Lecture Computer Security Ports, Firewalls, Passwords, and Malware.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Public-key Cryptography Montclair State University CMPT 109 J.W. Benham Spring, 1998.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Home PC Security & Internet Browser Tips Todd W. Jorns Senior Director for Educational Technology Illinois Community College Board.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Security for Seniors SeniorNet Help Desk
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Your Trusted Partner In All Things IT. 20 Years of IT Experience University Automotive Food Service Banking Insurance Legal Medical Dental Software Development.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Unit 19 INTERNET SECURITY
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Staying Safe Online Keep your Information Secure.
Computer Security By: MacKenzie Olson. To be safer and more secure online, make these seven practices part of your online routine.
IT security By Tilly Gerlack.
IT Security Essentials Lesley A. Bidwell, IT Security Administrator.
 Physical protection and Simple measures  Passwords  Firewalls  Anti-Virus, Spyware and Malware  Web browsers   Patches  Wireless  Encryption.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Computer Security Hacking, Phishing, Passwords Kausalya S. And Sushil Mujumdar (CCCF) 04 - Aug - 15.
Return to the PC Security web page Lesson 5: Dealing with Malware.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Internet Security and Your Computer Welcome to Boot Camp.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The internet is a place of both useful and bad information. It has both good and bad side- and it’s all too easy for kids to stray into it. And no parents/guardian.
Information Systems Design and Development Security Precautions Computing Science.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Network System Security - Task 2. Russell Johnston.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Joseph J. Malone Security for Seniors Joseph J. Malone
Instructor Materials Chapter 7 Network Security
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Network security threats
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

Lecture Computer Security Ports, Firewalls, Passwords, and Malware

Security Measures Firewalls Passwords Mal-Ware Anti-Virus and Anti-Spy-Ware Patches and Upgrades

Understanding Ports A port is a doorway to a connection in the Internet world. Part of TCP/IP layer –65,535 possible ports Different layers of TCP/IP use different ports, eg: Port 80 for web traffic Port 21 for FTP Port 25 for Port Table

Port Scanning & Malicious Probes It is similar to a thief going through your neighborhood and checking every door and window on each house to see which ones are open and which ones are locked. Port scanning software sends out a request to each port sequentially and makes a note of which ports responded or seem open to more in-depth probing.

Firewalls Firewalls provide protection against outside attackers by shielding your computer or network from malicious or unnecessary Internet Firewalls can be configured to block data from certain locations while allowing the relevant and necessary data through Firewalls can either be hardware and/or software based.hardware software

Firewalls Windows & Apple have a built in firewall Some anti-virus software provide firewall Blocks traffic based on... –Content –User –Patterns –Ports

The Big Picture Network Switch InternetInternet DSL Modem ))) Firewall

Password Attacks

Password Tips Character Length Complexity Case, Symbols, and Numbers Sharing with Others Changing Uniqueness Tips

Web-based Exploits More common now than sending malicious attachments Botnets: Networks of infected PCs inject code into legitimate websites Download codes stealthily to innocent users READ “A day in the life of a hacker”READ Harvest keystrokes and financial data Example: Business Week.com infected 2007Business Week.com

HTML and SQL injections Limbo malware – Costs $300Limbo malware Trojan Horse programming Downloaded via pop up or phishing Adds extra fields to legitimate online banking and financial sites Tricking users into giving up bank numbers, pins, SSN’s numbers and valuable information

Phishing Scams Identity theft –asks for personal information or account information Increase “click count” – encourages you to click on a link… to surreptitiously increase “click count” revenue. Gateway to malware - clicking on a link in a phishing may trigger the launch of malware. Was that a no-no? - clicking on the link may take you to site that looks perfectly OK… except that malware is launched in the background

Spy-Ware Degrades PC/internet performance Browser Hijacking Anti-Spyware software: –Ad-Aware by Lavasoft –Grisoft's AVG Anti-Spyware 7.5, –Microsoft's Windows Defender 1.1 (free) –Safer Networking's Spybot Search & Destroy –Webroot's Spy Sweeper 5.5-Vista

Anti-Virus Software Searches all drives looking for known "virus signatures" Scans all files and attachments as they are accessed Virus Definition Files must be updated frequently (daily or better) Symantec Anti-Virus –Licensed for campus and home

Cryptography and Encryption from the Greek for “secret writing” -- is the mathematical “scrambling” of data so that only someone with the necessary key can “unscramble” it. Cryptography allows secure transmission of private information over insecure channels (for example packet-switched networks). Cryptography also allows secure storage of sensitive data on any computer.

Cryptography and Encryption Encryption: Method of scrambling contents of e- mail or files to make them unreadable if intercepted –Private key encryption: Uses a single key Most often used to encrypt files on a computer If used to send files to others, the recipient needs to be told the key –Public key encryption: Uses two keys Public key: Can be given to anyone; used to encrypt messages to be sent to that person Private key: Only known by the individual; used to decrypt messages that are encrypted with the individual’s public key Key pairs can be obtained through a Certificate Authority

Online Transactions 1976: W. Diffie and M.E. Hellman proposed the first public-key encryption algorithms -- actually an algorithm for public exchange of a secret key. 1978: L.M Adleman, R.L. Rivest and A. Shamir propose the RSA encryption method –Currently the most widely used

Pacific Resources: InsidePacifc Administrative Tab Go to Help Tab Follow links to Security and Virus Protection

Pacific Resources News Release: Facebook risk

Safeguard your privacy Review what you have posted online periodically. –Hints to your passwords –Personal information –Pictures that can be simply copied and used elsewhere. One fifth of hiring managers have used the internet to search for personal info on job candidates Monster Ideas for Employers