Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

Intrusion Prevention anno 2012: Widening the IPS concept.
Alex Crowell, Rutgers University Computer Science and Mathematics Advisor: Prof. Danfeng Yao, Computer Science Department.
BlueRedGreenPurpleOrange.
Managing the Security and Privacy Risks of Social Media Don Knox, CPP, CITRMS Global Security and Risk Analysis Manager Caterpillar (309)
Social media is sharing information with others What if this information ends up in the wrong hands?
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Facebook Security and Privacy Issues Brian Allen Network Security Analyst Washington University December 2, 2010 Alumni House.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Web-Based Attacks: Offense Wild Wild West Bob, Jeff, and Junia.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Web Based Attacks SymantecDefense Fantastic Four Casey Ford Mike Lombardo Ragnar Olson Maninder Singh.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
INFORMATION SECURITY AWARENESS PRESENTED BY KAMRON NELSON AND ROYCE WILKERSON.
Teach a man (person) to Phish Recognizing scams, spams and other personal security attacks July 17 th, 2013 High Tea at IT, Summer, 2013.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
Norman SecureSurf Protect your users when surfing the Internet.
Threats to I.T Internet security By Cameron Mundy.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
11 The Ghost In The Browser Analysis of Web-based Malware Reporter: 林佳宜 Advisor: Chun-Ying Huang /3/29.
資安新聞簡報 報告者:劉旭哲、曾家雄. Spam down, but malware up 報告者:劉旭哲.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
Social Media Attacks By Laura Jung. How the Attacks Start Popularity of these sites with millions of users makes them perfect places for cyber attacks.
Juha Siivikko SECURITY IN SOCIAL MEDIA.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
IT security By Tilly Gerlack.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Search Engine Optimization ext 304 media-connection.com The process affecting the visibility of a website across various search engines to.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Click to edit Master title style Click to edit Master text styles –Second level Third level –Fourth level »Fifth level June 10 th, 2009Event details (title,
Secret 7 “Mastering the Internet and Web Technologies.”
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
INTRODUCTION & QUESTIONS.
Cybersecurity Test Review Introduction to Digital Technology.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Kender Primary School E-Safety for Parents and Carers *Look at how children use the internet *Raise awareness of eSafety issues *Offer guidance on how.
Computer Security Keeping you and your computer safe in the digital world.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Safety.
Social Media Attacks.
CYBER SECURITY...
IT Security  .
Types of Cyber Crimes Phishing - is a scam to steal your online username and password. Phishing attacks work by tricking you into entering your username.
Phishing is a form of social engineering that attempts to steal sensitive information.
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Web Attacks— Offense… The Whole Story Yuri & The Cheeseheads Mark Glubisz, Jason Kemble, Yuri Serdyuk, Kandyce Giordano

Introduction White paper was informative Contained a few weaknesses Cited a study that focused on two areas that Symantec was strongest in combating Lacked detail regarding legitimate web site threats Missed risks presented by Social Networking sites

Stated Goals Educate end users to make them more secure Explain types of attacks Drive by Downloads Clickjacking Fake CODECS Malicious peer-to-peer files Malicious Advertisements Fake Scanner Web Pages Blog Spam Offer solutions to minimize risk

Symantec Funded Study Cascadia Labs Tested Two Types of Attack Drive by download Fake CODECs What About Other Threats? Clickjacking Fake Scanner Web pages Peer to Peer Blog Spam

Lasting Perception of Results Results of Study Presented at End of Paper Based on two types of Attacks Reader is aware of all threats Reader is left with false sense of confidence

Infection of Legitimate Websites White paper lacked statistics Spoke in generalities regarding level of threat by legitimate websites We found more specific information 70% of the 100 most popular websites Malicious content or hidden redirect  16% increase over the 1 st half of 2008 Legitimate websites compromised Exceeds the amount of sites created by criminals

Web Site Infection Details cont’d 45% of the top 100 web sites allow user generated content Most active distributors of malicious content Enable criminals to post malicious links, multimedia files, or send malicious s to users Top 100 web sites in terms of traffic are predominantly two categories Search Engines Social Networking Sites

Missed Risk Identification Social Networking Sites Treasure trove of personal data Birthdays, location, and employment history 66% of phishing attacks in the U.S. were directed towards social-networking sites  Impersonating someone else and building up a network  Creating an on-line profile prior to the real person creating one  Using the network to extract personal information to access financial data

Social Networking Sites’ Risks cont’d A means for distributing worms Koobface Distributed in 2008 through Facebook  Notes to friends of someone whose PC has been infected  “See how great you look in this video”  Directs recipients to a website that asks them to download a version of Flash Player – infects computer  Takes them to contaminated sites when they try to use search engines like Google, Yahoo, MSN and Live.com

Worms through Social Networking Twitter Stalkdaily and Mikeyy Tricked users into clicking on a link to a rival social network 17 year old created the worm “out of boredom” Second worm exploited the original flaw  After Twitter claimed to have closed the holes These sites are vulnerable

Conclusion Overall white paper is informative Weaknesses Limited study presented in article Lack of details regarding legitimate web site risks Missed risk Social Networking Sites

Existing Countermeasure Missed (from T’Bone and Tonic) Plethora of third party security tools that exist to prevent some of such attacks the “No Script” extension for the Mozilla browser Lavasoft Ad-Aware and Spybot S&D

References Number of compromised websites at all-time high -number-of-compromised-websites-at-alltime-high.aspx -number-of-compromised-websites-at-alltime-high.aspx Phishers Attack Social Networking Generation Destructive Koobface Virus Turns Up On Facebook Teen Takes Responsibility for Twitter Worms Fake Social Network Profiles: a New Form of Identity Theft profiles_a.php profiles_a.php

Questions?