Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security WeeSan Lee

Similar presentations


Presentation on theme: "Security WeeSan Lee"— Presentation transcript:

1 Security WeeSan Lee weesan@cs.ucr.eduweesan@cs.ucr.edu

2 Roadmap Security Risks Preventions References

3 Security Risks Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing

4 Security Risks - Computer Virus A small computer program that infects your computer without permission or knowledge of the user Infects others via a host media  Floppy disk  Email  … http://www.healthinitiative.org/IMAGES/virus_big.jpg

5 Security Risks - Worm A self-replicating program, spreads across the Internet May contain viruses 1 st worm was created by Robert T. Morris, a graduate student at Cornell U. in 1988 Computer Emergency Response Team (CERT) was created as a result http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG

6 Security Risks - Trojan Horse A program that disguises itself to be something useful or harmless  Eg. screensaver In fact, a backdoor program which allows unauthorized access remotely http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg

7 Security Risks - Adware An advertising-supported software

8 Security Risks - Spyware Adware + collecting user’s information without the user’s consent

9 Security Risks - Browser Hijacker A program that changes the settings on the web browser  Change the homepage to other website

10 Security Risks - Web Bug Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users AKA web beacon, tracking bug, … To avoid that:  Turn off image loading on email clients  Use text-based email such as pine http://www.prospexis.net/images/beatle2.gif

11 Security Risks - Hoaxes and Chain Letters Hoaxes are fake warnings, instructing you to delete files, playing on your sympathy, etc Chain letters implore you to pass the message to as many people as possible For examples  “This is not a hoax.”  “Forward this email to 10 people you know for good luck …”  “VIRUS! DELETE NTFS.SYS”

12 Security Risks - Phishing

13

14 Preventions Use anti-virus/firewall software  For examples AVG (http://free.grisoft.com/)http://free.grisoft.com/ Nod32 (http://www.eset.com/)http://www.eset.com/ Norton Antivirus (http://www.symantec.com/)http://www.symantec.com/  Schedule auto-update

15 Preventions (cont) Backup  Use 2 HDs  Burn CDs/DVDs and give them to your mom  Use online backup services http://www.carbonite.com/ Be educated Don’t “fool” around

16 References Internet Effectively  Ch 1  Ch 4 Wikipedia  http://www.wikipedia.com/ http://www.wikipedia.com/


Download ppt "Security WeeSan Lee"

Similar presentations


Ads by Google