Presentation is loading. Please wait.

Presentation is loading. Please wait.

Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.

Similar presentations


Presentation on theme: "Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious."— Presentation transcript:

1 Sydney Baize Mrs. Shirley Miller BPC110

2

3

4 “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess Send probes See which computers have Back Orifice Controls Uses BO to enter computer and gather whatever information they want Back Orifice: A computer program that enables a user to control a computer with Microsoft Windows OS from a remote location. VuzeLimeWire

5 Hackers can do infinite amounts of damage to a computer once they have control.  Gather info  History  Files  Passwords  Hack other computers

6 Firewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic. Examine Check data packets the computer is receiving Search Look to see if packets are being sent to certain ports Block and/or Alert

7 Block selectively or all packets sent to common hacker used ports Alert user when programs attempt to connect to Internet Block specific IP addresses Keep log of every attempted probe/attack made

8  Many types of Spyware  2 things in common 1.Spy ▪ Track searches ▪ Record keystrokes ▪ Watch pages visited ▪ Open backdoor 2.Install without knowledge ▪ Piggyback other software ▪ Be misleading

9  Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable.  Spyware is tricky  When software it piggybacked from is deleted, the Spyware is not  Can be Polymorphic- spawns new copies in other locations when detected

10 Spyware is most commonly used to make money. Anti-spyware is a necessity Special spyware deleting software is sometimes needed as well

11 Scans Searches system for bits called signatures: signs of obvious infection Compares Compares found signature to ones in its database. If a match is found- there is an infection. Deletes Deletes the spyware once it’s found, may require special program since spyware can often leave traces in more than one place

12 Looks for suspicious behavior Constantly updates to keep track of latest infections Works in real time: watches for signs of spyware being installed or pages being hijacked

13 Tips Know the dangers of the Web Share as little personal info as possible Don’t look past suspicious behavior Install reputable protection software

14 Gralla, Preston. How Personal & Internet Security Work. Indianapolis: Que Publishing, 2006. Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014. Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014. U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999. US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.


Download ppt "Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious."

Similar presentations


Ads by Google