Computer Security What to Know and What to Do Presented to CUGG 10/2005 2/2012 Jamie Leben IT-Works Computer Services www.i-t-w.comwww.i-t-w.com 970-405-4399.

Slides:



Advertisements
Similar presentations
Copyright, The Malware Menagerie Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy at U.N.S.W., eCommerce.
Advertisements

Viruses & Spyware A Module of the CYC Course – Computer Security
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Presented by Jamie Leben IT-Works Computer Services
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Computer Security What to Know and What to Do Presented to CUGG Jamie Leben IT-Works Computer Services
Thank you to IT Training at Indiana University Computer Malware.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
Nasca Internet Networking and Security viruses.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Internet Security and Your Computer Welcome to Boot Camp.
What is Spam? d min.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Understand Malware LESSON Security Fundamentals.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Botnets A collection of compromised machines
Mark Ryan Professor of Computer Security 25 November 2009
Three steps to prevent Malware infection
What they are and how to protect against them
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Risk of the Internet At Home
Malware CJ
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Security What to Know and What to Do Presented to CUGG 10/2005 2/2012 Jamie Leben IT-Works Computer Services Copyright 2005

What to Know?

What to Know Consumers Union, the organization that publishes Consumer Reports, estimates there's a 1-in-3 chance this year that computer users at home will have their identity stolen or their computer damaged from the proliferation of malicious programs

What to Know Resources en.wikipedia.org - online encyclopedia, use to research unfamiliar computer terms en.wikipedia.org - online encyclopedia, use to research unfamiliar computer terms - National Cyber Security Alliance Home Page - National Cyber Security Alliance Home Page

What to Know Terminology ActiveX Controls (malicious): ActiveX is a Microsoft platform for software componentry. It is used to enable cross-application communication and dynamic object creation in any programming language that supports the technology. The embedding of COM into the Internet Explorer web browser (under the name of ActiveX) created a combination of problems that has led to an explosion of computer virus, trojan and spyware infections. These malware attacks mostly depend on ActiveX for their activation and propagation to other computers. ActiveX Controls (malicious): ActiveX is a Microsoft platform for software componentry. It is used to enable cross-application communication and dynamic object creation in any programming language that supports the technology. The embedding of COM into the Internet Explorer web browser (under the name of ActiveX) created a combination of problems that has led to an explosion of computer virus, trojan and spyware infections. These malware attacks mostly depend on ActiveX for their activation and propagation to other computers.

What to Know Terminology Botnet: Botnet is a jargon term for a collection of software robots, or bots, which run autonomously. A botnet's originator can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. A botnet can comprise a collection of cracked machines running programs (usually referred to as worms, Trojan horses, or backdoors) under a common command and control infrastructure. Botnets serve various purposes, including Denial-of-service attacks, creation or misuse of SMTP mail relays for spam, click fraud, and the theft of application serial numbers, login IDs, and financial information such as credit card numbers. Botnet: Botnet is a jargon term for a collection of software robots, or bots, which run autonomously. A botnet's originator can control the group remotely, usually through a means such as IRC, and usually for nefarious purposes. A botnet can comprise a collection of cracked machines running programs (usually referred to as worms, Trojan horses, or backdoors) under a common command and control infrastructure. Botnets serve various purposes, including Denial-of-service attacks, creation or misuse of SMTP mail relays for spam, click fraud, and the theft of application serial numbers, login IDs, and financial information such as credit card numbers.

What to Know Terminology Firewall: In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. Firewall: In computing, a firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction.

What to Know Terminology Malware: Malware (a portmanteau of "malicious software") is software program designed to fulfill any purpose contrary to the interests of the person running it. Examples of malware include viruses and trojan horses. Malware: Malware (a portmanteau of "malicious software") is software program designed to fulfill any purpose contrary to the interests of the person running it. Examples of malware include viruses and trojan horses.

What to Know Terminology Peer to Peer (P2P): A peer-to-peer (or P2P) computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively few servers. P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes. Sharing content files (see file sharing) containing audio, video, data or anything in digital format is very common, and realtime data, such as telephony traffic, is also passed using P2P technology. Peer to Peer (P2P): A peer-to-peer (or P2P) computer network is a network that relies on the computing power and bandwidth of the participants in the network rather than concentrating it in a relatively few servers. P2P networks are typically used for connecting nodes via largely ad hoc connections. Such networks are useful for many purposes. Sharing content files (see file sharing) containing audio, video, data or anything in digital format is very common, and realtime data, such as telephony traffic, is also passed using P2P technology.

What to Know Terminology Pharming: Pharming is the exploitation of a vulnerability in the DNS server software that allows a cracker to acquire the Domain Name for a site, and to redirect that website's traffic to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses the "signposts" of the internet. Pharming: Pharming is the exploitation of a vulnerability in the DNS server software that allows a cracker to acquire the Domain Name for a site, and to redirect that website's traffic to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses the "signposts" of the internet.

What to Know Terminology Spyware: Spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent. Spyware: Spyware is a broad category of malicious software intended to intercept or take partial control of a computer's operation without the user's informed consent.

What to Know Terminology SSL security certificate: SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use, only the server is authenticated (i.e. its identity is ensured) while the client remains unauthenticated. SSL security certificate: SSL provides endpoint authentication and communications privacy over the Internet using cryptography. In typical use, only the server is authenticated (i.e. its identity is ensured) while the client remains unauthenticated.

What to Know Terminology Phishing: In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterised by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an or an instant message. The term phishing arises from the use of increasingly sophisticated lures to "fish" for users' financial information and passwords. Phishing: In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterised by attempts to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business in an apparently official electronic communication, such as an or an instant message. The term phishing arises from the use of increasingly sophisticated lures to "fish" for users' financial information and passwords.

What to Know Terminology Trojan: A trojan horse program has a useful and desired function, or at least it has the appearance of having such. Secretly the program performs other, undesired functions. The useful, or seemingly useful, functions serve as camouflage for these undesired functions. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind. They relied on fooling people to allow the program to perform actions that they would otherwise not have voluntarily performed. Trojans of recent times also contain functions and strategies that enable their spreading. This moves them closer to the definition of computer viruses, and it becomes difficult to clearly distinguish such mixed programs between Trojan horses and viruses. Trojan: A trojan horse program has a useful and desired function, or at least it has the appearance of having such. Secretly the program performs other, undesired functions. The useful, or seemingly useful, functions serve as camouflage for these undesired functions. The kind of undesired functions are not part of the definition of a Trojan Horse; they can be of any kind. They relied on fooling people to allow the program to perform actions that they would otherwise not have voluntarily performed. Trojans of recent times also contain functions and strategies that enable their spreading. This moves them closer to the definition of computer viruses, and it becomes difficult to clearly distinguish such mixed programs between Trojan horses and viruses.

What to Know Terminology Virus: In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Virus: In computer security technology, a virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents.

What to Know Terminology Worm: A computer worm is a self-replicating computer program, similar to a computer virus. a worm is self-contained and does not need to be part of another program to propagate itself. Worm: A computer worm is a self-replicating computer program, similar to a computer virus. a worm is self-contained and does not need to be part of another program to propagate itself.

What to Know Terminology Rootkit: A rootkit is a stealthy type of malicious software (malware) designed to hide the existence of certain processes or programs from normal methods of detection and enables continued privileged access to a computer. Rootkit: A rootkit is a stealthy type of malicious software (malware) designed to hide the existence of certain processes or programs from normal methods of detection and enables continued privileged access to a computer.softwareprivileged accesssoftwareprivileged access

What to Do?????

What to Do? Don't let the grandkids use the computer :) They are great for installing malicious ActiveX and javascript They are great for installing malicious ActiveX and javascript Many use P2P software- a haven for infected files Many use P2P software- a haven for infected files Will readily click the button labeled Will readily click the button labeled Click here to install junk on this machine Click here to install junk on this machine

What to Do? Antivirus software installed and up to date Microsoft Security Essentials Microsoft Security Essentials Free Avast antivirus Free Avast antivirus Free AVG antivirus Free AVG antivirus I suggest 1 antivirus program, and 1 or more antispyware programs I suggest 1 antivirus program, and 1 or more antispyware programs

What to Do? Antispyware software installed and up to date Malwarebytes Malwarebytes Ad-Aware Ad-Aware Spybot Search and Destroy Spybot Search and Destroy

What to Do? Have an active Firewall External router is a good idea w/ high speed External router is a good idea w/ high speed Windows XP SP1 or greater includes a good firewall Windows XP SP1 or greater includes a good firewall Vista, 7, Mac OS X, and Linux include good firewall Vista, 7, Mac OS X, and Linux include good firewall

What to Do? Update operating system - free updates for windows - free updates for windows Keep automatic updates enabled, install updates when recommended Keep automatic updates enabled, install updates when recommended

What to Do? Use a (free) alternative browser- Chrome Chrome Firefox Firefox Opera Opera Safari Safari

What to Do? Don't trust s claiming to be from banks, ebay, paypal Who can remember the term for these? Who can remember the term for these? Check for accuracy.

What to Do? Be extremely cautious of websites that produce (SSL) security certificate warnings May mean the website itself has been hijacked May mean the website itself has been hijacked Who recalls the term for this? Who recalls the term for this?

What to Do? Be cautious clicking pop up windows. Can link to trojans Can link to trojans

What to Do? Don't install ActiveX without verification Beware unsigned ActiveX control messages Beware unsigned ActiveX control messages

What to Do? Don't open attachments without verifying with the sender first.

What to Do? Be wary of content on Peer to peer file sharing networks (don't share copyrighted material)

What to Do? Switch to Linux or Mac OS

Im infected, what now? System restore to a known good dateSystem restore to a known good date Start in safe mode with networkingStart in safe mode with networking Download:Download: Tdsskiller (antirootkit) Tdsskiller (antirootkit) Combofix (antimalware) virus/combofix Combofix (antimalware) virus/combofix virus/combofix virus/combofix Malwarebytes (antimalware) Malwarebytes (antimalware) Run one at a time, in the order above, rebooting as the programs suggestRun one at a time, in the order above, rebooting as the programs suggest

Im infected, what now? Scan twice with combofix- once in safe mode, reboot into regular mode, scan againScan twice with combofix- once in safe mode, reboot into regular mode, scan again Repeat full scans with malwarebytes until the scans come clean, or your are on your third scan, with infections remaining- youll probably need to back up and reinstall.Repeat full scans with malwarebytes until the scans come clean, or your are on your third scan, with infections remaining- youll probably need to back up and reinstall.

Questions?