Chapter 4 Hackers: How they get into Computers. Synopsis (I) What is a hacker? What is a cracker and what is the difference? Who are the crackers? What.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security+ Guide to Network Security Fundamentals
Intrusion Detection Systems and Practices
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Firewalls As Presented by Brian Dunn. Definition General Protects computer(s) from unauthorized access Types Hardware devices Software programs.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
How to maintain your computer
Securing Information Systems
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
BUSINESS B1 Information Security.
C8- Securing Information Systems
Honeypot and Intrusion Detection System
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
13-1 Copyright © 2013 Pearson Education, Inc. publishing as Prentice Hall Chapter 13 Information Technology for Business.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Important of Firewall Security in LAN Presented by: Guo Chean Ooi.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Securing Information Systems
Mark Ryan Professor of Computer Security 25 November 2009
IT Security  .
Instructor Materials Chapter 7 Network Security
EN Lecture Notes Spring 2016
Firewalls.
Securing Information Systems
Security in Networking
Digital Pacman: Firewall Edition
Fire-wall.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Presentation transcript:

Chapter 4 Hackers: How they get into Computers

Synopsis (I) What is a hacker? What is a cracker and what is the difference? Who are the crackers? What damage can crackers do? Typical cracker targets Cracker Motivations Cracker tools

Synopsis (II) Firewalls Software Firewalls Hardware Firewalls How to detect a cracker attack How to fix a cracker attack Ten minute fixes

What is a hacker, what is a cracker and what is the difference? Hacker has different meanings depending on who uses it. It had different traditional meanings, see Among programmers, it is a sign of pride. However, some (specially MIT hackers) have “crossed over”, giving the term a negative connotation. Still, some people prefer to use the term “cracker” for the bad kind, “hacker” for the ingenious kind, but the distinction is murky, at best.

Who are the crackers? Hackers are geeks. Hackers and crackers are highly intelligent social misfits who have a strong curiosity, and an anarchistic/anti-authoritarian bent. The belief among hackers that information should be free is widespread. Two kinds of crackers: people developing tools and script-kiddies.

What damage can crackers do? Vandalism Hacktivism Theft of of intellectual or proprietary technology or information. Hijacking Computers Identity theft Cyber-terrorism

Typical cracker targets Corporate networks Web servers/web sites Personal computers: can be used fo:  DOS attacks  Spam ing  Storage

Cracker Motivations The thrill of it. Economic Some have a political or social agenda

Cracker tools Trojan horse Virus Worm Vulnerability scanner Sniffer Social Engineering Rootkits Software exploits

Synopsis (II) (defenses) Firewalls Software Firewalls Hardware Firewalls How to detect a cracker attack How to fix a cracker attack Ten minute fixes

Firewalls Like an electronic wall customs inspector that only allows some information through.  Usually determined by “port number” (loosely related to addressed program, but sometimes more information is used). Two kinds of firewalls:  Software  Hardware

Software Firewalls Ideally  Easy to configure  Frugal with system resources  Doesn't bug you too much Windows Firewall Third Party Firewalls Mac and Linux Firewall

The Windows Firewall Invisible Silent Will only tell you if an unrecognized program tries to access the internet (on Vista, W7) Doesn't slow down the system But:  Outbound traffic not examined  Only minimally configurable (unless you are an alpha geek)

Third Party Firewalls Two way filtering Intuitive advice Custom alert levels Stealth mode Threat management (inspect for malware) Recommendations  PC Tools Firewall Plus  Zonealarm:  Comodo: download.htmhttp://personalfirewall.comodo.com/free- download.htm

Hardware Firewalls Advantages:  Fire and forget  Included in the price and functionality of your router  Have no impact on your computer Use NAT.  Stateful inspection

How to detect a cracker attack Appearance of strange data Your computer may start sending large volumes of data or spam You may be ID thieved.

How to fix a cracker attack The only real fix is a re-install

Ten minute fixes Deep search and destroy. Turn on logs Turn on firewalls.