Presentation is loading. Please wait.

Presentation is loading. Please wait.

Course Overview Part I Typical Concerns and Problems

Similar presentations


Presentation on theme: "Course Overview Part I Typical Concerns and Problems"— Presentation transcript:

1 Course Overview Part I Typical Concerns and Problems
What Computer Users Want to Avoid Types of Malware Explained Symptoms of Malware: Viruses, Worms, Trojan Horses, Rootkits, Spyware, Adware, and Phishing Firewalls Preventing Malware Malware Removal Backing Up Your Data Backup Recovery Troubleshooting Tools

2 Course Overview Part II Using Your Email Safely
Using Your Browser Safely Access Control Securing Your Computer Computer Security Checklist

3 TYPICAL CONCERNS AND PROBLEMS:
How did this (virus, malware, problem, etc.) get on here? Should I upgrade from Windows XP to Windows 7? Should I open this ? Should I reply to this ? Why do I have to go through a maze of choices every day? Updates are ready for your computer, what do I do? Message to upgrade from AVG 8.5 to 9.0 – what do I do? Can I encrypt the data on my laptop? Should I use Yahoo , or Outlook Express? Do I need to upgrade to IE8, or use Mozilla?

4 TYPICAL CONCERNS AND PROBLEMS:
I keep getting a strange message saying my computer is infected with 43 viruses. My computer takes forever to boot and is running slowly. How secure is the local area network I set up in my house? Is it okay for my kids to download music from Limewire and play World of Warcraft? I have five years worth of my Company’s Quickbooks, and no backup copy. What should I do? Somebody helped me install Bearshare onto my computer, why is it acting strangely?

5 WHAT COMPUTER USERS WANT TO AVOID
Malware - Adware, Spyware, Viruses, Trojans, Rootkits Theft of Identity Unwanted Internet content Unwanted s (spam) Annoyance, Slow and Unresponsive Performance Undetected use of your machine by hackers for spam propagation, D.O.S. attacks, etc.

6 WHAT COMPUTER USERS WANT TO AVOID
Someone “Eavesdropping” over a wired or wireless network Loss of important personal or business data Loss of Use of the machine and access to internet (in this day and age, a form of “dial tone” many can’t do without) Loss of investment through theft or damage to machine Loss of Privacy

7 Viruses, Worms, TROJAN HORSES, ROOTKITS, Spyware, ADWARE, AND PHISHING

8 WHAT ARE VIRUSES? Self-replicating software that causes system problems May attach to another piece of software Runs when opened Affects the system in some way Pranks System damage or data loss Compromises system security

9 WHAT ARE WORMS? Self-contained software that infects computer and attempts to spread to other computers Usually spread over a network May not require human interaction Can spread very quickly Spreads by way of system vulnerability Un-patched machines are vulnerable

10 WHAT IS A TROJAN HORSE? A "back door" software program that allows intruders to take remote control of a computer without the owner’s knowledge. Trojan Horses can be installed on computers through thousands of free software packages that can be downloaded from the Internet.

11 WHAT IS A ROOTKIT? An especially heinous Trojan Horse program or group of programs that can completely hide itself from a virus scan program by integrating itself into the core of the operating system. Rootkits typically start themselves before the machine's operating system making them capable of hiding multiple files, registry keys and/or programs from the operating system and thus the machine's virus scan software. A Rootkit takes Administrator level control of a system without authorization of the system's owners and managers. There is a high level of difficulty associated with removing a Rootkit.

12 SYMPTOMS OF VIRUS, WORM TROJAN HORSE, & ROOTKIT SYMPTOMS
Strange behavior such as Computer is slow, and/or boots very slowly Pop up warnings, but no company name Hard disk is suddenly full Unable to run or install certain software like anti-virus or firewall A sudden increase in network traffic (network connection lights are constantly blinking) Documents have been deleted or computer will not start A scan reports malware is present

13 SYMPTOMS OF VIRUS, WORM TROJAN HORSE, & ROOTKIT SYMPTOMS
Other Symptoms Longer-than-normal program load times Unpredictable program behavior Inexplicable changes in file sizes Inability to boot Strange graphics appearing on your screen Or unusual sounds may indicate that a virus is on your system. If your computer begins to act strangely, or if it stops being able to do things it has always done in the past, it may be infected with Malware.

14 WHAT IS CAUSE OF THE SYMPTOM?
It is important to distinguish between malware symptoms and those that come from corrupted system files, which can look very similar. Unless you have up-to-date anti-malware software, there is no sure way to know if you have a virus or not. To check whether you already have an antivirus software program installed on your computer, check the Programs list on the Start menu and look for an antivirus program. Many major computer manufacturers include at least a trial version of a popular antivirus software package. Be sure it is turned on.

15 WHAT IS SPYWARE? Spyware is a general term used for software that performs certain activities such as advertising, collecting personal information, or changing the configuration of your computer, generally without a obtaining your consent. You might have spyware or other unwanted software on your computer if: You see pop-up advertisements even when you are not on the Web. The page your Web browser first opens to (your home page) or your browser search settings have changed without your knowledge. You notice a new toolbar in your browser that you didn’t want, and find it difficult to get rid of. Your computer takes longer than usual to complete certain tasks. You experience a sudden rise in computer crashes.

16 SPYWARE SYMPTOMS Spyware can consume your PC’s resources.
A bad spyware infection could dramatically slow your computer’s performance including causing your system’s to become increasingly unstable. Spyware can take up bandwidth to communicate information back to its creator. Unable to access certain web sites Web-based Secure sites (HTTPS) Browser may be redirected to another page Start Up Programs – Some spyware variants will try to add themselves to your Windows start up program list. Boot up time becomes noticeably slower.

17 SPYWARE Spyware is often associated with software that displays advertisements (called adware) or software that tracks personal or sensitive information. Many of these programs track your Internet browsing habits and then provide advertising companies with marketing data. This does not mean all software which provides ads or tracks your online activities is bad. For example, you might sign up for a free music service, but "pay" for the service by agreeing to receive targeted ads. If you understand the terms and agree to them, you may have decided that it is a fair tradeoff. You might also agree to let the company track your online activities to determine which ads to show you.

18 WHAT IS ADWARE? Adware — a general term used for software that invades your computer in the form of persistent pop-up ads. Adware is similar to spyware except it is used primarily for advertising purposes and may have provided the user with information about its operation. One of the biggest adware programs online is Gator.com. Gator may help fill in Web forms, but it is also one of the most aggressive software programs for adware on the market.

19 ADWARE SYMPTOMS Often get unwanted pop-ups, even when not using your web browser Browser may be redirected to another page Unwanted Browser Toolbars – These programs are commonly bundled with free software which the publisher often describes as “advertiser supported.”

20 HOW DOES MALWARE GET ON YOUR COMPUTER?
Malware usually gets on your computer and spreads in one of several ways: From vulnerabilities in Windows programs From downloads off of the Internet From browsing infected Internet sites From attachments From using Instant Messaging From Peer to Peer File Sharing From external media such as CDs, USB Keys File Sharing Over the Network

21 TERMS Hacker — a general term used for anyone who spends time poking into computers and operating systems, trying to discover their vulnerabilities. A Hacker may look for and break into computers or networks without authorization, either for the fun of it or to steal valuable information such as credit card number. Threat — any event that may harm a system by means of destruction, disclosure, modification of data, and/or denial of service. Vulnerability — a weakness in security procedures that may be used to violate a system security policy. Risk — the probability that a vulnerability will cause a harmful result. Malware — A term which is emerging to refer to any software written with malicious intent. Trojan horse — "back door" software program that allows intruders to take remote control of a computer without the owner’s knowledge. Trojans can be installed on computers through thousands of free software packages that can be downloaded from the Internet. Virus — a piece of code that replicates by attaching itself to another object. It can attack the registry, replace system files, or take over programs in its attempt to replicate itself. Worm — an independent program that replicates by copying itself from one computer to another, usually over a network or through attachments. A particularly common use of worms is to make computers spew out so much bad network traffic that they cause networks and servers to fail. Spyware — a general term used for software that performs certain “secret” behaviors such as advertising or collecting personal information, generally without obtaining your consent. Adware — a general term used for software that invades your computer in the form of persistent pop-up ads. Spyware is software designed to intercept or take partial control of a computer with out the express consent of the operator Adware is similar to spyware except it is used primarily for advertising purposes and may have provided the user with information about its operation Phishing — a form of social engineering where an attacker tries to fradulently acquire sensitive information, such as a password, bank account number, social security number, etc., by masquerading as a trustworthy entity with official looking electronic communication ( , instant message, etc.).

22 TERMS Denial of Service Attack (DoS) — a term used when an attacker attempts to prevent legitimate users from accessing information or services. The most common and obvious type of DoS attack occurs when an attacker “floods” a network with information. Distributed Denial of Service Attack (DDoS) — a DoS attack where the attacker uses multiple machines rather than one machine to prevent legitimate users from accessing information or servies. This type of attack is generally more effective than a traditional DoS attack. Man-in-the-Middle Attack - A system between two hosts that either passively watches traffic to gain information used to “replay” a session or actively interferes with the connection, potentially imitating the remote system. Zombies - Computer system infected by a virus or Trojan horse that allows the system to be remotely controlled for future exploits. These systems may be used to send large amounts of spam or take part in Distributed Denial of Service (DDoS) attacks.

23 TERMS Password Cracker - An application that tries to obtain a password by repeatedly generating and comparing encrypted passwords or by authenticating multiple times to an authentication source. Common methods of Password cracking Brute Force Dictionary Biometrics – When used in Information Technology it usually refers to the use of human traits for authentication This method can include fingerprints, eye retinas and irises, voice patterns, and a host of other consistent biological data Social Engineering — the practice of obtaining confidential information by manipulation; for example, people claiming to be administrators may trick computer users in to divulging sensitive information. Grayware – Annoying, Unwanted Applications that “find their way” to your PC without your consent Crimeware – Malware designed with the express purpose of aiding criminal activity, udually for financial gain or identity theft. Password Cracker - An application that tries to obtain a password by repeatedly generating and comparing encrypted passwords or by authenticating multiple times to an authentication source. Common methods of Password cracking Brute Force Dictionary Passwords are usually stored in an encrypted form with a one way encryption algorithm If this data is compromised, password cracking can be moved to a standalone system for easier control and speed of cracking.

24 TERMS Key Logging Software - Software or Hardware installed on a system to capture and log all keystrokes Security Exploit - A software bug, or feature, that allows access to a computer system beyond what was originally intended by the operator or programmer. Peer-to-Peer File sharing, or P2P, is using software to facilitate the transfer of data between two systems without the need for a central file server HTTP - (Hyper Text Transfer Protocol) URL - (Uniform Resource Locator) Firewall — software, hardware or both used to block unauthorized access to a machine or a network. A firewall can be internal (on an individual machine) or external (a separate piece of hardware on a network protecting multiple machines); however, the use of both internal and external firewalls is commonplace. Ranges from simple to complex, Local operating system firewalls are referred to as “personal firewall software”

25 FIREWALLS Firewalls Hardware – Most Wireless Routers act as a Firewall
Software (Windows Firewall or a vendor’s firewall – for example Zone Alarm) Understanding Windows Firewall A firewall is a system or software that controls the flow of traffic between networks and protects your computer or network from an attacker who might damage or get access to your personal information. This extra layer of protection is especially important if your computer has an “always on” Internet connection such as a cable modem or a DSL line. When someone on the Internet or a network tries to connect to your computer, Windows Firewall blocks the unsolicited connection. If you run a program such as an instant messaging program, the firewall will ask if you want to block or unblock the connection. If you choose to unblock the connection, Windows Firewall creates an exception and automatically allows the connection next time. Windows Vista and 7 install and enable the Windows Firewall by default.

26 FIREWALL DIAGRAM

27 LAYERS OF SECURITY

28 FIREWALLS The Windows Firewall:
Designed to prevent unsolicited connections from reaching or originating from your computer. You may have to configure it to allow connections for certain programs and services. If this is the case, you can make exceptions in the Windows Firewall for those programs. Never allow an exception for a program that you don’t recognize. Windows XP Note: Windows XP Service Pack 2 must be installed in order to see the Windows Firewall icon in the Control Panel. The Windows Firewall does not: Detect or disable computer viruses and worms if they are already on your computer. However, it will help block computer viruses and worms from reaching your computer. Stop you from opening with dangerous attachments. Block spam or unsolicited from appearing in your inbox.

29 FIREWALLS

30 UPDATES Keep Windows operating system current and updated with current patches and service packs. Keep Windows applications (like Microsoft Office applications) current. In any Microsoft Office application, go to the Help menu, select Check for Updates. In a Web browser, go to the link at: Microsoft Office updates are also available on CD by clicking on the link “Order service pack CDs.”

31 MICROSOFT BASELINE SECURITY ANALYZER (MBSA)
Use it to identify common security vulnerabilities. (It may be difficult to keep up with all of the security fixes and updates for Windows, even with the assistance of Windows Update. MBSA is a tool that checks the latest list of fixes and compares it with the ones that have been installed on one or more computers. In addition, MBSA checks for common security vulnerabilities, such as weak passwords and insecure configuration.

32 ANTI-MALWARE PROGRAMS
Commonly used Anti Malware Programs include AVG, Microsoft Security Essentials, Norton, Mcaffee, Kaspersky, Adaware, Spyware Doctor. Obtain and install an antivirus program on your computer. Enable Resident Shield – May be called Proactive Threat Protection or similar name. Perform or schedule Virus Signature Updates to occur frequently. Perform manual virus scans on external media. Schedule a virus scan to occur on a regular basis.

33 MALWARE PREVENTION Keep anti-virus definitions up-to-date
Anti Malware Programs Set Up a Sandbox to run a program before you do. (Messer) Keep anti-virus definitions up-to-date

34 MALWARE PREVENTION Keep your systems patched Run a software firewall
Automatic updates on Windows Software Updates on OS X Run a software firewall Already included in most operating systems Verify it is turned on! Run up-to-date anti-virus software Don’t connect computer directly to Internet Use a hardware firewall or router Run as a standard user instead of Administrator Limits possible damage

35 MALWARE PREVENTION Ensure software firewall is running


Download ppt "Course Overview Part I Typical Concerns and Problems"

Similar presentations


Ads by Google