CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

POSSIBLE THREATS TO DATA
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
電腦攻擊與防禦 The Attack and Defense of Computers
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
電腦攻擊與防禦 The Attack and Defense of Computers CEA036許富皓.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
電腦攻擊與防禦 The Attack and Defense of Computers CE6107許富皓.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
CSC 382: Computer SecuritySlide #1 Firewalls. CSC 382: Computer SecuritySlide #2 Single Host Firewall Simplest type of firewall—one host acts as a gateway.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Network Monitoring.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Polytechnic University Introduction1 CS 393/682: Network Security Professor Keith W. Ross.
CIT 380: Securing Computer Systems Security Solutions Part 2.
Changes in Computer Security Will You Be Better Off?
Business Technology Applications What is Malware.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
CSC 382: Computer SecuritySlide #1 CSC 382: Computer Security Threats.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Scanning.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
CSC 382: Computer Security
CYBER SECURITY...
Instructor Materials Chapter 7 Network Security
Various Types of Malware
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

CIT 380: Securing Computer SystemsSlide #1 CIT 380 Securing Computer Systems Threats

Scary Internet Stuff: Underground __Dxk&feature=relatedhttp:// __Dxk&feature=related CIT 380: Securing Computer SystemsSlide #2

CIT 380: Securing Computer SystemsSlide #3 What Are Our Defenses? Firewalls Virus Scanners Spyware Scanners Intrusion Detection Systems (IDS/IPS) Patches Backups Prevent Detect Respond Recover

CIT 380: Securing Computer SystemsSlide #4 What Are The Attacks? Phishing Malware Ransomware Spyware Botnets

CIT 380: Securing Computer SystemsSlide #5 Phishing

CIT 380: Securing Computer SystemsSlide #6 Phishing Site

Scary Internet Stuff: Phishing 3x3I&feature=relatedhttp:// 3x3I&feature=related CIT 380: Securing Computer SystemsSlide #7

Amazon.com - Your Cancellation ( ) Dear Customer, Your order has been successfully canceled. For your reference, here`s a summary of your order: You just canceled order # Status: CANCELED _____________________________________________________________________ ORDER DETAILS Sold by: Amazon.com, LLC _____________________________________________________________________ Because you only pay for items when we ship them to you, you won`t be charged for any items that you cancel. Thank you for visiting Amazon.com! Amazon.com Earth`s Biggest Selection ORDER DETAILS CIT 380: Securing Computer SystemsSlide #8

CIT 380: Securing Computer SystemsSlide #9 Malware Trojan Horses Viruses Worms

CIT 380: Securing Computer SystemsSlide #10 Ransomware

CIT 380: Securing Computer SystemsSlide #11 Spyware and Adware Most Trojan Horses, some infect directly. –Browser hijacking –Pop-up advertisements –Keystroke and network logging –Steal confidential data from and files

Spyware and Adware 89% of PCs are infected with spyware (2006Q2 Webroot.) – re/excerpt.htmlhttp:// re/excerpt.html CIT 380: Securing Computer SystemsSlide #12

CIT 380: Securing Computer SystemsSlide #13 Rootkits Execution Redirection File Hiding Process Hiding Network Hiding User Program Rootkit OS

Rootkits Video NkZ4http:// NkZ4 CIT 380: Securing Computer SystemsSlide #14

CIT 380: Securing Computer SystemsSlide #15 Botnets Worm or direct attack usurps control of PC, then installs control software to listen for instructions. Instructions can include: Attempt to infect other PCs Send spam message Launch DOS attack Upgrade attack and control software Virus writers sell botnets to spammers for $0.10/compromised PC

Scary Internet Stuff: Botnets pNSshttp:// pNSs CIT 380: Securing Computer SystemsSlide #16

Wikipedia: Botnet –Historical list of botnets Kraken botnet – CIT 380: Securing Computer SystemsSlide #17

CIT 380: Securing Computer SystemsSlide #18 Key Points Computer crimes same as pre-computer crimes. Differences in digital threats –Automation –Action at a distance –Technique propagation Digital threats –Phishing –Malware –Ransomware –Spyware –Botnets

CIT 380: Securing Computer SystemsSlide #19 References 1.Alexander Gostev et. al., “Malware Evolution: January – March 2006,” Virus List, April 12, The Honeynet Project, Know Your Enemy, 2nd edition, Addison-Wesley, John Leyden, "The illicit trade in compromised PCs," The Register, Apr Stuart McClure, Joel Scambray, and George Kurtz, Hacking Exposed, 5th edition, McGraw-Hill, Rachna Dhamija and J. D. Tygar, "The Battle Against Phishing: Dynamic Security Skins," Proceedings of the Symposium on Usable Privacy and Security (SOUPS), July SANS Internet Storm Center, 7.Schneier, Bruce, Beyond Fear, Copernicus Books, Ed Skoudis, Counter Hack Reloaded, Prentice Hall, Stuart Staniford, Vern Paxson, and Nicholas Weaver, "How to 0wn the Internet in Your Spare Time," Proceedings of the 11th USENIX Security Symposium, Richard Stiennon, "Spyware: 2004 Was Only the Beginning," CIO Update, Jan Thompson, Ken, “Reflections on Trusting Trust”, Communication of the ACM, Vol. 27, No. 8, August 1984, pp (