32-1 Internet Safety/Security Issues. 32-2 Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
1 Computer Security: Protect your PC and Protect Yourself.
Quiz Review.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Computer security By Isabelle Cooper.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Chapter 40 Internet Security.
Managing Windows Security
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

32-1 Internet Safety/Security Issues

32-2 Trojan/Virus precautions When you run an executable program from an untrusted source you’re opening yourself up to trouble –You turn over complete control of your computer to the whim of an unknown programmer –Virus: A virus infects “real” software by modifying the binary code of executable files to include additional malicious instructions Format your hard drive at a certain date/time Delete essential system files from your computer And of course... –Modify the binary code of other executable files on your hard drive (so it can spread – like a virus) This way, when you give someone else a program you also spread the virus to another computer (a bigger problem in the shareware days) –Trojan Horse: a software program that is advertised as useful or fun software though it only includes malicious instructions Trojans do not (generally speaking) replicate. The additional malicious instructions can also be destructive to files and such but more often include backdoor programs –Backdoor programs open your computer up to complete remote control from the Internet. They can run programs, download or delete files, or send from your computer

32-3 Antivirus precautions Antivirus software should be used when you run *any* program from the Internet... –Essentially, you need to trust the source of your file. distributed media? Internet downloads? Direct from AOL, Microsoft, Etc “Looks like a legitimate website” “Sure, I can’t read the language, but it claims to be Office 2003, for free!” File Sharing? …

32-4 Trojan/Virus precautions You can scan a program for virii, before you run it, some software can scan a program for trojan programs/backdoors. –You can scan your computer for trojans after the fact, and remove them –Old anti-virus definitions mean you might as well not be scanning at all new virii and trojans are being written and released onto the Internet all the time it’s very difficult to determine what instructions are legitimate and what is malicious –e.g., not all “delete” operations are necessarily malicious by determining virus “signatures” they can be detected

32-5 Hacking Hackers, in this case, try to exploit bugs in software, so they can do things that the original developers did not intend. –Not all hackers are trying to harm … Remember: –All network communication happens with programs –Programs may have bugs; the program may behave badly depending on what the user does –These bugs might open the computer up to vulnerability Example: –Your operating system runs programs that accept connections from other computers for legitimate purposes –This program has a bug which, when receiving too much data, will allow the sender to run any program on the target machine

32-6 Infamous Buffer Overflow Note: You shouldn't be able to be “hurt” from a song, picture, or plain text file – as they contain no executable instructions (?) –After all, some other program reads them as data and doesn’t execute any bits in these data files as instructions. And yet... –Hacked from downloaded images... some programs may not be overly careful about how data is handled –not necessarily a bug, more of a safety concern dealing with invalid input/data »data exists in the same memory as the programs do »clever “hackers” may specially craft malformed data that the program will mishandle resulting in some sort of exploitation

32-7 How to “block” Hackers Keep hackers off your network interface: –Put a firewall between your machine and the outside world Firewall: A set of programs that monitor all communication passing into and out of a corporation’s intranet. –Helps prevent, but doesn’t eliminate, unauthorized acces –Hardware firewall Physical device that sits between your machine and the network Restricts access to your network, keeps people off your machine by proxy –Software firewall Restricts access to your machine, as the above, however it runs on your machine. Fill the security holes on your computer: –Install security updates against “dangerous” software bugs: – –

32-8 Spyware/Adware There’s a separate category of “backdoor programs” which aren’t necessarily damaging –Spy-ware: Software that tracks information about the user (without the user’s prior knowledge). Information is usually kept in a large database, and usually re-sold. Ranges from webpage browsing habits to credit card information. –Ad-ware: “Free” software supported by advertising revenue They sell advertising to companies and their software sits on your machine, annoying you with pop-up ads that seem to be coming from no where Further, they sometimes engage in data warehousing, accumulating your personal info, browsing habits, etc and may sell that data as well –Install and use a spyware/adware scanner, remover, blocker (PCSC, links section of the course webpage)

32-9 Problems… World Wide Web: –Snooping: When browsing the internet, your information is passed across many routers across many networks. Users can snoop your traffic, and know what sites you browse, maybe even see your private information. Solution: make sure that secure transfer is enabled for a site before transmitting any private information ( lock) –Hacking: Users may hack into the back end systems on which many web stores run – stealing credit card numbers, social security numbers, and more –Malicious plug-ins/exploits: Web sites may contain malicious programs that try to leverage bugs in your web browser to (in some way) compromise your computer Solution? –Keep your browser updated! –Try a less popular browser: Firefox, Opera, etc

32-10 Problems… –Worm: a software program that replicates itself throughout the internet, usually with the goal of generating lots of bogus internet traffic to crash servers via excessive load. Web Browsers may have critical vulnerabilities which allow malicious code to be run from a website. Since some clients support rendering messages in full HTML, you may be ed a message with the malicious code inside. When you run it, you could be “infected” –Solution: stay up to date with the latest Microsoft Security patches! –Run pine, Mozilla Thunderbird, etc... –Trojan Horse/Virii: software programs that claim to be useful software though also includes malicious instructions – messages are send with executable attachments. Users who don’t know any better run them and become infected. –Solution: NEVER run strange attachments! –Phishing: Posing as a legitimate entity, an directs you to a “spoofed” website where you unwittingly give confidential information to what looks like eBay, Citibank, Paypal, etc...