Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

DETECTING A CYBER-ATTACK SOURCE IN REAL TIME R. Romanyak 1), A. Sachenko 1), S. Voznyak 1), G. Connolly 2), G. Markowsky 2) 1) Ternopil Academy of National.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
The Internet.
SECURITY CHECK Protecting Your System and Yourself Source:
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Telstra in Confidence Managing Security for our Mobile Technology.
Safe Computing Keeping Your Computer and Data Safe Brian McFarlane -Lead Systems Engineer Anna Kircher -Assistant Dean, Information Services.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
Viruses.
Unit 2 - Hardware Computer Security.
Information Systems Today, 2/C/e ©2008 Pearson Education Canada Lecture Outline eCommerce Highlights of Electronic Business 2-1.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Computer Science and Engineering 1 Csilla Farkas Associate Professor Center for Information Assurance Engineering Dept. of Computer Science and Engineering.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
CYBER CRIME.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer & Internet Security. Today’s Situation – Universal Access… There are an estimated 304 million people with Internet access. All 304 million of.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Information Security Sharon Welna Information Security Officer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
How to protect your computer By: Emily, Jackie and Kathleen.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Home Computer Security
Lesson 2- Protecting Yourself Online
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Lesson 2- Protecting Yourself Online
Presentation transcript:

Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office

Today’s Situation – Universal Access… There are millions of people with Internet access. (Do we know the actual number?) All of them can communicate with your internet connected computer. Anyone can rattle the door to your computer to see if its locked. On the UTA network, someone tries on a hourly basis.

Today’s Situation – Vulnerable Computers… A large number of computers are vulnerable to being taken over remotely because of: –Unfixed software defects –Operating and configuration errors –Core architectural vulnerabilities Exploitation of vulnerable computers is increasingly trivial, quick, and almost risk-free by relatively unsophisticated individuals. One person or one program can wreak havoc.

Today’s Situation – Opportunities for Abuse… To break into a safe, the safe cracker needs to know something about safes. To break into a computer, the computer cracker often only needs to know where to download a program written by someone else who knows something about computers. Such programs are freely available all over the Net.

Today’s Situation – Opportunities for Abuse… Source: Defense Information System Agency high low Intruder Knowledge Self replicating code Password guessing Password cracking Disabling audits Hijacking sessions sweepers Stealth diagnostics Packet spoofing sniffers Exploiting known vulnerabilities back doors GU I Automated probes/scans Denial of service www attacks Trojan horse/remote control programs Distributed Denial of service Attack Sophistication Parameter tampering Binder programs Tools Attackers Phishin g

How Can the Situation Affect You?… A compromised computer provides access to all accounts, keystrokes, and resident data. Account and keystroke information can be used to access other resources. –Operational Difficulties – and documents –Financial transactions –Identity Theft –Criminal Use of Computer

Practical Aspects of Securing Our Computers… We can secure something so well that it is unusable. Security is relative, not absolute. –Some amount of money, time, and/or motivation will surmount almost any security measure. –Luckily, a lot of computer crime is not targeted at a specific victim but is instead a crime of opportunity. “Security is a process, not a product.” Bruce Schneier –We can’t buy security. We have to live it.

Basic Security Recommendations… There is no substitute for common sense. –Giving out bank or credit card numbers over the Internet is no different than giving them out over the telephone. –Taking action based on the apparent sender of is little different than taking action based on the return address of a typewritten postcard. –Running a program from an unknown source is little different than eating food found on the street. –Not maintaining our computers is little different than not maintaining broken windows and doors. Unfortunately, computers need much more maintenance…the vendors just don’t include that fact in their marketing literature.

…Basic Security Recommendations… Run anti-virus software that automatically updates itself. Visit the Windows Update Site once a month. Treat all attachments with caution. Treat file downloads with caution. Choose strong passwords. Be careful where you type your passwords or any other personal information.

…Basic Security Recommendations If you receive unwanted (SPAM) don’t reply to it. Just delete it. If it continues, save copies and notify OIT Security Services. Don’t believe everything you see on the Internet. addresses are easily falsified. Professional looking web pages can be put up by almost anyone these days. Don’t ignore warnings from your computer.

Security Antispam –Symantec Brightmail (old) False positives Unreliable statistics 1 year of data –IronPort (new) 1 st Q M / 137.4M – 95% 2 nd Q. 176M / 168.1M – 96% 3 rd Q. 292M / 283.2M – 97% Projected for entire year 940M / 895.7M – 94%

Questions? Sean Lanham Office of Information Technology Information Security Office (817)