTP, Telnet transmit this in plaintext …

Lecture 7: Internet SecurityIntro to IT Firewalls  Device which limits internet connections  Limit network uses to only approved ones  Prevent malicious software reporting information  Prevent outside attacks  May need to have ports opened to allow applications to work  Only work on applications, not on content

Lecture 7: Internet SecurityIntro to IT Proxy servers  All internet traffic routed via proxy server  Acts as an internet gateway  Once proxy is secure, so is network  Can filter content  Can cache content  Often used with a firewall in a corporate environment

Lecture 7: Internet SecurityIntro to IT Wardriving  Driving around to find a vulnerable wireless signal  Find a wireless connection that doesn’t require a password (so add one to yours if you haven’t!)  Attack systems that use a default admin login name and password (change yours!)  Snoop on transmissions which are not encrypted (encrypt yours!)  Using a MAC address whitelist means only specified devices can connect to your router

Lecture 7: Internet SecurityIntro to IT Viruses,Worms,Trojans  Virus: self-replicating program that attaches itself to files and is spread when they are transferred  Worm: self-replicating program that pro- actively spreads itself  Trojan horse: a program that appears legitimate but is in fact malicious

Lecture 7: Internet SecurityIntro to IT Malware and Spyware  Malicious software:  Hidden mail server  Key logging (to capture passwords)  Enable machine takeover  Direct traffic to particular web sites  Analyse behaviour  Act as a proxy  …

Lecture 7: Internet SecurityIntro to IT Denial of service  Prevent network from working normally  Flood a server with ‘invalid’ inputs  Use a network of compromised machines to generate an overwhelming number of requests (Conficker?)  Such zombie machines can form a botnet, which then attack a particular server

Lecture 7: Internet SecurityIntro to IT Tricking the user  Users are often the weakest link in security  attachments containing trojan horses  ‘Phishing’  Malicious web pages  Malicious documents (macros in spreadsheets)  Account stealing (via key logging)  Scams (‘I have $10 million to import’, ‘You have just won the lottery’, …)

Lecture 7: Internet SecurityIntro to IT Protecting your system  Keep up to date with patches (Windows update, Software update)  Use a firewall  Use anti-virus software and keep it up to date  Use anti-spyware tools  Filter for spam and suspicious messages  Be aware of ‘fake alerts’

Lecture 21: Internet SecurityIntro to IT Conclusion  Work on Assignment 3  Check your software defenses!