Changes in Computer Security Will You Be Better Off?

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

POSSIBLE THREATS TO DATA
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Issues Raised by ICT.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Protecting Your Computer & Your Information
Security Chapter What Should I Ask Santa Claus For? spoofing: fraudulent activity in which the sender address and other parts of the.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
What is Spam? d min.
Internet safety By Suman Nazir
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
Business Technology Applications What is Malware.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Threats.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems Design and Development Security Risks Computing Science.
The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Botnets A collection of compromised machines
COMPUTER CRIMES Presented by THABO.
MALWARE Autumn Mattis.
CSC 382: Computer Security
3.6 Fundamentals of cyber security
CYBER SECURITY...
Instructor Materials Chapter 7 Network Security
Botnets A collection of compromised machines
– Communication Technology in a Changing World
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Changes in Computer Security Will You Be Better Off?

Topics 1. Who are the Attackers? 2. Computer Crime 3. What are our Defences? 4. Phishing 5. Malware 6. Botnets 7. Future of Security

Who Were The Attackers? Joy Riders Vandals Activists Opportunists

Who Are The Attackers? Thieves Spies Corporations

Computer Crime: The Same Stuff Theft Vandalism Extortion Con Games Fraud Stalking

Computer Crime: What’s Different Automation Action at a distance Knowledge propagation

What Are Our Defences? Firewalls Virus Scanners Spyware Scanners Patches Backups Prevent Detect Respond Recover

What Are The Attacks? Phishing Malware Ransomware Spyware Botnets

Phishing

Phishing Site

Malware Trojan Horses Viruses Worms

Ransomware

Spyware and Adware Most Trojan Horses, some infect directly. Browser hijacking Pop-up advertisements Keystroke and network logging Steal confidential data from and files 80% of PCs are infected with spyware (Oct 2004 AOL/NCSA survey.)

Rootkits Execution Redirection File Hiding Process Hiding Network Hiding User Program Rootkit OS

Botnets Worm or direct attack usurps control of PC, then installs control software to listen for instructions. Instructions can include: Attempt to infect other PCs Send spam message Launch DOS attack Upgrade attack and control software Virus writers sell botnets to spammers for $0.10/compromised PC

New Defences Least Privilege and MAC Secure Software Engineering Usable Security

Future of Attacks Deep Rootkits Mobile Malware Gone in 20 Minutes RFID Viruses Virtual Property Theft

References 1. Alexander Gostev et. al., “Malware Evolution: January – March 2006,” Virus List, April 12, The Honeynet Project, Know Your Enemy, 2nd edition, Addison- Wesley, John Leyden, "The illicit trade in compromised PCs," The Register, Apr Stuart McClure, Joel Scambray, and George Kurtz, Hacking Exposed, 5th edition, McGraw-Hill, Rachna Dhamija and J. D. Tygar, "The Battle Against Phishing: Dynamic Security Skins," Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July Ed Skoudis, Counter Hack Reloaded, Prentice Hall, Stuart Staniford, Vern Paxson, and Nicholas Weaver, "How to 0wn the Internet in Your Spare Time," Proceedings of the 11th USENIX Security Symposium, Richard Stiennon, "Spyware: 2004 Was Only the Beginning," CIO Update, Jan