Internet Security Submitted to Professor Mort Anvari

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Configuring Windows to run Dr.Web scanner remotely.
7 Effective Habits when using the Internet Philip O’Kane 1.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Lesson 19: Configuring Windows Firewall
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Instant Messaging Security Flaws By: Shadow404 Southern Poly University.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
Installing Samba Vicki Insixiengmay Jonathan Krieger.
Microsoft October 2004 Security Bulletins Briefing for Senior IT Managers updated October 20, 2004 Marcus H. Sachs, P.E. The SANS Institute October 12,
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Cyber Patriot Training
Configuring a Web Server. Overview Overview of IIS Preparing for an IIS Installation Installing IIS Configuring a Web Site Administering IIS Troubleshooting.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
What Is A Trojan Horse? A Trojan horse is: An unauthorized program contained within a legitimate program. This unauthorized program performs functions.
Honeypot and Intrusion Detection System
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
1 Internet Browsing Vulnerabilities and Security ECE4112 Final Lab Ye Yan Frank Park Scott Kim Neil Joshi.
WIRELESS NETWORKS AT HOME Presentation 9 th December 2004 Simon G Fraser.
--Harish Reddy Vemula Distributed Denial of Service.
Firewalls. Intro to Firewalls Basically a firewall is a __________to keep destructive forces away from your ________ ____________.
Hacker’s Strategies Revealed WEST CHESTER UNIVERSITY Computer Science Department Yuchen Zhou March 22, 2002.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
Module 8: Designing Security for Authentication. Overview Creating a Security Plan for Authentication Creating a Design for Security of Authentication.
Remote Controller & Presenter Make education more efficiently
Hacking Windows 9X/ME. Hacking framework Initial access physical access brute force trojans Privilege escalation Administrator, root privileges Consolidation.
TCOM Information Assurance Management System Hacking.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
WebCCTV 1 Contents Introduction Getting Started Connecting the WebCCTV NVR to a local network Connecting the WebCCTV NVR to the Internet Restoring the.
A guide to file sharing on Windows XP Peer to Peer File Sharing.
CISCO NETWORKING ACADEMY Chabot College ELEC Internet Security Introduction.
1 Connecting to a Database Server. 2 We all have accounts, with a single database each, on a Microsoft SQL Server on the USF network: allman.forest.usf.edu.
LM/NTLMv1 Retirement Hosted by LSP Services.
Windows Administration How to protect your computer.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Some Network Commands n Some useful network commands –ping –finger –nslookup –tracert –ipconfig.
OVERVIEW Virus & Worm overview Virus & Worm Difference CodeRed Worm Impact Detection Prevention.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
WHAT ARE THE STEPS TO CONNECT MY HP DESKJET 3520 TO WI-FI?
Virtual Private Networks
Getting Connected to NGS while on the Road…
Dynamic Domain Name System
ETHICAL HACKING Presentation By: FATHIMA SHIMNA S3 ECE ROLL NO: 31 1.
Server Machines By Brett Gunder COSC 101.
Backdoor Attacks.
Home Computer Security
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Printers.
Unit 27: Network Operating Systems
Information Security Session October 24, 2005
PPPoE Internet Point to Point Protocol over Ethernet
MoMusician’s Classic PPT.
Configuring Internet-related services
Getting Connected to NGS while on the Road…
Connecting Remotely Winter 2014.
Background survey Skills: none
Internet Connection Sharing
Instructor: Mort Anvari
Test 3 review FTP & Cybersecurity
Presentation transcript:

Internet Security Submitted to Professor Mort Anvari Author: Yungeng Qi ID: 104293 Date: 11/16/2000

Internet Security Internet has become a part of people’s life, when you are surfing on the internet enjoying the huge resources, you are also open your door to rest of the world ! Today we will address some internet security holes regarding windows .xx operating system

Background information Nearly 80 percent home computers use windows operating system.(PC World) 80 percent of People using internet have E-transaction experience(PC world) Hundreds of IP address scanners can be obtained freely via internet(Asmodeus)

You may have known : “Denial of Service” shutting down Yahoo “Microsoft has been hacked recently and stolen of latest source code” You may not aware of your computer is also in danger caused by its operating system.

Let’s look at an experiment Visiting http://grc.com to probe my DSL-connected windows 98 system. The system contains : MS personal web server; internet explorer; pc anywhere; quicken; IRC,; ICQ;Telnet;FTP.

Here is the result: Pavilion is at IP 209.244.212.85 is being probed

Here is my network configuration

Here are the security holes The default File and Printer Sharing by NetBIOS & NetBEUI protocol. Blank logon password Too many application software installed

Two reasons causing security holes: NetBIOS & NetBEIU Vulnerability Inappropriate protocol binding

NetBIOS & NetBEIU Vulnerability Releasing machine name, volume name whenever connection established and being asked Backward compatibility. Allowing anonymous logon.

Inappropriate protocol binding

Solutions * Remove “Client for Microsoft Networks and its related file and printer sharing”

Solutions The improved protocol binding

Solutions Beware your other backdoors, such as:PWS; IRC;ICQ,;Telnet;browsers and email readers. They are also potential security holes. Try to use logon password, it can delay attack. Never run executable file from untrusted email source

Solutions Install Internet Firewall software

Solutions Turn off the internet access when you do not need it!

Questions Thank You Can you tell me what information I can get from your email sent with MS Outlook Express? Thank You