Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Basic Communication on the Internet:
Let’s Talk About Cyber Security
How the Internet Works Course Objectives Introduce the various web browsers Introduce some new terms Explain the basic Internet to PC hookup  ISP  Wired.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
Introduction to Web Database Processing
Internet…issues Managing the Internet
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 3 Internet Security.
Computer Security and Penetration Testing
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 15: Internet Explorer and Remote Connectivity Tools.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Chapter Nine Maintaining a Computer Part III: Malware.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
11 SECURING INTERNET MESSAGING Chapter 9. Chapter 9: SECURING INTERNET MESSAGING2 CHAPTER OBJECTIVES  Explain basic concepts of Internet messaging. 
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
INTRODUCTION TO WEB DATABASE PROGRAMMING
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Chapter 6: Web Security Security+ Guide to Network Security Fundamentals Second Edition.
Security Awareness Chapter 3 Internet Security. Security Awareness, 3 rd Edition2 Objectives After completing this chapter, you should be able to do the.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Chapter 16 The World Wide Web. 2 The Web An infrastructure of information combined and the network software used to access it Web page A document that.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
Windows Internet Explorer 9 Chapter 1 Introduction to Internet Explorer.
Web Browser Security Prepared By Mohammed EL-Batta Mohammed Soubih Supervised By Eng. Eman alajrami Explain Date 10. may University of Palestine.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Web Security Chapter 6. Learning Objectives Understand SSL/TLS protocols and their implementation on the Internet Understand HTTPS protocol as it relates.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Microsoft Internet Explorer and the Internet Using Microsoft Explorer 5.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
1 World Wide Web Concepts (Chapter 18) 인공지능연구실. 2 목 차  Elements of the Web  Web Browsers  Keeping Tracking of your Favorite Web sites  Security and.
s This presentation is all about s, etiquette and software. I will go through these things step by step to give you a clear understanding.
The Internet 8th Edition Tutorial 3 Using Web-Based Services for Communication and Collaboration.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Security Awareness Chapter 3 Internet Security. O BJECTIVES After completing this chapter, you should be able to do the following:  Explain how the World.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Active X and Signed Applets Chad Bollard. Overview ActiveX  Security Features  Hidden Problems Signed Applets  Security Features  Security Problems.
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Windows Tutorial 5 Protecting Your Computer
Chapter 40 Internet Security.
WWW and HTTP King Fahd University of Petroleum & Minerals
IT Security  .
Protect Your Computer Against Harmful Attacks!
Computer Security.
Windows Vista Inside Out
Chapter 9: Configuring Internet Explorer
Presentation transcript:

Security Awareness: Applying Practical Security in Your World Chapter 4: Chapter 4: Internet Security

Security Awareness: Applying Practical Security in Your World 2 Objectives List the risks associated with using the World Wide Web, and describe the preventive measures that can be used to minimize Web attacks. List the vulnerabilities associated with using e- mail, and explain procedures and technologies that can be used to protect .

Security Awareness: Applying Practical Security in Your World 3 Internet Security The Internet has changed the way we live and work in a very short amount of time. There is a dark side to the Internet; it has opened the door to attacks on any computer connected to it. There are methods to minimize the risks of using the Internet and .

Security Awareness: Applying Practical Security in Your World 4 The World Wide Web Internet  Worldwide interconnection of computers World Wide Web (WWW)  Internet server computers that provide online information in a specified format Hypertext Markup Language (HTML)  Specifies how a browser should display elements on a user’s screen (See Figure 4-1) Hypertext Transport Protocol (HTTP)  Set of standards that Web servers use to distribute HTML documents (See Figure 4-2)

Security Awareness: Applying Practical Security in Your World 5 The World Wide Web (continued)

Security Awareness: Applying Practical Security in Your World 6 The World Wide Web (continued)

Security Awareness: Applying Practical Security in Your World 7 Repurposed Programming Repurposed programming  Using programming tools in harmful ways other than what they were originally intended to do Static content  Information that does not change Dynamic content  Content that can change Tools that can be used for repurposed programming: JavaScript Java Applets ActiveX Controls

Security Awareness: Applying Practical Security in Your World 8 Web Attacks Web attack  An attack launched against a computer through the Web Broadband connections  A type of Internet connection that allows users to connect at much faster speeds than older dial-up technologies Result: More attacks against home computers Three categories of attacks: Repurposed programming Snooping Redirected Web traffic

Security Awareness: Applying Practical Security in Your World 9 JavaScript JavaScript  Special program code embedded in an HTML document Web site using JavaScript accessed  HTML document downloaded  JavaScript code executed by the browser (See Figure 4-3) Some browsers have security weaknesses

Security Awareness: Applying Practical Security in Your World 10 JavaScript (continued)

Security Awareness: Applying Practical Security in Your World 11 Java Applet Java applet  A program downloaded from the Web server separately from the HTML document Stored on the Web server and downloaded along with the HTML code when the page is accessed (See Figure 4-4) Processes user’s requests on the local computer rather than transmitting back to the Web server

Security Awareness: Applying Practical Security in Your World 12 Java Applet (continued) “Security sandbox” Unsigned Java applets  Untrusted source (See Figure 4-5) Signed Java applets  Digital signature proving trusted source

Security Awareness: Applying Practical Security in Your World 13 Java Applet (continued)

Security Awareness: Applying Practical Security in Your World 14 Java Applet (continued)

Security Awareness: Applying Practical Security in Your World 15 ActiveX Controls ActiveX controls  An advanced technology that allows software components to interact with different applications Two risks: Macros ActiveX security relies on human judgment Digital signatures Users may routinely grant permission for any ActiveX program to run

Security Awareness: Applying Practical Security in Your World 16 Snooping One of dynamic contents strengths is its ability to receive input from the user and perform actions based on it (See Figure 4-6) Providing information to a Web site carries risk Internet transmissions are not normally encrypted Information entered can be viewed by unauthorized users Types of snooping: Spyware Misusing Cookies

Security Awareness: Applying Practical Security in Your World 17 Snooping (continued)

Security Awareness: Applying Practical Security in Your World 18 Snooping (Continued) Cookies  A computer file that contains user- specific information Stores information given to a Web site and reuses it Can pose a security risk Hackers target cookies to retrieve sensitive information Cookies can be used to determine what Web pages you are viewing Some personal information is left on Web sites by the browser Makes tracking Internet usage easier

Security Awareness: Applying Practical Security in Your World 19 Redirecting Web Traffic Mistakes can be made when typing an address into a browser Usually mistakes result in error messages (See Figure 4-7) Hackers can exploit misaddressed Web names to steal information using social engineering Two approaches: Phishing Registering similar-sounding domain names

Security Awareness: Applying Practical Security in Your World 20 Redirecting Web Traffic (continued)

Security Awareness: Applying Practical Security in Your World 21 Web Security Through Browser Settings Web browser security and privacy settings can be customized Internet Options General Security Privacy Content Advanced Tab

Security Awareness: Applying Practical Security in Your World 22 Web Security Through Browser Settings (continued) Figure 4-9 Security Settings on the Advanced Tab

Security Awareness: Applying Practical Security in Your World 23 Web Security Through Browser Settings (continued) Alert the User to the Type of Transaction Warn if changing between secure and not secure mode

Security Awareness: Applying Practical Security in Your World 24 Web Security Through Browser Settings (continued) Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)  Encrypts and decrypts the data sent

Security Awareness: Applying Practical Security in Your World 25 Web Security Through Browser Settings (continued) Know What’s Happening with the Cache Do not save encrypted pages to disk Empty Temporary Internet Files when browser is closed Cache  Temporary storage area on the hard disk

Security Awareness: Applying Practical Security in Your World 26 Web Security Through Browser Settings (continued) Know the Options on the General Tab Temporary Internet files Delete Cookies Delete Files History

Security Awareness: Applying Practical Security in Your World 27 Web Security Through Browser Settings (continued) Security Zones and the Security Tab Predefined security zones: Internet Local Intranet Trusted sites Restricted sites

Security Awareness: Applying Practical Security in Your World 28 Web Security Through Browser Settings (continued) Security Zones and the Security Tab Security levels can be customized by clicking the Custom Level button to display the Security Settings page

Security Awareness: Applying Practical Security in Your World 29 Web Security Through Browser Settings (continued) Using the Privacy tab Divided into two parts: Privacy level settings Cookie handling: First-party Third-party

Security Awareness: Applying Practical Security in Your World 30 Web Security Through Browser Settings (continued) Placing Restrictions on the Content Page Control type of content the browser will display Content Advisor Certificates Publishers

Security Awareness: Applying Practical Security in Your World 31 Web Security Through Appropriate Procedures Do not accept any unsigned Java applets unless you are sure of the source Disable or restrict macros from opening or running automatically Disable ActiveX and JavaScript. Install anti-spyware and antivirus software and keep it updated

Security Awareness: Applying Practical Security in Your World 32 Web Security Procedures (continued) Regularly install any critical operating system updates. Block all cookies Never respond to an that asks you to click on a link to verify your personal information. Check spelling to be sure you are viewing the real site.

Security Awareness: Applying Practical Security in Your World 33 Web Security Procedures (continued) Turn on all security settings under the Advanced tab. Keep your cache clear of temporary files and cookies. Use the security zones feature.

Security Awareness: Applying Practical Security in Your World 34 is a double-edged sword Essential for business and personal communications Primary vehicle for malicious code

Security Awareness: Applying Practical Security in Your World 35 Vulnerabilities of Three major areas: Attachments Spam Spoofing

Security Awareness: Applying Practical Security in Your World 36 Vulnerabilities of (continued) Attachments  Documents, spreadsheets, photographs and anything else added to an message Can open the door for viruses and worms to infect a system Malicious code can execute when the attachment is opened Code can then forward itself and continue to spread

Security Awareness: Applying Practical Security in Your World 37 Vulnerabilities of (continued) Spam  Unsolicited messages Usually regarded as just a nuisance, but can contain malicious code To cut down on spam: Never reply to spam that says “Click here to unsubscribe” Set up an account to use when filling out Web forms Do not purchase items advertised through spam Ask your ISP or network manager to install spam- filtering hardware or software

Security Awareness: Applying Practical Security in Your World 38 Vulnerabilities of (continued) Spoofing  A message falsely identifying the sender as someone else Sender’s address appears to be legitimate, so the recipient trusts the source and does what is asked

Security Awareness: Applying Practical Security in Your World 39 Solutions Technology-based solutions Antivirus software installed and regularly updated filters File extension filters Junk option Figure 4-17  Separate filtering software working in conjunction with the software

Security Awareness: Applying Practical Security in Your World 40 Solutions (continued) Procedure-Based Solutions Remember that is the number one method for infecting computers and treat it cautiously Approach messages from unknown senders with caution Never automatically open an attachment Do not use preview mode in your software Never answer requests for personal information

Security Awareness: Applying Practical Security in Your World 41 Summary Computers connected to the Internet are vulnerable to a long list of attacks, in addition to viruses, worms and other malicious code. Categories of attack are: Repurposed programming JavaScript Java applets ActiveX controls Snooping Redirected Web traffic

Security Awareness: Applying Practical Security in Your World 42 Summary (continued) Defending against Web attacks is a two-fold process: Configuration of browser software Customized privacy and security settings Proper procedures to minimize risk Many attacks are based on social engineering

Security Awareness: Applying Practical Security in Your World 43 Summary (continued) is a crucial business and personal tool, but is also a primary means of infection by viruses, worms, and other malicious code. Attachments Spam Spoofing

Security Awareness: Applying Practical Security in Your World 44 Summary (continued) security solutions can be broken into two categories: Technology-based Antivirus software Filters for attachments and spam Procedure-based Remember the risks and consistently follow “safe” procedures