Presentation is loading. Please wait.

Presentation is loading. Please wait.

What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.

Similar presentations


Presentation on theme: "What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point."— Presentation transcript:

1 What are they? What do they have to with me?

2 Introduction  You may not know exactly what it is, but chances are you have encountered one at some point on the internet  Ever get a pop-up that tells you that you just won a free iPhone? Ever been asked to click on a link to redeem your prize or “find out who has a crush on you”? Then you have encountered an attempted malicious attack.

3 So what is it?  A malicious attack is anything that attempts to spread damaging viruses or “phishing”  What is phishing? It’s a criminal attempt at stealing your private information such as your credit card details, passwords, or bank account number using electronic mediums.  Also, it’s important to remember that dumpster diving is another form of phishing.

4 How do I know if I’m a victim?  Viruses are usually spread through e-mails and pop up windows. You may be infected by simply opening an e- mail or you may be presented with a link that will direct you to a false website that will contaminate your system.  Phishing is done by fooling you into thinking you are entering a trustworthy electronic communication. For instance, sending you an e-mail informing you that there is a complication with your bank account and presenting you with a link to a page that is designed to make you believe that it is your bank’s official website. Once you are on the false site you will usually be asked to give your personal information and you do so without any idea that you have been made a victim.

5

6 Background (Evolution)  Malicious attacks are considered cyber crimes.  Cyber crime = crimes that target computers directly or crimes facilitated by use of computer.  1820 – first recorded cyber crime.  1970 – developments in networking technology (email).  1990 – birth of internet.

7 Some important milestones  Wild virus, experimental virus  Robert Morris’s Worm  AIDS Trojan  First Macro Virus, Hackers  Windows 98  Denial of Service (DoS)

8 Steps towards lessening the problem.  Keep your antivirus up to date  Use anti-spam software  Use back-up systems  Don’t enter sensitive or financial information into pop-up windows  Use a Firewall  Don’t open hyperlinks in an email  Get educated (especially on phishing and hacking)

9 Criticisms  Things like encryption and copy protection mechanisms do not fully solve the issue. Encryption usually protects the data only on the transport channel, and as soon as the data is decrypted for display or playback, it can be copied.  Copy protection mechanisms are difficult to realize in open systems. Even in proprietary systems they are often circumvented sooner or later.  Thus, both encryption and copy protection offer only limited security.  Currently, heavy firewalls and watermarking are really the best options.

10 In our personal opinion…  We do not recommend malicious attacks of any kind.  Malicious Attacks such as phishing (email, IM, Phone calls, and Dumpster Diving.)  Once again…  Keep your antivirus up to date  Use anti-spam software  Use back-up systems  Don’t enter sensitive or financial information into pop-up windows  Use a Firewall  Don’t open hyperlinks in an email  get educated (especially on phishing and hacking)  Contact the Information Security Office  (412) 268-2044  Iso-ir@andrew.cmu.edu Iso-ir@andrew.cmu.edu


Download ppt "What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point."

Similar presentations


Ads by Google