Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland

Similar presentations


Presentation on theme: "Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland"— Presentation transcript:

1 Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland james.harland@rmit.edu.au

2 Lecture 22: Internet SecurityIntro to IT Introduction to IT 1-4 Introduction, Images, Audio, Video 5-6 Computer Fundamentals Assignment 1, WebLearn Test 1 7 Review 8 Operating Systems WebLearn Test 2 9 Operating Systems Assignment 2 10 Internet 11 Internet Security WebLearn Test 3 12 Future of ITAssignment 3, Peer and Self Assessment

3 Lecture 22: Internet SecurityIntro to IT Overview  Questions?  Assignment 3  Internet Security  Questions?

4 Lecture 21: Internet SecurityIntro to IT Intro to IT Schedule WeekLecture 1Lecture 2 11Internet ProtocolsInternet Security 12Future of IT Review by request or more Future of IT 13Mock Exam Wednesday 2 nd June

5 Lecture 21: Internet SecurityIntro to IT Mock Exam  10.30-1.00 on Wednesday 2 rd June in 12.08.02  Bring your own paper, pens, etc.  Calculators allowed  Answers will be available from me when you leave Schedule:  10.30 Access to room  10.45 Reading time commences  11.00 Writing time commences  1.00 Exam concludes

6 Lecture 21: Internet SecurityIntro to IT Assignment 3 Review (re-) answer What is IT? questions from Tutorial 1 Identify difficult parts of the course Suggest new questions Include favourites from Assignments 1 and 2 Reflect Answer reflection questions from tutorials Research Write about a particular IT topic of your choice (5-6 paragraphs)

7 Lecture 21: Internet SecurityIntro to IT Internet Security password patch spam fire wall virus war driving key logger proxy wormphishing Trojan horse

8 Security vs access  It is always a trade-off (a balance between two competing forces)  More security means less access  More access means less security  Redundancy can be either fatal or vital  Nothing is perfect!

9 Freedom vs security  `Everything which is not forbidden is allowed’ -- Principle of English Law  `Everything which is not allowed is forbidden’ -- Common security principle  `Anything not mandatory is forbidden’ -- “military policy”  `Anything not forbidden is compulsory’ (??) — T.H. White (The Once and Future King)

10 Lecture 7: Internet SecurityIntro to IT Passwords  Should be:  Long (8 characters or more)  Not obvious or from a dictionary  Contain capitals, numerals and non- alphanumeric characters (!&^*$@.,’[]{}? …)  Recorded securely somewhere  Transmitted in encrypted form only  Older programs such as FTP, Telnet transmit this in plaintext …

11 Lecture 7: Internet SecurityIntro to IT Firewalls  Device which limits internet connections  Limit network uses to only approved ones  Prevent malicious software reporting information  Prevent outside attacks  May need to have ports opened to allow applications to work  Only work on applications, not on content

12 Lecture 7: Internet SecurityIntro to IT Proxy servers  All internet traffic routed via proxy server  Acts as an internet gateway  Once proxy is secure, so is network  Can filter content  Can cache content  Often used with a firewall in a corporate environment

13 Lecture 7: Internet SecurityIntro to IT Wardriving  Driving around to find a vulnerable wireless signal  Find a wireless connection that doesn’t require a password (so add one to yours if you haven’t!)  Attack systems that use a default admin login name and password (change yours!)  Snoop on transmissions which are not encrypted (encrypt yours!)  Using a MAC address whitelist means only specified devices can connect to your router

14 Lecture 7: Internet SecurityIntro to IT Viruses,Worms,Trojans  Virus: self-replicating program that attaches itself to files and is spread when they are transferred  Worm: self-replicating program that pro- actively spreads itself  Trojan horse: a program that appears legitimate but is in fact malicious

15 Lecture 7: Internet SecurityIntro to IT Malware and Spyware  Malicious software:  Hidden mail server  Key logging (to capture passwords)  Enable machine takeover  Direct traffic to particular web sites  Analyse behaviour  Act as a proxy  …

16 Lecture 7: Internet SecurityIntro to IT Denial of service  Prevent network from working normally  Flood a server with ‘invalid’ inputs  Use a network of compromised machines to generate an overwhelming number of requests (Conficker?)  Such zombie machines can form a botnet, which then attack a particular server

17 Lecture 7: Internet SecurityIntro to IT Tricking the user  Users are often the weakest link in security  Email attachments containing trojan horses  ‘Phishing’  Malicious web pages  Malicious documents (macros in spreadsheets)  Account stealing (via key logging)  Scams (‘I have $10 million to import’, ‘You have just won the lottery’, …)

18 Lecture 7: Internet SecurityIntro to IT Protecting your system  Keep up to date with patches (Windows update, Software update)  Use a firewall  Use anti-virus software and keep it up to date  Use anti-spyware tools  Filter email for spam and suspicious messages  Be aware of ‘fake alerts’

19 Lecture 21: Internet SecurityIntro to IT Conclusion  Work on Assignment 3  Check your software defenses!


Download ppt "Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland"

Similar presentations


Ads by Google