Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security facilities for secure communication.

Similar presentations


Presentation on theme: "Internet Security facilities for secure communication."— Presentation transcript:

1 Internet Security facilities for secure communication

2 MALWARE Malware refers to any program or computer code deliberately designed to harm any portion of a computer system The three most common forms of malware are viruses are viruses, worms and trojan horses Morris worm was created in 1988 and infected 6,000 computers using the UNIX operation system.

3 MALWARE COUNTERMEASURES Antivirus – Signature scanning: a virus signature is a string of binary code unique to a particular virus. Virus signatures are also known as fingerprints or patterns. Because new viruses appear all the time, a virus program’s signature file must be updated frequently to maintain the program’s ability to defend against threats. Many antivirus programs will automatically inform users when a new virus signature update is available for download.

4 Disadvantages of signature scanning – Polymorphic viruses change with each replication. The constantly changing signature of a polymorphic virus makes it more difficult to detect using signature files alone. – Signature scanning also is ineffective against new viruses for which signature updates do not yet exist – It detects malware only after it has infected a computer system

5 Heuristic scanning looks for general malware characteristics rather than specific characteristics such as a signature. Heuristic problem solving relies on previous experience or knowledge. An antivirus program that uses heuristic scanning examines file size, architecture, or code behavior. Heuristic scanning can produce false positives and negatives.

6 For e.g.. It might report a legitimate software program as malware on the basis that it shares some characteristics with known malware programs. Just as with signature scanning, heuristic scanning software requires periodic updates to ensure that the catalog of suspicious characteristics is up to date.

7 Behavior Blocking looks for typical malware behaviors, such as attempts to change computer settings, the opening and or alteration of files, attempts to open computer ports etc. Ports are computer doorways used for various activities, and an open or unguarded port can be the entryway for malware. It is becoming popular since hackers face greater difficulty changing the behavior of malware than changing a virus signature

8 FIREWALLS It is a hardware or software barrier located between the internet and a computer or computer network. Many routers available nowadays contain built-in firewalls A firewall is a system of hardware and software that connects the intranet to external networks, such as the internet. It blocks unauthorized traffic from entering the intranet and cal also prevent unauthorized employees from access the intranet

9 Two components of firewalls are a proxy server and caching. Proxy server is a server, or remote computer, that may exist outside of the organization’s network, ad all communications to the organization are routed through it. The proxy server decides which messages or files are safe to pass through to the organization’s network. It can also provide document caching

10 Caching is to store copies of web pages for quick access; the purpose is to speed up the web for their users. The only difficulty with this practice is that the original web page may have been updated, but this is not reflected on the copy in the cache in the proxy computer.

11 Firewalls Routers available nowadays contain built-in firewalls. A firewall filters data arriving through the internet to protect the system from any threats. Firewalls can be configured to reject incoming packets based on the IP address or domain name they originate from. This prevents the entry of data from sites known to harbor threats.

12 Firewall A user can configure a firewall to allow or disallow the use of different protocols e.g. restricting FTP to prevent unauthorized file transfers from taking place. Firewalls can also filter incoming packets for text they might contain. Start with the highest level of security when you configure a firewall. If it creates problems denying access to legitimate data, adjust the configuration until an appropriate balance between security and convenience is achieved

13 Firewalls can help prevent malware but antivirus are also needed.

14 Service Patches and updates It’s important to install security patches.

15 Password protection Passwords help protect your computers

16 CYBER CRIME It refers to crimes committed using the internet. Some cyber crimes are phishing/spoofing, 419 scams, DOS attacks, brute force attacks

17 Phishing It is when an online scammer sends a user an e-mail that appears to be from a legitimate and well-known company to try to trick the user into sending confidential information. The practice of disguising an e-mail or a web site so that it appears to belong to a well- known company such as yahoo, Google or others is called spoofing.

18 Phishing The e-mail typically lists a URL that will direct victims to a spoofed web site that gives every appearance of being the legitimate web site of a familiar company. Many users recognize phishing attempts by noticing obvious spelling or grammatical errors. Current phishing attacks are estimated to have a 3% success rate.

19 419 Scams The 419 scam, or advance fee fraud, is a very popular cyber crime committed using e-mail. This scam gets its name from a section of the Nigerian penal code, because the vast majority of this type of crime originates in that country. E.g. have to pay money to attend a seminar or has money and needs help etc.

20 DOS attacks Sending a lot of traffic to deny the network from functioning. DDOS (distributed denial of service), a Trojan horse is used to download a small program onto an unsuspecting internet user’s computer. The program transforms the computer into a zombie that is used to send messages to the target of coordinated DDOS attack.

21 Brute force attacks

22 Cyber crime countermeasures Internet explore security settings Encryption and authentication – Symmetric and asymmetric encryption – Digital certificates – Digital signatures – Secure sockets layer (SSL) protocol Biometric authentication

23 Threats to privacy Spam Adware/spyware Cookies Inappropriate content

24 Privacy countermeasures Spam blocking methods Spyware/adware avoidance Cooking blocking Parental control software


Download ppt "Internet Security facilities for secure communication."

Similar presentations


Ads by Google