Lecture 1 Page 1 CS 236, Spring 2008 Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?

Slides:



Advertisements
Similar presentations
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
How to protect yourself, your computer, and others on the internet
Thank you to IT Training at Indiana University Computer Malware.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Chapter 1.  Security Problem  Virus and Worms  Intruders  Types of Attack  Avenues of Attack 2 Prepared by Mohammed Saher Hasan.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Threats To A Computer Network
1 Securing the Net: Where the Holes Are Steven M. Bellovin AT&T Labs – Research
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
By Daniel Carroll and Jarred Givens. The internet has helped further many fields and forms of technology, including: Internet Advancements Cell Phones.
Hacker Zombie Computer Reflectors Target.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Introduction to Computer Ethics
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Lecture 1 Page 1 CS 136, Fall 2010 Introduction CS 136 Computer Security Peter Reiher September 23, 2010.
Lecture 19 Page 1 CS 236 Online 16. Account Monitoring and Control Why it’s important: –Inactive accounts are often attacker’s path into your system –Nobody’s.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Lecture 16 Page 1 CS 236 Online Web Security CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Topic 5: Basic Security.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
CS 4001Mary Jean Harrold1 Class 25 ŸComputer crime ŸAssign ŸTerm paper—due 11/20.
CyberPatriot: Introduction to Cyber Security 9/10/10 Joshua White Director of CyOON R&D Everis Inc (315)
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
Computer crimes.
INTRODUCTION & QUESTIONS.
Lecture 14 Page 1 CS 236 Online Worms Programs that seek to move from system to system –Making use of various vulnerabilities Other performs other malicious.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Cybersecurity Test Review Introduction to Digital Technology.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Botnets A collection of compromised machines
An Introduction to Phishing and Viruses
Introduction to Computer Security
Botnets A collection of compromised machines
Risk of the Internet At Home
Introduction CS 136 Computer Security Peter Reiher March 31, 2009
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Lecture 1 Page 1 CS 236, Spring 2008 Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?

Lecture 1 Page 2 CS 236, Spring 2008 Why Is Security Necessary? Because people aren’t always nice Because a lot of money is handled by computers Because a lot of important information is handled by computers Because our society is increasingly dependent on correct operation of computers

Lecture 1 Page 3 CS 236, Spring 2008 History of the Security Problem In the beginning, there was no computer security problem Later, there was a problem, but nobody cared Now, there’s a big problem and people care –Only a matter of time before a real disaster –At least one company went out of business due to a DDoS attack –Identity theft and phishing claim vast number of victims –A cyberattack released a large quantity of sewage in Australia –Recent video showed cyberattack causing an electric transformer to fail –Increased industry spending on cybersecurity

Lecture 1 Page 4 CS 236, Spring 2008 Some Examples of Large Scale Security Problems The Internet Worm Modern malicious code attacks Distributed denial of service attacks Vulnerabilities in commonly used systems

Lecture 1 Page 5 CS 236, Spring 2008 The Internet Worm Launched in 1988 A program that spread over the Internet to many sites Around 6,000 sites were shut down to get rid of it And (apparently) its damage was largely unintentional The holes it used have been closed –But the basic idea still works

Lecture 1 Page 6 CS 236, Spring 2008 Malicious Code Attacks Multiple new viruses, worms, and Trojan horses appear every week Storm worm continues to compromise large numbers of computers IM attacks becoming increasingly popular –And cell phone attacks appearing

Lecture 1 Page 7 CS 236, Spring 2008 Distributed Denial of Service Attacks Use large number of compromised machines to attack one target –By exploiting vulnerabilities –Or just generating lots of traffic Very common today Attacks are increasing in sophistication In general form, an extremely hard problem

Lecture 1 Page 8 CS 236, Spring 2008 The (first) DNS DDoS Attack Attack on the 13 root servers of the DNS system Ping flood on all servers Interrupted service from 9 of the 13 But did not interrupt DNS service in any noticeable way A smaller attack on DNS more recently –Even less successful

Lecture 1 Page 9 CS 236, Spring 2008 Vulnerabilities in Commonly Used Systems WEP is fatally flawed Vulnerabilities pop up regularly in Windows, Linux, and Apple systems –Microsoft releases patches once per month, usually including OS security patches Many popular applications have had vulnerabilities –E.g., Adobe Flash, RealPlayer, Firefox, Quicktime, Skype, Lotus Notes, many others Many security systems have had vulnerabilities –Within last year, Kerberos, BitDefender Online Scanner, Cisco Security Agent, many others

Lecture 1 Page 10 CS 236, Spring 2008 Electronic Commerce Attacks As Willie Sutton said when asked why he robbed banks, –“Because that’s where the money is” Increasingly, the money is on the Internet Criminals have followed Common problems: –Credit card number theft (often via phishing) –Identity theft (phishing, again, is a common method) –Loss of valuable data from laptop theft –Manipulation of e-commerce sites –Extortion via DDoS attacks or threatened release of confidential data

Lecture 1 Page 11 CS 236, Spring 2008 Another New Form of Cyberattack Click fraud Based on popular pay-per-click model of Internet advertising Two common forms: –Rivals make you pay for “false clicks” –Profit sharers “steal” or generator bogus clicks to drive up profits

Lecture 1 Page 12 CS 236, Spring 2008 Some Recent Statistics From Computer Security Institute Computer Crime and Security Survey, % of respondents reported a security incident in last year Total estimated losses by respondents: $66 million –1/3 from financial fraud –Also big losses from worms, spyware, outsider penetration 1

Lecture 1 Page 13 CS 236, Spring 2008 How Much Attack Activity Is There? Blackhole monitoring on a small (8 node) network 1 Detected 640 billion attack attempts over four month period At peak of Nimda worm’s attack, 2000 worm probes per second 1 Unpublished research numbers from Farnham Jahanian, U. of Michigan, DARPA FTN PI meeting, January 2002.

Lecture 1 Page 14 CS 236, Spring 2008 Cyberwarfare Nation states already developing capabilities to use computer networks for such purposes DDoS attack on Estonia Continuous cyberspying by many nations Concerns about national vulnerabilities of critical infrastructure –Many utilities are now connected to the Internet

Lecture 1 Page 15 CS 236, Spring 2008 Something Else to Worry About Are some of the attempts to deal with cybersecurity damaging liberty? Does data mining for terrorists and criminals pose a threat to ordinary people? Are we in danger of losing all privacy?

Lecture 1 Page 16 CS 236, Spring 2008 But Do We Really Need Computer Security? The preceding examples suggest we must have it Yet many computers are highly insecure Why? Ultimately, because many people don’t think they need security –Or don’t understand what they need to do to get it

Lecture 1 Page 17 CS 236, Spring 2008 Why Aren’t All Computer Systems Secure? Partly due to hard technical problems But also due to cost/benefit issues Security costs Security usually only pays off when there’s trouble Many users perceive no personal threat to themselves –“I don’t have anything valuable on my computer” Ignorance also plays a role –Increasing numbers of users are unsophisticated

Lecture 1 Page 18 CS 236, Spring 2008 Computer Security and History Much of our computer infrastructure is constrained by legacy issues –Core Internet design –Popular programming languages –Commercial operating systems All developed before security was a concern –Generally with little or no attention to security

Lecture 1 Page 19 CS 236, Spring 2008 Retrofitting Security Since security not built into these systems, we try to add it later Retrofitting security is known to be a bad idea Much easier to design in from beginning Patching security problems has a pretty dismal history

Lecture 1 Page 20 CS 236, Spring 2008 Problems With Patching Usually done under pressure –So generally quick and dirty Tends to deal with obvious and immediate problem –Not with underlying cause Hard (sometimes impossible) to get patch to everyone Since it’s not organic security, patches sometimes introduce new security problems

Lecture 1 Page 21 CS 236, Spring 2008 Speed Is Increasingly Killing Us Attacks are developed more quickly –Often easier to adapt attack than defense to counter it Malware spreads faster –Slammer infected 75,000 nodes in 30 minutes More attackers generating more attacks –Over 38,000 new phishing scams last September

Lecture 1 Page 22 CS 236, Spring 2008 Well, What About Tomorrow? Will security become more important? Yes! Why? –More money on the network –More sophisticated criminals –More leverage from computer attacks –More complex systems