Security Awareness Chapter 3 Internet Security
O BJECTIVES After completing this chapter, you should be able to do the following: Explain how the World Wide Web and work List the different types of Internet attacks Explain the defenses used to repel Internet attacks S ECURITY A WARENESS, 3 RD E DITION 2
H OW THE I NTERNET W ORKS Internet Worldwide set of interconnected computers, servers, and networks Not owned or regulated by any organization or government entity Computers loosely cooperate to make the Internet a global information resource S ECURITY A WARENESS, 3 RD E DITION 3
T HE W ORLD W IDE W EB World Wide Web (WWW) Better known as the Web Internet server computers that provide online information in a specific format Hypertext Markup Language (HTML) Allows Web authors to combine text, graphic images, audio, video, and hyperlinks Web browser Displays the words, pictures, and other elements on a user’s screen S ECURITY A WARENESS, 3 RD E DITION 4
T HE W ORLD W IDE W EB ( CONT ’ D.) Figure 3-1 How a browser displays HTML code S ECURITY A WARENESS, 3 RD E DITION 5 Course Technology/Cengage Learning
T HE W ORLD W IDE W EB ( CONT ’ D.) Hypertext Transport Protocol (HTTP) Standards or protocols used by Web servers to distribute HTML documents Transmission Control Protocol/Internet Protocol (TCP/IP) Port number Identifies the program or service that is being requested Port 80 Standard port for HTTP transmissions S ECURITY A WARENESS, 3 RD E DITION 6
T HE W ORLD W IDE W EB ( CONT ’ D.) Transfer-and-store process Entire document is transferred and then stored on the local computer before the browser displays it Creates opportunities for sending different types of malicious code to the user’s computer S ECURITY A WARENESS, 3 RD E DITION 7
T HE W ORLD W IDE W EB ( CONT ’ D.) Figure 3-2 HTML document sent to browser S ECURITY A WARENESS, 3 RD E DITION 8 Course Technology/Cengage Learning
E-M AIL Number of messages sent each day to be over 210 billion More than 2 million every second Simple Mail Transfer Protocol (SMTP) Handles outgoing mail Post Office Protocol (POP or POP3) Responsible for incoming mail Example of how works S ECURITY A WARENESS, 3 RD E DITION 9
E-M AIL ( CONT ’ D.) Figure 3-3 transport S ECURITY A WARENESS, 3 RD E DITION 10 Course Technology/Cengage Learning
E-M AIL ( CONT ’ D.) IMAP (Internet Mail Access Protocol, or IMAP4) More advanced mail protocol attachments Documents that are connected to an message Encoded in a special format Sent as a single transmission along with the e- mail message itself S ECURITY A WARENESS, 3 RD E DITION 11
I NTERNET A TTACKS Variety of different attacks Downloaded browser code Privacy attacks Attacks initiated while surfing to Web sites Attacks through S ECURITY A WARENESS, 3 RD E DITION 12
D OWNLOADED B ROWSER C ODE JavaScript Scripting language Similar to a computer programming language that is typically ‘‘interpreted’’ into a language the computer can understand Embedded in HTML document Executed by browser Defense mechanisms are intended to prevent JavaScript programs from causing serious harm Can capture and send user information without the user’s knowledge or authorization S ECURITY A WARENESS, 3 RD E DITION 13
D OWNLOADED B ROWSER C ODE ( CONT ’ D.) Figure 3-4 JavaScript S ECURITY A WARENESS, 3 RD E DITION 14 Course Technology/Cengage Learning
D OWNLOADED B ROWSER C ODE ( CONT ’ D.) Java complete programming language Java applet Can perform interactive animations, immediate calculations, or other simple tasks very quickly Sandbox Unsigned or signed S ECURITY A WARENESS, 3 RD E DITION 15
D OWNLOADED B ROWSER C ODE ( CONT ’ D.) Figure 3-5 Java applet S ECURITY A WARENESS, 3 RD E DITION 16 Course Technology/Cengage Learning
D OWNLOADED B ROWSER C ODE ( CONT ’ D.) ActiveX Set of rules for how applications under the Windows operating system should share information Do not run in a sandbox Microsoft developed a registration system poses a number of security concerns Not all ActiveX programs run in browser S ECURITY A WARENESS, 3 RD E DITION 17
P RIVACY A TTACKS Cookies User-specific information file created by server Stored on local computer First-party cookie Third-party cookie Cannot contain a virus or steal personal information stored on a hard drive Can pose a privacy risk S ECURITY A WARENESS, 3 RD E DITION 18
P RIVACY A TTACKS ( CONT ’ D.) Adware Software that delivers advertising content Unexpected and unwanted by the user Can be a privacy risk Tracking function Popup Small Web browser window Appears over the Web site that is being viewed S ECURITY A WARENESS, 3 RD E DITION 19
A TTACKS WHILE S URFING Attacks on users can occur while pointing the browser to a site or just viewing a site Redirecting Web traffic Mistake when typing Web address Attackers can exploit a misaddressed Web name by registering the names of similar-sounding Web sites S ECURITY A WARENESS, 3 RD E DITION 20
A TTACKS WHILE S URFING ( CONT ’ D.) Table 3-1 Typical errors in entering Web addresses S ECURITY A WARENESS, 3 RD E DITION 21 Course Technology/Cengage Learning
A TTACKS WHILE S URFING ( CONT ’ D.) Drive-by downloads Can be initiated by simply visiting a Web site Spreading at an alarming pace Attackers identify well-known Web site Inject malicious content Zero-pixel IFrame Virtually invisible to the naked eye S ECURITY A WARENESS, 3 RD E DITION 22
E-M AIL A TTACKS Spam Unsolicited 90 percent of all s sent can be defined as spam Lucrative business Spam filters Look for specific words and block the Image spam Uses graphical images of text in order to circumvent text- based filters S ECURITY A WARENESS, 3 RD E DITION 23
E-M AIL A TTACKS ( CONT ’ D.) Other techniques to circumvent spam filters GIF layering Word splitting Geometric variance Malicious attachments -distributed viruses Replicate by sending themselves in an message to all of the contacts in an address book S ECURITY A WARENESS, 3 RD E DITION 24
E-M AIL A TTACKS ( CONT ’ D.) Embedded hyperlinks Clicking on the link will open the Web browser and take the user to a specific Web site Trick users to be directed to the attacker’s “look alike” Web site S ECURITY A WARENESS, 3 RD E DITION 25
Figure 3-12 Embedded hyperlink S ECURITY A WARENESS, 3 RD E DITION 26 Course Technology/Cengage Learning
I NTERNET D EFENSES Several types Security application programs Configuring browser settings Using general good practices S ECURITY A WARENESS, 3 RD E DITION 27
D EFENSES T HROUGH A PPLICATIONS Popup blocker Separate program or a feature incorporated within a browser Users can select the level of blocking Spam filter Can be implemented on the user’s local computer and at corporate or Internet Service Provider level S ECURITY A WARENESS, 3 RD E DITION 28
D EFENSES T HROUGH A PPLICATIONS ( CONT ’ D.) Spam filter (cont’d.) client spam blocking features Level of spam protection Blocked senders (blacklist) Allowed senders (whitelist) Blocked top level domain list Bayesian filtering User divides messages into spam or not-spam Assigns each word a probability of being spam Corporate spam filter Works with the receiving server S ECURITY A WARENESS, 3 RD E DITION 29
D EFENSES T HROUGH A PPLICATIONS ( CONT ’ D.) Figure 3-16 Spam filter on SMTP server S ECURITY A WARENESS, 3 RD E DITION 30 Course Technology/Cengage Learning
D EFENSES T HROUGH A PPLICATIONS ( CONT ’ D.) security settings Configured through the client application Read messages using a reading pane Block external content Preview attachments Use an postmark S ECURITY A WARENESS, 3 RD E DITION 31
D EFENSES T HROUGH B ROWSER S ETTINGS Browsers allow the user to customize security and privacy settings IE Web browser defense categories: Advanced security settings Do not save encrypted pages to disk Empty Temporary Internet Files folder when browser is closed Warn if changing between secure and not secure mode S ECURITY A WARENESS, 3 RD E DITION 32
D EFENSES T HROUGH B ROWSER S ETTINGS ( CONT ’ D.) IE Web browser defense categories (cont’d.): Security zones Set customized security for these zones Assign specific Web sites to a zone Restricting cookies Use privacy levels in IE S ECURITY A WARENESS, 3 RD E DITION 33
D EFENSES T HROUGH B ROWSER S ETTINGS ( CONT ’ D.) Table 3-3 IE Web security zones S ECURITY A WARENESS, 3 RD E DITION 34 Course Technology/Cengage Learning
E- MAIL D EFENSES T HROUGH G OOD P RACTICES Use common-sense procedures to protect against harmful Never click an embedded hyperlink in an Be aware that is a common method for infecting computers Never automatically open an unexpected attachment Use reading panes and preview attachments Never answer an request for personal information S ECURITY A WARENESS, 3 RD E DITION 35
I NTERNET D EFENSE S UMMARY Table 3-4 Internet defense summary S ECURITY A WARENESS, 3 RD E DITION 36 Course Technology/Cengage Learning
S UMMARY Internet composition Web servers Web browsers Internet technologies HTML JavaScript Java ActiveX S ECURITY A WARENESS, 3 RD E DITION 37
S UMMARY ( CONT ’ D.) Privacy risk Cookies Adware Security risk Mistyped Web address Drive-by downloads security Spam Attachments Security applications S ECURITY A WARENESS, 3 RD E DITION 38