1 Final Exam Review (Part 2) BUS3500 - Abdou Illia, Fall 2007 (Thursday 12/6/2007)

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 1, Tuesday 1/9/2007)
Information Security & Privacy November 13, 2014.
Network & Computer Attacks (Part 2) February 11, 2010 MIS 4600 – MBA © Abdou Illia.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2006.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Spring 2006.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Introduction to Networking & Telecommunications School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (January 14, 2015)
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Computing Concepts – Part 2 Getting Started with Applied Computer Concepts Computing Concepts: Part 2 1.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networking Security Chapter 8 powered by dj. Chapter Objectives  Explain various security threats  Monitor security in Windows Vista  Explain basic.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2015 (March 2, 2015)
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
The Internet School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 14, Thursday 4/12/2007) (Week 15, Monday 4/16/2007)
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Targeted Break-in, DoS, & Malware attacks (I) (February 18, 2015) © Abdou Illia – Spring 2015.
11 CONFIGURING TCP/IP ADDRESSING AND SECURITY Chapter 11.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Security (Part 1) School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 13, Tuesday 4/3/2007)
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
1 NETWORKING TECHNOLOGIES BUS Abdou Illia, Fall 2012 (October 15, 2012)
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Topic 5: Basic Security.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Introduction to Networking & Telecommunications
NETWORKING TECHNOLOGIES
Computer Technology Notes 5
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Information Security Session October 24, 2005
SECURING INFORMATION SYSTEMS
Targeted Break-in, DoS, & Malware attacks (I)
Information Security & Privacy
King Saud University- College OF Applied Studies
Computer Security.
King Saud University- College OF Applied Studies
Presentation transcript:

1 Final Exam Review (Part 2) BUS Abdou Illia, Fall 2007 (Thursday 12/6/2007)

2 LEARNING GOALS  Understand the advantages of a LAN vs. stand-alone computers.  Identify hardware and software needed to implement a LAN.  Choose between P2P and C/S  Understand security attack strategy  Recognize different malware threats based on their MO

3 NETWORKING TECHNOLOGIES

4 Computer Network  An interconnection of computers and computing equipment using either wires or radio waves over small or large geographic distances “Connect to GHI” ABC DEF GHI JKL MNO Once connected to the network, the computer (or another device) becomes a network node

5 Why Networking ?  Resource sharing Sharing Hardware (printers, CPU, etc.) Sharing Software (programs, data files)  High reliability Automatic backup of programs and data at different locations)  Cost saving Through programs sharing Through hardware (e.g. printers) sharing  Communication tool Internal service Remote Access service

6 NewContoso Inc. Network NewContoso Inc. has 25 desktop PCs. All of the PCs have Windows XP Professional installed. The PCs are used as stand-alone computers by the company’s employees to perform regular office work like word processing, creating spreadsheet documents, and managing databases. Ten out of the 25 PCs have a 100 Mbps Ethernet NIC. The company is thinking about implementing a LAN to provide shared Internet access to all employees, as well as software sharing and database service through a new model of server computer that is scheduled to be on the market next month. The new server will also be used to provide print service with a non-existing network laser printer. A consultant hired by the company recommended installing a 100BaseTX local area network.

7 NewContoso Inc. Network (cont.) 1)What hardware and software items the company needs to get in order to implement the local area network? 2)Based on the information provided in the case, what network architecture will allow providing the services in a more effective way: P2P or Client/Server? Explain. 3)Assuming that a 100BaseTX switch is used as the central collection point of the network, how many seconds or minutes it will take to send twenty five documents, of 0.5 megabytes each, from one node to another? You should assume that only the two nodes involved are sending/receiving, and no other nodes are sending/receiving during the time the two nodes are involved in the transmission.

8 SECURITY & PRIVACY

9 Received: from hotmail.com (bay103-f21.bay103.hotmail.com [ ]) by barracuda1.eiu.edu (Spam Firewall) with ESMTP id B10BA1F52DC for ; Wed, 8 Feb :14: (CST) Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC; Wed, 8 Feb :14: Message-ID: Received: from by by103fd.bay103.hotmail.msn.com with HTTP; Thu, 09 Feb :14:58 GMT X-Originating-IP: [ ] X-Originating- X-Sender: In-Reply-To: X-PH: From: To: X-ASG-Orig-Subj: RE: FW: Same cell# Subject: RE: FW: Same cell# Date: Thu, 09 Feb :14: Mime-Version: 1.0 Content-Type: text/plain; format=flowed X-OriginalArrivalTime: 09 Feb :14: (UTC) FILETIME=[DCA31D60:01C62D0D] X-Virus-Scanned: by Barracuda Spam Firewall at eiu.edu X-Barracuda-Spam-Score:

10 Attack strategy  Scanning Ping messages (To know if a potential victim exist, is connected to the network, and is responsive) Supervisory messages (To know if victim available) Tracert, Traceroute (to know about the route that lead to target) Check the Internet (e.g. for latest systems vulnerabilities  Use Social engineering strategy to get other information  Tricking employees to provide passwords, keys and other info.  Misleading people to provide confidential info through , fake websites, etc.

11 Attack strategy (cont.)  Examining collected data Users login names and password IP addresses of potential victims What services servers are running.  Different services have different weaknesses Potential victim’s operating systems, version number, etc.  Deciding types of attacks DoS attacks using servers valid IP addresses Ping of Death on servers with older operating systems Content attacks using identified Open Mail servers & collected s System intrusion on improperly configured servers  Launch the attacks

12 Major security threats  Denial of Service (DoS) attacks  The attacker makes a target (usually a server) deny service to legitimate users  Content attack  Sending messages with illicit or malicious content  System intrusion  Getting unauthorized access to a network

13 Content attacks  Incoming messages with: Malicious content (or malware)  Viruses (infect files on a single computer)  Worms (Propagate across system by themselves)  Trojan horses (programs designed to damage or take control of the host computer) Illicit content  Pornography  Sexually or racially harassing s  Spams (unsolicited commercial s)

14 Trojan horse  A computer program That appears as a useful program like a game, a screen saver, etc. But, is really a program designed to damage or take control of the host computer  When executed, a Trojan horse could Format disks Delete files Allow a remote computer to take control of the host computer  NetBus and SubSeven used to be attackers’ favorite programs for target remote control

15 Trojan horse NetBus Interface

16 NewContoso Inc. network security During the last few months, NewContoso Inc. has been the target of a series of computer and network security attacks. As a result, the IT personnel at NewContoso Inc. have been busy working on the computers in order to assess and fix the damage caused by the attacks with the goal of restoring network services. The IT personnel have reported the following incidents.

17 NewContoso Inc. network security (cont.) Almost all of the company’s computers have been infected by a malicious peace of software called Mytob. According to their report, Mytob was able to harvest IP addresses of the LAN nodes by reading the infected computer’s ARP table content. It is also able to gather addresses from the Windows address book. The malware primarily spread through mass-mailing using its own SMTP engine. Mytob has the potential of deleting files on the infected computers and seriously slowing down communication on the network by consuming the victims’ processing capacity.  Based on the information provided in the case, what type of malware is Mytob? Explain. ______________________________________________________________

18 NewContoso Inc. network security (cont.) Another malicious peace of software mentioned in the report is called Redlof. It was found on computers running Windows operating systems. Once introduced in a computer system, Redlof attaches itself to the kermel32.dll system file. Then, proceeds by searching the entire system for files with the following extensions:.html,.htm,.asp,.php,.jsp, and.vbs. It then attaches itself to those files. Redlof has the potential of slowing down the processing speed of the infected targets. It can also make the infected computers reboot over an over again.  Based on the information provided in the case, what type of malware is Redlof? Explain ______________________________________________________________

19 NewContoso Inc. network security (cont.) A third malware called SpySheriff disguises itself as an anti- spyware program, in order to trick the user of the infected computer to buy the program, by repeatedly informing them of false threats to their system. SpySheriff often goes unnoticed by actual anti-spyware programs. Once installed, SpySheriff can stop the infected computer from connecting to the Internet, and will display an error message reading "The system has been stopped to protect you from Spyware." It blocks several websites, including the ones that have downloadable anti-spyware software. It can also delete some system files.  Based on the information provided in the case, what type of malware is SpySheriff? Explain ______________________________________________________________

20 Summary Questions BookNotes 1)What are the main advantages of implementing a LAN over using stand-alone computers? 2) What hardware components are needed to implement a 100BaseTX? 3) What is the difference between a P2P network and a C/S network? 4)What are ping messages used for? 5)What is the Tracert command used for? 6)What is meant by social engineering? 7)Distinguish between a virus, a worm, and a Trojan horse.