Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Lecturer: Fadwa Tlaelan
Security Risks. Introduction There are many security risks that can affect computers. How many of the following have you heard of before? We are going.
Unit 18 Data Security 1.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
Quiz Review.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
BUSINESS B1 Information Security.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Chapter 1 The need for security Computerized trend (all kind of information are in the database) Information passing through Internet.
CRIME - A crime is a wrongdoing classified by the state or Congress as a felony or misdemeanor. A crime is an offence against a public law. This word,
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Introduction to Network Security Spring Outline Introduction Attacks, services and mechanisms Security threats and attacks Security services.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
1 Introduction to Information Security Spring 2012.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Topic 5: Basic Security.
Social Engineering © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1 Lecture 1: Introduction Outline course’s focus intruder’s capabilities motivation for security worms, viruses, etc. legal and patent issues.
Computer Skills and Applications Computer Security.
Ingredients of Security
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
1 3 Computing System Fundamentals 3.7 Utility Software.
Vocabulary Cassandra Peoples. Pharming the practice of redirecting computer users from legitimate websites to fraudulent ones for the purposes of extracting.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems Design and Development Security Risks Computing Science.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Network System Security - Task 2. Russell Johnston.
Cyber security. Malicious Code Social Engineering Detect and prevent.
CYBER SECURITY...
IT Security  .
Security Fundamentals
Protect Your Computer Against Harmful Attacks!
– Communication Technology in a Changing World
Information Security & Privacy
ISNE101 Dr. Ken Cosh Week 13.
UNIT 18 Data Security 1.
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Lecture 14

Lecture’s outline

Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended receiver and should be unintelligible to all others. Authentication The receiver is sure of the sender’s identity and that an imposter has not sent the message.

Integrity The data must arrive at the receiver exactly as it was sent by the original sender. There must be no changes in transmission, either accidental or malicious. Non-repudiation: A receiver must be able to prove that a received message came from a specified sender. The sender must not be able to deny sending a message that it has, in fact, sent.

Malware a The software that is written for malicious purposes Viruses Worms Trojan Horses Spyware Keyloggers

Reproduced with permission. Please visit for more materialwww.SecurityCartoon.com

Viruses A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels.programfile

Designing A Virus Locate the first executable instruction in the target program Replace the instruction with an instruction to jump to the memory location next to the last instruction of the target system Insert the virus code for execution at the end Insert an instruction after virus code that simulates the first instruction Then jump to the second instruction of original code

Brain Virus (Pakistani Flu) 1986 Credit: The first computer virus

Virus vs. Worm

Credit: Yashar Ganjali; Propagation effect of worms Before slammer worm After slammer worm

Key-loggers and Spyware

Spoofing Attacks b where the attacker impersonates some one else spoofing URL spoofing DNS spoofing IP spoofing MAC spoofing

Spoofing (phishing) b.1

URL Spoofing (phishing) b.2

Genuine URL; Site: niit.edu.pk; directory: src; file: login.php 1

Victim.ID ************** The second-level domain is.org and not.edu; faked website 2

3 The first-level domain is.tk and not.pk; faked website Victim.ID **************

The IP address does not correspond to webmail.niit.edu.pk; faked website 4 Victim.ID **************

DNS Spoofing b.3 IP Spoofing b.4 MAC Spoofing b.5

DNS spoofing WWWWWW Tell me the IP address of WWWWWW DNS Request

WWWWWW Reply The IP address of www. niit.edu.pk is www. niit.edu.pk DNS spoofing WWWWWW DNS The IP address of is Fake NIIT site

Private network /24 MAC/ IP spoofing :aa:bb:cc:dd:ee:ff :aa:bb:cc:dd:ee:ff Malicious node A malicious node can pretend to be another node

Network-based attacks c where the attacker pretends to be something he/she/it is not Worms Denial of Service attacks

Social Engineering d Targets the weakest component of a security system---the users

Non-technical hacking

Greeting card phishing

Lottery winning phishing