Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University.

Slides:



Advertisements
Similar presentations
Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
Warren Toomey North Coast TAFE Port Macquarie campus
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Online PC Safety and Security Workshop LBCC Library Gabriel Beeler, LBCC Librarian.
Chapter Nine Maintaining a Computer Part III: Malware.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
How to maintain your computer
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
eScan Total Security Suite with Cloud Security
Security for Seniors SeniorNet Help Desk
P6 - CONFIGURE THE SOFTWARE. CONFIGURE SOFTWARE Most software can be configured to suit an individual user, for example by changing the appearance of.
Cyber Patriot Training
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Protecting Your Computer & Your Information
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Keeping your computer current and trouble free Aaron Robertson.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Introducing, Installing, and Upgrading Windows 7 Lesson 7.
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
PC Maintenance How to keep your computer healthy.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Root Causes of Cyber Security Problems: Why a Community-based Approach is Needed Xinming (Simon) Ou Department of Computing and Information Sciences Kansas.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
How to Install Malwarebytes Anti- Malware Software Khushbu Shah ENG 393 May 4 th, 2010.
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
Internet Security and Your Computer Welcome to Boot Camp.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
CNIT 124: Advanced Ethical Hacking Ch 10: Client-Side Exploitation.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
NetTech Solutions Protecting the Computer Lesson 10.
By: Symone Lee Noah Smith Sydney Quesada MYP Technology Period 8/9 Mr.Ochs.
Home Computer Security Sponsored by NASA HQ ITCD Special Projects Training Presented by your Computer Training Center.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
Computer Security Keeping you and your computer safe in the digital world.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
For more information on Rouge, visit:
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
Software Applications for end-users
Risk of the Internet At Home
Connecting Remotely Winter 2014.
Presentation transcript:

Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University

Acknowledgement Most of the slides and demonstration were prepared by Professor Xinming (Simon) Ou Department of Computing and Information Sciences Kansas State University 2

We all hear of computer malware Viruses, Worms, Bots, Rootkits, Spyware, … –Malware is a computer program with malicious intent (Malicious-softWare) But how do they get onto your computer? 3

First path: You installed them! Common-sense Test 1: –You got an with the subject line: “You received a greeting card from Hallmark!”, and an attachment file “Card.jpg.exe”. –Should you open the attachment? 4

First path: You installed them! Common-sense Test 2: –You browsed to the website of company A and wanted to watch a video posted there. When you clicked the link, a window popped up which said : “In order to view this movie, you need to install the Wonderful video player provided by company A.”, and there were two buttons bellow: “Install” and “Cancel”. –Which button would you click? 5

First path: You installed them! Common-sense Test 3: –You wanted to install a free PDF printer driver found on the Web. At the beginning of the installation, a license agreement dialog popped up and there is this sentence in the agreement: “In installing this software, you agree that a browser toolbar will be installed which will collect certain usage information…”. –Do you want to agree to the EUL? 6

Key Points When you run a program, you are essentially giving out everything you can do on your computer to the program –It is like giving someone the key to your house, and wait for him to return the key to you when he is done! 7

Second Path: You are hacked! Common-sense Test 4: –You got an with the subject line: “You received a greeting card from Hallmark!”, and an attachment file “Card.jpg”. –Should you open the attachment? 8

Second Path: You are hacked! Common-sense Test 5: –In light of the death of Michael Jackson, you searched the Web for his songs. You found one at a website with a link to a music file which can be opened by your music player. –Shall you open the music file? 9

Second Path: You are hacked! Common-sense Test 6: –You went to a website, on which there is a link to something you are interested in. –Shall you click on that link? 10

Key Points You can get malware even without invoking a malicious executable file –There may be vulnerabilities in your computer’s software—operating system or applications –Software vulnerabilities can be exploited when exposed to malicious input If a vulnerable but otherwise benign program receives a malicious input, it can cause malicious code to be executed with your privilege 11

Explanation with an Example Browser (e.g. IE from Microsoft) is a program –runs on your computer when you open a page –browser may not have any malicious intent The webpage (e.g. CIS 490 home page) which you browse works as an input to IE –this is typically a.html/.htm file –this may contain the attacker’s script If your browser tries to open the above page –your computer can be compromised –the attacker can control your computer now 12

Attack Demo: A Sketch Diagram 13 Attacker’s machineVictim’s machine webserver browser listening agent bot webpage

Demonstration

Drive-by Download What you have just seen is called “drive-by download” –Your computer gets compromised while browsing the Web through a vulnerability in the browser, one of its plugins, or some other program that is invoked automatically on downloaded files A successful exploit gives an attacker full privilege on a computer, which can enable him to –change your computer’s settings –install other malicious programs –steal your personal information –use your computer to attack other computers –and many more… 15

Perhaps we shall stay at “good” websites? Provos, et al., % of the incoming search queries to Google’s search engine returned at least one malicious URL in the result page. 16

How about anti-malware software? Provos, et al.,

The difficulty of detecting malware Theoretical concern: –There can be no general mechanized process for determining what a piece of code may do Implication for us: –There is a bound on how well we can detect malicious content 18

Total #vulnerabilities reported in NVD 19

What we can do to reduce the risk Keep your firewall on Keep your software up-to-date –do not browse the web until you have updated your system Having some anti-malware system could help reduce the attack surface –but do not think you are safe and can do whatever you want Every end user needs to take part! 20

Firewall 21 What is a firewall? –a tool which can control the incoming and outgoing network connections of a computer What does it protect the computer from? –mainly remote attackers How to make the firewall ON? –this may depend on the OS –we will briefly discuss it for Windows –will briefly discuss it for Mac too

Configuring the Firewall on Windows: Part I 22

Configuring the Firewall on Windows: Part II 23

Configuring the Firewall on Mac: Part I 24

Configuring the Firewall on Mac: Part II 25

Configuring Firewall on Mac: Part III 26

Configuring Firewall on Mac: Help Center 27

Updating Software Types of software –Operating System (Windows, Mac) –Other software (e.g. Adobe Flash, Java, etc.) Why update –vendors fix recent bugs and release update How to get the update –nowadays OS updates itself (requires reboot) –other software shows the user “update request” and may require reboot –you should not delay the update 28

Windows: Managing Updates 29

Mac: Managing Updates 30

Mac: Checking the Available Updates 31

Get an Anti-virus Running You may get Trend Micro anti-virus free –from the KSU ITS website Install an antispyware tool –Windows Defender/MSE is free from Microsoft –Defender is installed by default in Windows 7 The anti-virus should regularly update itself –to get the new attack signatures from the vendor –this requires your computer to have an Internet connection It should always run in the background –also should periodically scan the whole computer 32

An Anti-virus for Windows: MSE 33

Checking the Update Status of MSE 34

Another Anti-virus: Windows Defender 35

Windows General Security Options 36

Windows: Changing the Account Password 37

Windows: User Account Control Settings 38

Mac General Security Options: Part I 39

Mac General Security Options: Part II 40

The Autorun Problem of Windows OS Another common-sense test: Say you have got a USB flash drive (a.k.a. jump/pen/thumb drive) from someone. –You are told that the media has some valuable information, music, video, e-book, etc. –Shall you hook the drive into your computer to see what the content is? Caution: Just hooking the drive can install a malware in your computer without your notice 41

How to disable the Autorun Feature You should disable Autorun in Windows XP –It can be done by updating the registry (regedit4) Microsoft has disabled Autorun in Windows 7 Mac does not have Autorun feature Reference for more information: e_protected_from_infected_usb_flash_drives 42

Summary We discussed a few computer security problems Also discussed the common countermeasures Reminder: Homework 1 is due –before the next week’s class (1 pm on Jan 31) –You can submit electronically at k-state online Next class (Jan 31) will be held in Room