Computer Security and Risks
Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom and Ethics –Security and Reliability
Slide 3 Computer Crime Theft by computer –Money –Goods: phone calls, software piracy, intellectual property, … –Information: company secrets, personal identities, … –Computer resources: virus, DOS attacks, …
Slide 4 Employee Theft Most electronic crimes are committed by disgruntled employees and other insiders. E.G. An employee duplicated an entire library of computerized machining instructions then took a job with a competitor.
Slide 5 Identity Theft Thieves collect personal information –Credit card –Drivers license –SIN, Passport Then use to –Access government services –Buy things
Slide 6 Identity Theft Don’t need a computer –Dumpster diving –Credit card skimming –ATM front-end –People give away information
Slide 7 Identity Theft Phishing Brand spoofing
Slide 8 Phishing
Slide 9 Protecting Yourself Beekman, p. 389
Slide 10 Software Sabotage Risks –Virus –Worm –Trojan horse –Spyware –DOS Attacks Protection
Slide 11 Virus Program code that attaches itself to a program –Operating system or application program When program executes the virus code copies itself to other programs Can destroy data
Slide 12
Slide 13 Virus Macro virus –Attach to documents virus –Attachments
Slide 14 Vaccines Antivirus software –Search for known viruses –Identify them –Remove them
Slide 15 Use Anti-virus Software –Install and update anti-virus software UofC IT anti-virus web page Free software: McAffee –ISP might provide free –Otherwise buy it (McAffee, Norton, …)
Slide 16 Virus Detection ISP mail server (UofC IT and CPSC) –Scans incoming and outgoing messages, notifies user if finds virus (strips attachments), and quarantines the message –Also filters file types:.exe,.com,.scr,.pif,.rar, and.zip –User can recover message from quarantine If you suspect: don’t open the attachment –Scan in program, or save to disk and then scan with virus detection software
Slide 17 Sober Source: Calgary Herald
Slide 18 Virus Detection From: Subject: WARNING - VIRUS (Worm.Sober.U) IN MAIL TO YOU Date: November 25, :20:55 AM MST (CA) My last Friday
*** VIRUS ALERT *** Dear user, This is an automatically generated message from the University of Calgary, Department of Computer Science (CPSC). The CPSC system has detected a piece of with a virus called: Worm.Sober.U in an addressed to you from: The Subject of this was: Mail delivery failed Delivery of the original has been stopped. A copy of the message has been placed under quarantine. Please visit the CPSC Maia Mailguard system located: to view your quarantined messages. You will be required to log into this system using your CPSC address and your CPSC Login Password. For your reference, here are some selected headers from the Date: Fri, 25 Nov :20: (MST) From: (Empty if virus is known to forge sender address) To: Subject: Mail delivery failed Received: dpwtlcd.com (S f1f983b.cg.shawcable.net [ ])
Slide 20 Worm Program that travels independently over computer networks, seeking uninfected sites Replicates and starts up thousands of processes Overloads a system
Slide 21 The Cost of Worms Nimba, Sept. 18, 2001 In 24 h infected 2.2 million computers Microsoft Windows Huge traffic disabled web and servers Damaged system files
Slide 22 Trojan Horse Program that performs a useful task while also being secretly destructive A logic bomb responds to a particular event Cannot replicate E.G. Logon Trojan horse
Slide 23 Denial of Service Attacks Web servers are sent millions of bogus requests Overloads the system Consequently they shut down Service is denied legitimate users
Spyware
Slide 25 Spyware (Adware) –Secretly sends data about our web surfing to a spy –Spy sells data to advertisers –Software unknowingly downloaded with other free software or music –Can result in pop-up ads
Slide 26 New Twist
Slide 27 SONY Source: Calgary Herald
Slide 28 Protection from Spyware Don’t –download free stuff –enter online contests Do –use antispyware software –UofC IT Antispyware PageUofC IT Antispyware Page
Slide 29 Protection from Viruses and Spyware Use anti-virus software –Update frequently Update your operating system –Automatic updates and security patches –MicrosoftMicrosoft –MacintoshMacintosh
Slide 30 Computer Security: Reducing Risks Disaster Planning –backup power –monitoring, alarms –backup of data –redundant sites or hot sites
Slide 31 Computer Security: Reducing Risks Physical Access Restrictions –something you have: key, ID card you know: password, personal information you do: signature, … About you: Biometics
Slide 32 Passwords The most common tool for restricting access to computer systems Weekness –user –sustained guessing program guesses words from online dictionaries
Slide 33 Password Guidelines Don’t use –real words –names –plurals –common expressions –reversal
Slide 34 Passwords Do –mix letters and numbers –change frequently –keep secret
Slide 35 Firewall Objective: to keep internal network secure from the outside It is a hardware device or software through which all traffic must pass Firewall LANWAN
Slide 36 Firewall Always on Internet service is a problem –use a router –see IT website for Firewall informationIT website for Firewall information