Security Chapter 12. 2 What Should I Ask Santa Claus For? e-mail spoofing: fraudulent e-mail activity in which the sender address and other parts of the.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
1 I ntegrated S ite S ecurity for G rids © Members of the ISSeG Collaboration, 2008 See: ISS e G Computer Security: Advice for computer.
Threats To A Computer Network
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Quiz Review.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Social Engineering Training. Why Social Engineering Training? The Department of Energy (DOE) authorized the Red Team to perform vulnerability assessments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
What is Spam? d min.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Managing Money Workshop The National Autistic Society AGM
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
An Introduction to Phishing and Viruses
IT Security  .
Unit 4 IT Security.
ISYM 540 Current Topics in Information System Management
Lesson 3 Safe Computing.
I S P S loss Prevention.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
9 ways to avoid viruses and spyware
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security Chapter 12

2 What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the header are altered to appear as though the originated from a different source

3 Phishing phishing: scam by which an user is duped into revealing sensitive information such as passwords and credit card details Link might go to another website (links are easy to spoof); hover mouse over links to see where they lead

4 What Can Be Done About Phishing? Never respond to requests for personal information like passwords via (or phone!).  Legitimate businesses do not request such information this way. Visit web sites of companies with which you have business by manually typing the company URL.  Do not click on links in unexpected s because they can be spoofed.  Along the same lines, do not call phone numbers found in those s.

5 What Can Be Done About Phishing? Be leery of URLs that do not have the company name directly before the top-level domain.  For example, bankofamerica.com is the correct URL, bankofamerica.pp.com is questionable. Routinely review your credit card and bank statements for unusual activity.  "Recognizing Phishing Scams and Fraudulent / Hoax "  mspx mspx

6 How Often Should You Change Your Passwords? Can't an attacker (perhaps using a computer program) keep guessing passwords?  Computer systems usually impose a time-out of several seconds after a number (e.g. three) failed attempts. "Top 10 Most Common Passwords" 

7 Social Engineering social engineering: the act of manipulating people into performing actions or divulging confidential information

8 Password Insecurity Source: "Palin Hacker Says It Was Easy"  ha.html ha.html "As detailed in the postings, the Palin hack didn't require any real skill. Instead, the hacker simply reset Palin's password using her birthdate, ZIP code and information about where she met her spouse -- the security question on her Yahoo account, which was answered (Wasilla High) by a simple Google search."

9 Malware malware (malicious software): software designed to infiltrate or damage a computer system without the owner's informed consent computer virus: catch-all phrase to include all types of malware, including true viruses Other terms for baddies: trojan horse, worm, adware, spyware

10 How Malware Spreads Some malware can be secretly installed just by visiting infected web sites. Others require human intervention to propagate (e.g. clicking on an attachment or installing infected software)

11 How Malware Spreads USB drives can be carriers of computer viruses. Window that pops up when you insert an infected USB drive looks similar to that when inserting a clean USB drive.  Clicking icon infects the computer.  To prevent further infection, click the X on the top right.  However clean drives can still be infected just by using the USB drive with an infected computer.

12 What's The Worst That Could Happen? keylogger: software that can capture and record user keystrokes backdoor: hidden method for bypassing normal computer authentication systems zombie: computer attached to the Internet that has been compromised denial-of-service attack (DoS attack): attempt to make a computer resource unavailable

13 Preventative Tips Show hidden files. If you do not know what a file is for, look it up on the web.  dsupport/learnmore/tips/hiddenfiles.mspx dsupport/learnmore/tips/hiddenfiles.mspx Do not open unexpected attachments. Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.

14 Preventative Tips Keep your system up-to-date. Newer systems automatically update.  Verify that your computer automatically updates or make sure to manually update every so often.  If you must use IE, use the latest version.

15 Useful Software: Firewall firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules  Most systems have firewalls installed.

16 Useful Software "Protecting your computer from viruses"   Contains link to anti-virus software for both Mac and Windows Additional Windows Software  Ad-Aware  Spybot – Search & Destroy  AVG Anti-Virus

17 An Ongoing Battle…

18 Cleaning Viruses Anti-virus software is only good if you keep it up-to- date.  New viruses are coming out all the time. In certain cases, you may have to clean a virus manually.  Try to find respectable directions on the web. The process can be very tedious. Computer Vet 

19 For Your Security Don't save important passwords in your browser.  What if someone steals your computer?

20 Secure Protocols Hypertext Transfer Protocol Secure (HTTPS): combination of HTTP and a network security protocol  URL begins with lock indicates secure website notice the 's'

21 Spam! spam: unsolicited or undesired electronic messages  Usually sent by zombie computers.

22 Is Anyone Dumb Enough To Respond To Spam? One study showed that the hit rate for pharmaceutical spam is about 1 in 12 million. Source: "Spamalytics: An Empirical Analysis of Spam Marketing Conversion"  8-ccs-spamalytics.pdf 8-ccs-spamalytics.pdf  Spam Targets: 347,590,389  User Conversions: 28 ( %)

23 Preventing Spam CAPTCHA: Completely Automated Public Turing test to tell Computers and Humans Apart

24 Some programs do not show certain images in the unless you press another button. Why?  This concern images that have to be downloaded from another source (vs. just being attached to the ).  Fetching images can alert the sender that the e- mail address is valid. So what? Spammers love valid addresses!