 What is Computer Security  Key Components  Levels  Challenges  Attacks  Desktop Security  Why it is important  Virus/Worms/Trojans  Tips  Web.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses & Destructive Programs
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Protecting Your Computer & Your Information
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Staying Safe Online Keep your Information Secure.
IT security By Tilly Gerlack.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Topic 5: Basic Security.
Malicious Software.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
What they are and how to protect against them
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Risk of the Internet At Home
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
The Internet of Unsecure Things
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
King Saud University- College OF Applied Studies
Computer Security By: Muhammed Anwar.
Presentation transcript:

 What is Computer Security  Key Components  Levels  Challenges  Attacks  Desktop Security  Why it is important  Virus/Worms/Trojans  Tips  Web Security  Malwares: spyware, keylogger, rootkits.  Wi-Fi security.

Key concepts of security includes : CIA.  Confidentiality  Integrity  Availability

 Confidentiality – student grades  Integrity – patient information  Availability – authentication service  Authenticity – admission ticket  Non-repudiation – stock sell order

 Low: Minor damage to organizational assets, small financial loss, etc.  Moderate: Significant damage to organization.  High: Causing life threatening injuries, organizations financially crashed.

 Not simple – easy to get it wrong  Must consider potential attacks  Must decide where to deploy mechanisms  Requires regular monitoring : a process, not an event  Too often an after-thought

 Active Attacks:  Interception, monitoring.  Passive Attacks:  Man –in-the-middle, Denial of Service, Modification.

 In-secured compromised system implications  Crash  Sensitive, important data loss/leakage  Financial loss  Slow performance  Programs/Software do not work as intended  Network broadcast  Infect other systems

 Virus: A computer virus is a type of malware that propagates by inserting a copy of itself into and becoming part of another program. It spreads from one computer to another, leaving infections as it travels.  Almost all viruses are attached to an executable file, which means the virus may exist on a system but will not be active or able to spread until a user runs or opens the malicious host file or program.

 Worm: Computer worms are similar to viruses in that they replicate functional copies of themselves and can cause the same type of damage. In contrast to viruses, which require the spreading of an infected host file, worms are standalone software and do not require a host program or human help to propagate.  Trojans: It is a harmful piece of software that looks legitimate. Users are typically tricked into loading and executing it on their systems.  Trojans are also known to create back doors to give malicious users access to the system.

 Use Linux  Anti-virus: Update, Real-time Scan, Full Scan  Flash, Acrobat Reader, Java, Real Player, Quick Time needs to be updated regularly  Use Firewall  Sandbox: Sandboxie  Safe web browser  File Sharing Management  Network Connection Usage  User Account Control

 Lock screen  Avoid working in Administrator login  Beware of social engineering tricks used to steal sensitive information  services.msc to know which programs are automatically started  Be cautious regarding removable storage  Be cautious while browsing web and checking s  Peer-to-peer sharing like BitTorrent is dangerous  Password management  System password  Boot loader password

 ‘Delete’ does not permanently delete  ‘Shift + Delete’ also does not permanently delete  ‘format’ is misleading  So, shred  Sanitize browser of shared computer after use – Clear History, cache, cookies, reset browser  Sanitize your device before selling/giving for repair

 Malware: short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of executable code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.

 A small piece of software that watch web pages one visit and report that information  May allow people to record the information  Install without knowledge or by tricking  Often runs even when the program that it rides upon is not running  At the start up  Watches web activities and tracks every web site  Reports to the spyware website about the web activities done by us  Spyware website creates profile of every individual  Website delivers targeted ads to the individual

 How it hides in the system  Install at multiple locations at the hard disk  Anti-spyware if detects any such spyware; other spywares are still alive in the machine  Spyware can inject itself in some other application  Silent Spyware vs. destructive program  Hiding itself in the windows registry files

 Often installed in two parts.exe file Automatically launches as startup.dll file.exe file launches.dll file and it does most of the damage  Records all keystrokes : Keystrokes recorded may be sent to the attacker directly or saved in a file and sent at regular intervals Attacker examines the key strokes and gets necessary information

 Used by intruder to gain access to someone’s PC without being detected  Made of series of files and tools  Can be installed similar to shareware  Replace important components of OS with new software of same size, creation date etc.  Installs backdoor daemon, automatic program  Many also install keyloggers or sniffers  May also send the log of the system

 WAR DRIVERS: Common kind of intruder which looks for unprotected networks which he can break into.  They user software which makes it easy to find unprotected networks. Some use high power antennas in order to find as many networks as they can.  In business networks they target, they look for proprietary business information or be looking to do malicious damage.  When they target a home network, they might look for personal information, such as credit card numbers, or be looking to damage computers.

Wi-Fi hotspot allows people with laptops, PDAS or other devices Food restaurants, hotels and airports, free Connected to a network and vulnerable to other people ex file sharing feature Use of sniffer to capture packets of others

Evil twin hack, hacker creates a twin of existing hotspot to fool the people. (SSID) He uses special tool (hotspotter) Hotspotter will act as an access point to allow the client to authenticate and associate

 Use Encryption methods (WPA 2)  WEP: Wireless Encryption Protocol.  WPA: Wi-Fi Protected Access.  Use of Intrusion detection system. (Honeypot)  Position network antennas so signal does not reach outside the building