1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
30/04/2015Tim S Roberts COIT13152 Operating Systems T1, 2008 Tim S Roberts.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Unit 6 Digital Literacy Study S3 Obj 2-2
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Unit 18 Data Security 1.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Quiz Review.
Viruses & Destructive Programs
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
D. Beecroft Fremont High School VIRUSES.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
30.1 Lecture 30 Security II Based on Silberschatz & Galvin’s slides And Stallings’ slides.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Malicious Software.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Malicious Programs (1) Viruses have the ability to replicate themselves Other Malicious programs may be installed by hand on a single machine. They may.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
COMPUTER VIRUSES Computer Technology.
Chap 10 Malicious Software.
Computer Security.
Chap 10 Malicious Software.
Malicious Program and Protection
Presentation transcript:

1

2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer system or network.

3 Attacks/Threats Physical Access Modification Denial of Service Invasions of Privacy

4 Physical Attacks Hardware theft File/Information Theft Information modification Software installation

5 Access Attacks Attempt to gain information that the attacker is unauthorized to see Password pilfering An attack against confidentiality Snooping Eavesdropping Interception

6 Modification Attacks An attempt to modify information an attacker is not authorized to modify An attack against information integrity Changes Insertion Deletion

7 Denial-Of-Service Attacks Deny the use of resources to legitimate users of a system Denial of access to information Denial of access to applications Denial of access to systems Denial of access to communications

8 Privacy Attacks Collection of information about you your computer configuration your computer use your surfing habits

9 Malware Trap Door Logic Bombs Trojan Horses Worms Bacteria Viruses Mobile Code

10 Malware – collection of techniques/programs that produce undesirable effects on a computer system or network Differentiate based on Needs host program Independent Replicate Don’t replicate

11 Malware Needs Host Program Independent Logic Bomb WormsBacteriaTrapdoor Trojan Horse Virus

12 Worms Programs that use network connections to spread from system to system Once active on a system can behave as another form of malware Propagates Search for other systems to infect Establish connection with remote system Copy itself to remote system and executes

13 The Great Worm Robert Morris released the most famous worm in 1988 Crashed 6000 machines on the Internet (10%) Exploited bug in fingerd program Bug in worm crashed machines which prevented the worm from spreading Estimated damage $100 million Three years probation, 400 hrs community service, $10,500 fine

14 Bacteria Programs that do not explicitly damage files Sole purpose is to replicate themselves within a system Reproduce exponentially taking up Processor capacity Memory Disk space

15 Viruses Infect other programs by modifying them First one written in 1983 by USC student Fred Cohen to demonstrate the concept Approximately 53,000 exist Modification includes copy of virus

16 How Virus are spread Peer to peer networks Via attachments Via media FTP sites Chat and instant messaging Commercial software Web surfing Illegal software

17 Types of Viruses Parasitic Traditional virus and most common Attaches itself to executable files and replicates Memory resident Lodges in memory as part of OS Infects every program that executes

18 Boot sector Infects master boot record or boot record Spreads when system boots Seldom seen anymore Stealth Designed to hide itself from detection by antivirus software

19 Polymorphic Mutates with every infection Functionally equivalent but distinctly different bit patterns Inserts superfluous instructions or interchange order of independent instructions Makes detection of signature of virus difficult Mutation engine creates random key and encrypts virus Upon execution the encrypted virus is decrypted and then run

20 Macro Viruses Make up two thirds of all viruses Platform independent Word documents are the common vehicle rather than executable code “Concept” 1995 first Word macro virus Easily spread

21 Melissa Virus March 1999 Spread in Word documents via Once opened virus would send itself to the first 50 people in Outlook address book Infected normal.dot so any file opened latter would be infected Used Visual Basic for applications Fastest spreading virus ever seen

22 Antivirus software Some of the common methods used are checksumming and signature based scanning. Now a days antivirus softwares use a method called Heuristics. Limits ability of virus to update files The common antivirus softwares available in the market are

23 Virus Detection and Prevention Tips Do not open an from an unknown, suspicious or untrustworthy source Do not open any files attached to an Turn off preview pane in client Enable macro virus protection in all your applications Beware of pirated software Don’t accept files while chatting or messaging

24 Do not download any files from strangers. Exercise caution when downloading files from the Internet. Turn on view file extensions so you can see what type of file you are downloading Save files to disk on download rather than launch application Update your anti-virus software regularly. Back up your files on a regular basis.

25 Privacy Cookies Spyware

26 Cookies A cookie is a piece of text-based information transmitted between a Web site (server) and your browser Saved on your hard drive Netscape – cookies.txt IE – separate files in cookies folder

27 Sent by Web site for future retrieval Used to maintain state Can be Persistent and have expiration date Session only Third party Transferred via HTTP Headers JavaScript Java Applications with HTML content

28 How to disable cookies in MS Internet Explorer V6 – Default

29 Spyware

30 Spyware Spyware is software/hardware that spies on what you do on your computer Often is it employs a user's Internet connection in the background (the so- called "backchannel") without their knowledge or explicit permission. Installed without the user’s knowledge with shareware/freeware

31 Spyware Capabilities Record addresses of Web pages visited Record recipient addresses of each you send Record the sender addresses of each you receive Recording the contents of each you send/receive Corporations to monitor computer usage of employees Computer crackers to capture confidential information Parents to monitor use of family computer Advertising and marketing companies to assemble marketing data to serve personalized ads to individual users Who uses SPYWARES?

32 What haven’t we covered? Security in the wireless environment Authentication systems and their vulnerabilities Operating systems configuration Network security Security Appliances privacy

33 Thank you for attending BY DWITIKRUSHNA NAYAK 24I&E/2K