SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Primary Threats to Computer Security
Virus Code Actions Clara Pirie & Eilidh Currie. Viruses A virus is a computer program that can copy itself and infect a computer without the permission.
Breaking Trust On The Internet
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Unit 18 Data Security 1.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
The Internet = A World of Opportunities
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
By Hassan Abu daqen & montaser elsabe3 & Nidal Abu saif.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Lecture 14. Lecture’s outline Privacy The sender and the receiver expect confidentiality. The transmitted message must make sense only to the intended.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
VIRUSES and DESTRUCTIVE PROGRAMS
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
 TCP/IP is the communication protocol for the Internet  TCP/IP defines how electronic devices should be connected to the Internet, and how data should.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Network Security Management Dr. Robert Chi Chair and Professor, IS department Chief editor, Journal of Electronic Commerce Research.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
All about viruses, hacking and backups By Harriet Thomas.
Computer Virus: “A program that can infect other programs by modifying them to include a version of itself” -- Dr Fred Cohen Compare to an office clerk.
Security fundamentals Topic 9 Securing internet messaging.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Information Technology Essentials Deloris Y. McBride.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Encryption Name : Maryam Mohammed Alshami ID:H
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Unit 3 Section 6.4: Internet Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Chapter 17 Risks, Security and Disaster Recovery
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Presentation transcript:

SECURITY Bart Vansevenant  Who is who?  Who can read what?  Traces  Virusses  Safety and confidentiality

Who is who?

Telephone line Mail server TCP/IP Echelon & Carnivore Who can read what ?

SMTP POP3 POST MAIL using an ISP POST OFFICE

SMTP POP3 POST MAIL a) Telephone-line POST OFFICE

SMTP POP3 POST MAIL b) server Everything on the servers can be read or copied POST OFFICE

SMTP POP3 POST MAIL c) TCP/IP Not readable – following different ways POST OFFICE

Echelon/Carnivore Source:

Traces

Traces The IP address of your computer is : your DNS address is : adsl wanadoo.be We know you use : Microsoft Windows 98 Your navigator has the code: Mozilla/4.78 [en] (Win98; U) In fact it is: Netscape Communicator 4.x English What you did is stored : Windows 95 C:\Windows\Temporary Internet Files\ Windows NT C:\WinNt\Temporary Internet Files\ A nice demo in french on:

Virus What is a virus and types? How is a computer infected? Danger

a) What is a virus?  computer virus = a computer program 'I love you', 45 million computers infected  worm = multiplicates itself c ode Red: servers destroyed  trojan horse = hides for other actions Back Orifice  logic bomb = distroys programs  hoax = false alarm

b) How is a computer infected?  files attached to (attachment)  diskettes  other

c) Danger  infecting components of your system  effects:  malfunctions  deletion of data  wiping of hard disk ...

Solutions to provide safety and confidentiality solving identity problem and unauthorised reading protection against traces protection against virusses

Encryption  Purpose  Functions  How? Identity and unauthorised reading

Functions of encryption Authentication Integrity Confidentiality

Symmetrical encryption UbizenVcjafo Encryption E(…) Decryption D(…) SenderReceiver Vcjafo Untrusted network SAME KEY Ubizen A=A+ 1 A=A- 1

Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Public Key Receiver Decryption D(…) Go#st$Ubizen Private Key Receiver confidentiality towards receiver

Asymmetrical encryption Ubizen SenderReceiver Untrusted network Go#st$ Encryption E(…) Private Key Sender Decryption D(…) Go#st$Ubizen Public Key Sender authentication of sender

Example

Example

Example

 Traces at the ISP  Traces on own computer Against leaving traces

 anti-virus program N orton, McAfee, eSafe, F-Secure, …  watch out for attachments.exe,.com,.pif,.vbs,.doc,.xls, …  Against virusses