Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
Lecture 20: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 20 Internet James Harland
Thank you to IT Training at Indiana University Computer Malware.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
(4.4) Internet Protocols Layered approach to Internet Software 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Lecture 19: Internet Intro to IT COSC1078 Introduction to Information Technology Lecture 19 Internet James Harland
Lecture 1: IntroductionIntro to IT COSC1078 Introduction to Information Technology Lecture 2 Overview James Harland
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lecture 24: Review Intro to IT COSC1078 Introduction to Information Technology Lecture 24 Review James Harland
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
1 Enabling Secure Internet Access with ISA Server.
Securing Your Home Computer Presenter: Donnie Green Date: February 11, 2009 National Aeronautics and Space Administration
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Lecture 23: Future of IT Intro to IT COSC1078 Introduction to Information Technology Lecture 23 Future of IT James Harland
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Copyright © 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 4: Networking and the Internet Computer Science: An Overview Tenth.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Internet Security facilities for secure communication.
Lecture 17: Operating Systems Intro to IT COSC1078 Introduction to Information Technology Lecture 17 Memory and Deadlock James Harland
Chapter 4 Networking and the Internet © 2007 Pearson Addison-Wesley. All rights reserved.
Common Cyber Defenses Tom Chothia Computer Security, Lecture 18.
Chapter 4 Networking and the Internet. © 2005 Pearson Addison-Wesley. All rights reserved 4-2 Chapter 4: Networking and the Internet 4.1 Network Fundamentals.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Types of Electronic Infection
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Revision Lecture Intro to IT COSC1078 Introduction to Information Technology Extra Lecture Review James Harland
The Internet Lecture 16 CSCI 1405, CSCI 1301 Introduction to Computer Science Fall 2009.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
E-Commerce & Bank Security By: Mark Reed COSC 480.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Instructor Materials Chapter 7 Network Security
Security in Networking
Risk of the Internet At Home
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Lecture 21: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 21 Internet Security James Harland

Lecture 20: InternetIntro to IT Introduction to IT 1 Introduction 2 Images 3 Audio 4 Video WebLearnTest 1 5 Binary Representation Assignment 1 6 Data Storage 7 Machine Processing 8 Operating Systems WebLearn Test 2 9 Processes Assignment 2 10 Internet 11 Internet Security WebLearn Test 3 12 Future of ITAssignment 3, Peer and Self Assessment

Lecture 21: Internet SecurityIntro to IT Overview  Questions?  Assignment 3  Peer and Self Assessment  Internet Security  Questions?

Lecture 21: Internet SecurityIntro to IT Assignment 3  Reflect Answer reflection questions from tutorials See last lecture for ideas  Research Write about a particular IT topic of your choice (5- 6 paragraphs) electronic voting, information security, 3D user interfaces, digital music, digital video, electronic commerce, natural language processing, DNA computing, quantum computing, cryptography, malware detection and removal, Moore's Law, green computing, …

Lecture 21: Internet SecuritySE Fundamentals Self and Peer Assessment  How well has each person contributed to the group?  Evaluated over the entire semester  Assessed on process, not product  Work out a grade for each person (CR, DI etc)  Then convert this to a mark out of 20  Submit list of marks to tutor with justifications  Repeat previous step until the tutor is satisfied  See guidelines in Blackboard material

Lecture 19: Internet: ImagesIntro to IT Internet Lisa? Hi Dad! Listen! Lisa? Hi Dad! Listen!

Lecture 21: Internet SecurityIntro to IT Internet Structure Application Transport Network Link Network Link Mordor sucks! 2 dor1 Mor 3 suc4 ks! dor1 Mor 3 suc4 ks! Mordor sucks!

Lecture 21: Internet SecurityIntro to IT Internet Structure 1 Mor 1 6 6

Lecture 21: Internet SecurityIntro to IT Internet addresses  Unique 32-bit identifier (up to 4,294,967,296)  Soon to become 128-bit identifier  Managed by Internet Corporation for Assigned Names and Numbers (ICANN)  ISPs get “blocks” of addresses  32-bit string represented as N 1.N 2.N 3.N 4 where N i is in the range  means

Lecture 21: Internet SecurityIntro to IT Internet addresses  Dotted decimal notation is still not very kind to humans …  -> ??.??.??.??  Translation done by name servers which look up the Domain Name System (DNS)  Domains such as rmit.edu.au can be structured by the domain owner (eg goanna.cs.rmit.edu.au)

Lecture 21: InternetIntro to IT IPv4 vs IPv6  Internet Protocol version 4 (used since 1981)  32-bit addresses  Can handle “only’’ 4,294,967,296 unique addresses  Exhausted in February 2011  IPv6 uses 128-bits addresses  IPv6 can handle “only” 3.4×10 38 addresses  IPv5 didn’t change the IPv4 address space and wasn’t successful for other reasons …

Lecture 21: Internet SecurityIntro to IT Internet Security password patch spam fire wall virus war driving key logger proxy wormphishing Trojan horse

Security vs access  It is always a trade-off (a balance between two competing forces)  More security means less access  More access means less security  Redundancy can be either fatal or vital  Nothing is perfect!

Freedom vs security  `Everything which is not forbidden is allowed’ -- Principle of English Law  `Everything which is not allowed is forbidden’ -- Common security principle  `Anything not mandatory is forbidden’ -- “military policy”  `Anything not forbidden is compulsory’ (??) — T.H. White (The Once and Future King)

Lecture 21: Internet SecurityIntro to IT Passwords  Should be:  Long (8 characters or more)  Not obvious or from a dictionary  Contain capitals, numerals and non- alphanumeric characters …)  Recorded securely somewhere  Transmitted in encrypted form only  Older programs such as FTP, Telnet transmit this in plaintext …

Lecture 21: Internet SecurityIntro to IT Firewalls  Device which limits internet connections  Limit network uses to only approved ones  Prevent malicious software reporting information  Prevent outside attacks  May need to have ports opened to allow applications to work  Only work on applications, not on content

Lecture 21: Internet SecurityIntro to IT Proxy servers  All internet traffic routed via proxy server  Acts as an internet gateway  Once proxy is secure, so is network  Can filter content  Can cache content  Often used with a firewall in a corporate environment

Lecture 21: Internet SecurityIntro to IT Wardriving  Driving around to find a vulnerable wireless signal  Find a wireless connection that doesn’t require a password (so add one to yours if you haven’t!)  Attack systems that use a default admin login name and password (change yours!)  Snoop on transmissions which are not encrypted (encrypt yours!)  Using a MAC address whitelist means only specified devices can connect to your router

Lecture 21: Internet SecurityIntro to IT Viruses,Worms,Trojans  Virus: self-replicating program that attaches itself to files and is spread when they are transferred  Worm: self-replicating program that pro- actively spreads itself  Trojan horse: a program that appears legitimate but is in fact malicious

Lecture 21: Internet SecurityIntro to IT Malware and Spyware  Malicious software:  Hidden mail server  Key logging (to capture passwords)  Enable machine takeover  Direct traffic to particular web sites  Analyse behaviour  Act as a proxy  …

Lecture 21: Internet SecurityIntro to IT Denial of service  Prevent network from working normally  Flood a server with ‘invalid’ inputs  Use a network of compromised machines to generate an overwhelming number of requests (Conficker?)  Such zombie machines can form a botnet, which then attack a particular server

Lecture 21: Internet SecurityIntro to IT Tricking the user  Users are often the weakest link in security  attachments containing trojan horses  ‘Phishing’  Malicious web pages  Malicious documents (macros in spreadsheets)  Account stealing (via key logging)  Scams (‘I have $10 million to import’, ‘You have just won the lottery’, …)

Lecture 21: Internet SecurityIntro to IT Protecting your system  Keep up to date with patches (Windows update, Software update)  Use a firewall  Use anti-virus software and keep it up to date  Use anti-spyware tools  Filter for spam and suspicious messages  Be aware of ‘fake alerts’

Lecture 21: Internet SecurityIntro to IT Conclusion  Work on Assignment 3  Check whether your security defenses are up to date