Threats to computers Andrew Cormack UKERNA.

Slides:



Advertisements
Similar presentations
Implications and Security Issues of the Internet By Neelesh Patel.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
FIT3105 Security and Identity Management Lecture 1.
Handling Security Incidents
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Web server security Dr Jim Briggs WEBP security1.
Lesson 19: Configuring Windows Firewall
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
APA of Isfahan University of Technology In the name of God.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Network and Internet Security SYSTEM SECURITY. Virus Countermeasures Antivirus approach ◦Ideal solution: Prevention ◦Not allowing the virus to infect.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Prepared By, Mahadir Ahmad. StopBadware makes the Web safer through the prevention, mitigation, and remediation of badware websites. partners include.
Current Network Schema Router Internet Switch PC.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Anderson School of Management University of New Mexico.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Internet and Intranet Fundamentals Class 8 Session A.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 CHAPTER 2 LAWS OF SECURITY. 2 What Are the Laws of Security Client side security doesn’t work Client side security doesn’t work You can’t exchange encryption.
Security at NCAR David Mitchell February 20th, 2007.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Denial of Service Attack 발표자 : 전지훈. What is Denial of Service Attack?  Denial of Service Attack = DoS Attack  Service attacks on a Web server floods.
Topic 5: Basic Security.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
Malicious Software.
Computer Security Status Update FOCUS Meeting, 28 March 2002 Denise Heagerty, CERN Computer Security Officer.
Computer Security By Duncan Hall.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Hackers and Scanners Antti Palokangas. Hackers & scanners Most of scanners are easy to use and widely distributed It is no longer a question of if, but.
Information Security: Current Threats Marc Scarborough Information Security Officer
-SHAMBHAVI PARADKAR TE COMP  PORT SCANNING.  DENIAL OF SERVICE(DoS). - DISTRIBUTED DENIAL OF SERVICE(DDoS). REFER Pg.637 & Pg.638.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
Network security Vlasov Illia
Botnets A collection of compromised machines
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 7 Network Security
COMPUTER CRIME.
Botnets A collection of compromised machines
Faculty of Science IT Department By Raz Dara MA.
Intrusion Detection system
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Test 3 review FTP & Cybersecurity
Network Security Mark Creighton GBA 576 6/4/2019.
6. Application Software Security
Presentation transcript:

Threats to computers Andrew Cormack UKERNA

Daily reported attacks Code Red (>850) Nimda (1936) As detected by just one MAN (c 5 class Bs) And many of these attacks are thousands of machines

Door rattling? These numbers are from just one MAN And many probes scan thousands of hosts Millions of JANET hosts attacked every day Automated scan/compromise programs If you’re vulnerable you will be compromised Security by obscurity is no longer tenable I think the handle fell off a while ago!

What are the targets? Random Resources Reputation Revenge Retaliation Scripts pick random IP address ranges Resources Intruders like our bandwidth, disk space, CPU power Reputation Intruders gain kudos for compromising high-profile sites Revenge Has your institution upset anyone recently? Retaliation Has one of your (ab)users upset anyone?

What can attackers do? Read, delete, modify your data Misuse your resources So they aren’t available for your users Attack others Leaving you to take the blame Attack you

Real examples All from JANET sites Mostly from automated, dumb, programs Because they can be examined Because they (usually) only do one thing How much more are intelligent people doing?

Threats: access to information Reading private information Viruses actively seek out passwords and credit cards Deleting vital information Department lost all files for six months Vandalism, or just removing traces? Modifying information Are there vulnerabilities in finance, exams, MLEs… ?

Threats: abuse of resources Software piracy Departmental FTP server used for distribution Pornography University systems used to store personal collection Site proxy used by group to access illegal material

Threats: attacking others Compromising systems Worms attempt break-ins to anything running HTTP Denial of Service (DoS) Compromised machines join flooding networks Viruses now carry these tools Real-world crimes Stolen credit card numbers used for purchases Blackmail, defamation, incitement, stalking, …

Threats: attacking you DoS attacks take sites off network Attacker with control of system is “inside” Attack other systems Read traffic on networks Disrupt service Firewall protection failed Social engineering attacks

Some good news Attacking is not rocket science Nor is defending Most successful attacks are preventable Well-publicised vulnerabilities Software fixes freely available Simple toolkit Network configuration Patches

What can you do? Crime prevention Reduce open windows Fit locks Limit direct access from the Internet Fit locks Secure hosts that are exposed or critical Guidelines and tools exist Use them and make sure others do