James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
James Tam Computer Security In this section of notes you will learn about what security threats exist and how to reduce your risk. Also privacy issues.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.
How to Protect Your PC Grayware Adware, Malware, Spyware.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Data Security.
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Protecting Students on the School Computer Network Enfield High School.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
By: Gloria Watkins.  Use antivirus software and keep it up-to-date. You should check for new definition updates daily. Most antivirus software can.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
A Quick and Easy Crash Course Internet Safety for Everyone.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Protect Your Computer Against Harmful Attacks!
Computer Security In this section of notes you will learn about what security threats exist and how to reduce your risk. Also privacy issues that are relevant.
– Communication Technology in a Changing World
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.

James Tam Test You get a file attachment in a message, which of the following people would should you accept it from and why? Someone you’ve only met on the Internet ??? A total stranger Your best friend This guy!!!

James Tam Browsers Are Leaky This stems from the origins of the web: –Sharing information among researchers –Debugging transmission problems

James Tam Some Security Issues While Browsing The Web Incorrect web site names Browser hijacking Storing financial information Saving previously entered data

James Tam Incorrect Website Names Lets buy something at Amazon Visa number: …. Fake website Visa number: ….

James Tam Browser Hijacking A program that takes over your web browser: -Changes your default home page -Changes your favorites/bookmarks in your browser -Causes a storm of pop-up windows to appear -Redirects the browser to certain web pages -Prevents the browser from reaching other pages Common sources -‘Free’ software - attachments -Drive-by downloads

James Tam Storing Financial Information Even if you enter your information at the correct web site the convenience must be balanced out vs. security concerns: Lets buy something at Amazon Visa # …

James Tam Saving Previously Entered Information Even storing information on your own computer must balance convenience against some security concerns.

James Tam Transmitting Information On The Internet Many protocols transmit packets in an unencrypted format. - -Http Indicators that a web page employs encryption Internet Explorer

James Tam Transmitting Information On The Internet (2) Indicators that a web page employs encryption (continued): Netscape General

James Tam Malware (“Malicious Software”) A program designed to infiltrate or damage a computer. Most of the references to computer viruses are actually references to malware. Categories of Malware: -Viruses -Worms -Macro Viruses -Trojans / Trojan Horses -Spyware

James Tam Viruses Similar to a biological virus The infection and the replication process may produce symptoms

James Tam Viruses (2) For early virus writers the goal was simply infiltration of a computer or network. Department of Defense Woohoo I made it in! Your PC is stoned! At most the virus would result in some minor mischief

James Tam Department of Defense Viruses (3) Some viruses were designed to be malicious or were ‘mutated’ into a malicious version. Your PC is stoned! Woohoo I made it in!

James Tam Department of Defense Viruses (3) Some viruses were designed to be malicious or were ‘mutated’ into a malicious version. Your PC is stoned! Woohoo I made it in!

James Tam Department of Defense Viruses (4) Some of the worst viruses secretly steal information. Woohoo I made it in!

James Tam Viruses (5) Require human-intervention to spread.

James Tam Worms Unlike a virus a Worm can spread without human intervention.

James Tam Macro Viruses Macros can be added to many documents. A macro virus is a malicious program that’s imbedded as a macro in a file. Macro viruses replicate through the application that’s associated with the file.

James Tam Trojans / Trojan Horse They are imbedded in a program or file that looks useful or interesting.

James Tam Protection Against These Forms Of Malware Malware discussed so far -Viruses -Worms -Macro Viruses -Trojans / Trojan Horses Use an anti-virus program: -Something is better than nothing (some are free!) -But try to get a program from an established company (better than a free version or a version produced by a smaller or less experienced company).

James Tam Spyware Secretly gathers information about your computer and computer usage and transmits this information back to the author. In some cases the process may be fairly legitimate in other cases it may be more nefarious. Spyware may also take the form of a program that is installed with another (potentially useful) program. From the software usage agreement from some company ‘X’: (From Internet Privacy for Dummies) “You hereby grant [company Y – JT: actual name removed] the right to access and use the used computing power and storage space on your computer/s and/or Internet access or bandwidth for the aggregation of content and use in distributed computing.”

James Tam Spyware (2) However some forms of spyware record and transmit highly confidential information.

James Tam Protecting Against Spyware Some anti-virus programs have begun to expand their services to protect against spyware. However there are programs that are dedicated solely with protecting against spyware.

James Tam Keystroke Loggers Record some or all of the information entered on a keyboard. They may be used for fairly legitimate purposes: -Trouble shooting errors -Monitoring and evaluating employee performance -Crime prevention A keystroke logger can be hardware or software based. Keystroke loggers can also be a form of spyware that was unknowingly installed.

James Tam Preventing/Mitigating The Effect Of Keystroke Loggers Install an anti-spyware program. Get a firewall. Minimize the typing of sensitive information with automatic form fillers: Use one-time passwords.

James Tam Preventing/Mitigating The Effect Of Keystroke Loggers (2) Use an alternative keyboard layout: Fully custom keyboard layouts can be created using tools like the Microsoft Keyboard Layout Creator.

James Tam Preventing/Mitigating The Effect Of Keystroke Loggers (3) Using low tech methods can also be fairly effective for many keystroke loggers by ‘scrambling’ the text entered or by minimizing (or avoiding altogether) the amount of text entered.

James Tam Always-On Connections Provides An Easier Target Some malicious programs constantly scan computers on the Internet for vulnerabilities (insecure connections):

James Tam Evaluating The Effectiveness Of Your Firewall Firewalls may help to secure your computer by blocking insecure connections. If you are unsure of how to configure your firewall: -Use the default or recommended configuration -Use a trusted source to evaluate the security of your firewall e.g.,

James Tam Browser Cookies Used to store information relevant to the pages that you visit. First vs. third party cookies May have 1 st party cookies May have 3 rd party cookies

James Tam Brower Cookies Session cookies -Disappear after a fixed amount of time or after a session has ended Caution: disabling all cookies may not allow many pages to be viewed properly

James Tam General Ways Of Increasing The Security Of Your Computer Install an anti-virus program from a reputable company. -Update the definitions on a regular basis. Install an anti-spyware program from a reputable company. -Update the definitions on a regular basis. Add a firewall. -Make sure that it’s properly configured. Avoid leaving your computer on all the time (you present a fixed target). Update your operating system and programs on a regular basis. -The updates not only provide bug/error fixes but may also patch up security flaws. If your computer appears to be acting abnormal then you may try scanning for suspicious processes.

James Tam You Should Now Know What are some common web-based security issues What is malware -What are some common categories of malware -How do the different forms of malware get onto your computer -How do they threaten your computer -How to protect against each of them How does an ‘always on’ Internet connection effect the security of your computer, how can these threats be reduced What is a browser cookie What are the different types of cookies and how do they differ General ways of increasing the security of your computer