Network Security Lecture 28 Presented by: Dr. Munam Ali Shah.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Grass Valley Learning Center Surf the Net Safely Roger Thornburn.
Internet Safety Gleneagles Computer Club February 16, 2015 by Deborah Benson.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Implications and Security Issues of the Internet By Neelesh Patel.
SPYWARE Presented by The State Security Office November 17, 2004.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Identity Theft and Safe Computing Keeping yourself You by good habits and good technology.
Spyware & Internet Security
Security Advice Georgie Pepper Campsmount Acadamy.
Internet safety By Lydia Snowden.
Adware Spyware Anti-Virus Presented by: Forrest Fosheim Network Coordinator Southwest Telecommunications Coop.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Keeping Information Safe Task 4. Basic security measures Passwords Change password on regular basis Do not use names or words easily linked to yourself.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Impacts of the use of IT -Social network sites This is a site that lets you post messages, upload pictures and stories on your own personal page. You can.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
Adware and Spyware By Mr. Arbogast.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Advanced Guide to ing. Introduction In this guide you and explain will learn how to use ing in an advanced way. I will go through on.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Computer Security Keeping you and your computer safe in the digital world.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Protect Your Computer Against Harmful Attacks!
Spyware & Internet Security
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Spyware. By: Katheryn L. Gaston.
Spyware: Technical Overview
Internet Safety – Social Media
What is Phishing? Pronounced “Fishing”
Presentation transcript:

Network Security Lecture 28 Presented by: Dr. Munam Ali Shah

Summary of the Previous Lecture In previous lecture we discussed in detail the payment processing in SET We have seen following three phases are involved in SET. A. Purchase request 1. Initiate request 2. Initiate response 3. Purchase request 4. Purchase response B. Payment authorization 1. Payment Block 2. Authorization block C. Payment capture

Part 3 Internet Security (Last Part)

Outlines of today’s lecture We will talk about what Internet security is and how to ensure security while browsing through the Internet. We will also see what spyware are and how do they look like. We will also discuss few methods that can be used to avoid spywares. We will also see a couple of examples of Phishing on the Internet

Objectives You would be able to present an understanding of what does it take to become secure while connecting to the Internet. You would be able demonstrate knowledge about different spywares and phishing and the countermeasures that are used to avoid them.

What is Internet Security Internet security is a tree branch of computer security specifically related to the Internet, often involving browser security but also network security on a more general level as it applies to other applications or operating systems on a whole.

What is Internet Security The Internet provides a wealth of information and services. Many activities in our daily lives now rely on the Internet, including various forms of communication, shopping, financial services, entertainment and many others. The growth in the use of the Internet, however, also presents certain risks. Just think about all the information you send over the Internet, such as personal messages, bank account information, photographs, etc. As a typical Internet user, you have the reasonable expectation that your communications and transactions are private and secure. When you make a video call to a family member, you expect that nobody else is watching. When you buy something online with a credit card, you expect that nobody else can get access to your credit card details.

What is Internet Security Using the Internet presents a number of security issues. Being aware of these will make your Internet use safer and more enjoyable. Some of the most serious threats include computer viruses, spyware and other harmful programs. You should use antivirus and spyware management software to protect your computer system.

Internet Security password patch spam fire wall virus war driving key logger proxy wormphishing Trojan horse

Spyware and Internet Security Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner's private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties.

Different Types of Spyware Spyware Adware Embedded Programs Trojan Horse Browser Hijackers Dialers Malware

Why do people make Spyware? Profit A challenge Malice Boredom Business

How do I know if I’ve got Spyware? Computer is running slower than normal Popups (on or off the internet) New toolbars Home page changes Search results look different Error messages when accessing the web

What does Spyware look like?

How do I get rid of Spyware? Use a legitimate spyware removal program We suggest Spybot Search and Destroy in combination with Microsoft Antispyware (now called Defender) Ad-aware is a good program and is free for home use but is no longer free for educational use.

How do I get rid of Spyware? Avoid viruses Use strong passwords Don't reveal too much Check for secure sites Consider your location

Steps in Spyware Removal  Add and Remove Programs Menu  Reboot  Run a Spybot Scan  Reboot  Run a Microsoft Antispyware Scan  Reboot  If still having problems manually remove registry and startup entries (Do NOT do this yourself)

How do I prevent Spyware? Be conscious of what you are clicking on/downloading Some pop-ups have what appears to be a close button, but will actually try to install spyware when you click on it. Always look for the topmost right red X. Remember that things on the internet are rarely free. “Free” Screensavers etc. generally contain ads or worse that pay the programmer for their time.

The Least Wanted List Weatherbug (GAIN or Claria) Hotbar 180 Search Assistant MyWebSearch Popular Screensavers Comet Cursors A Better Internet (Aurora) Kazaa / Morpheus GameSpy Arcade WhenUSave New.Net Starware Toolbar MySearch Begin2Search 180Solutions Zango CoolWebSearch DyFuCA BonzaiBuddy BargainBuddy Dashbar Gator WeatherScope Best Offers Network Precision Time FunWeb

Phishing Most commonly an stating your account Information needs updating Watch for URL’s that are numeric or different from the link you clicked on Best thing to do is to type in the URL and check your account directly without following any links in the Many legitimate s no longer contain a link (Paypal)

Phishing Examples

How secure do you need to be? Be Prudent (careful) not Paranoid (unreasonable) Did you initiate the action? Why is this free? Is the source trustworthy? When in doubt Google it

Safer Alternatives Download.com – All programs are adware/spyware free Freesaver.com – Screensavers from this site are safe DO NOT click on ads KFOR or News9 Cleansoftware.org

The Bottom Line It is safe to install these programs: Microsoft AntiSpyware (Defender) Spybot Search & Destroy SpywareBlaster SpywareGuard If you are running a different Spyware program contact your Technology Specialist to make sure it is not a rogue

Summary There's so much to discover and enjoy in the online world. By taking a few simple precautions, you can feel safer while you're exploring the web.

Next lecture topics Our discussion on more interesting topics on Internet security will continue. We will talk about Tools and techniques to protect data during the transmission over the Internet

The End