Computer Basics Rabie A. Ramadan, PhD 6.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
SECURITY CHECK Protecting Your System and Yourself Source:
Viruses, Worms, Zombies, and other Beasties COS 116: 4/10/2008 Sanjeev Arora.
Computer Basics Rabie A. Ramadan, PhD 6. Viruses, Worms, Zombies, and others 2.
Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2012 Adam Finkelstein.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses, Worms, Zombies, and other Beasties COS 116, Spring 2011 Sanjeev Arora (based on lecture by Alex Halderman)
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Types of Electronic Infection
HDSB Security Awareness Training. Introduction Good security standards follow the 90/10 rule: 10% of security safeguards are technical. 90% of security.
Introduction to Computer Security PA Turnpike Commission.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer Skills and Applications Computer Security.
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Computer and Network Security Rabie A. Ramadan Lecture 4.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
INTERNET SAFETY FOR EVERYONE
Botnets A collection of compromised machines
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Viruses & Destructive Programs
Managing Windows Security
What they are and how to protect against them
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Ways to protect yourself against hackers
COMPUTER VIRUSES Computer Technology.
Cyber Security By: Pratik Gandhi.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Computer Security Elaine Munn Introduction to Computer Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Risk of the Internet At Home
Internet Safety for Everyone
UNIT 18 Data Security 1.
Internet Safety Vocabulary
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Unit 4 IT Security Kerris Davies.
Viruses, Worms, Zombies, and other Beasties
Internet Safety for Everyone
WJEC GCSE Computer Science
Internet Safety for Everyone
Internet Safety for Everyone
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Viruses, Worms, Zombies, and other Beasties
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
INTERNET SECURITY.
Presentation transcript:

Computer Basics Rabie A. Ramadan, PhD 6

Viruses, Worms, Zombies, and others

What is Computer Security?

What is Computer Security? Computer Security is the protection of computing systems and the data that they store or access

Why is Computer Security Important? Computer Security allows the University to carry out its mission by: Enabling people to carry out their jobs, education, and research. Supporting critical business processes Protecting personal and sensitive information

Why do I need to learn about Computer Security? Isn’t this just an IT Problem?

Good Security Standards follow the “90 / 10” Rule: 10% of security safeguards are technical 90% of security safeguards rely on the computer user (“YOU”) to adhere to good computing practices

What Does This Mean for Me? This means that everyone who uses a computer or mobile device needs to understand how to keep their computer, device and data secure. Information Technology Security is everyone’s responsibility

What’s at Stake? Kinds of damage caused by insecurity Nuisance: spam, … Data erased, corrupted, or held hostage Valuable information stolen (credit card numbers, trade secrets, etc.) Services made unavailable (email and web site outages, lost business)

Breaking into a Computer

Breaking into a Computer What? Run unauthorized software How? Trick the user into running bad software (“social engineering”) Exploit software bugs to run bad software without the user’s help

Example of “social engineering”: Trojan Horse CoolScreenSaver.exe

Viruses and Worms Automated ways of breaking in; Use self-replicating programs (Recall self-replicating programs: Print the following line twice, the second time in quotes. “Print the following line twice, the second time in quotes.” )

Computer Viruses Self-replicating programs that spread by infecting other programs or data files Must fool users into opening the infected file Cool Screen Saver Notepad Solitaire Paint Payload Payload Payload Payload

Email Viruses Infected program, screen saver, or Word document launches virus when opened Use social engineering to entice you to open the virus attachment Self-spreading: after you open it, automatically emails copies to everyone in your address book Other forms of social engineering: downloadable software/games, P2P software, etc.

David L. Smith Aberdeen, NJ The Melissa Virus (1999) Social engineering: Email says attachment contains porn site passwords Self-spreading: Random 50 people from address book Traffic forced shutdown of many email servers $80 million damage 20 months and $5000 fine David L. Smith Aberdeen, NJ

Computer Worms Self-replicating programs like viruses, except exploit security holes in OS (e.g., bugs in networking software) to spread on their own without human intervention Payload Payload Payload Payload Payload Payload Payload

Created by student at Cornell First Internet worm Created by student at Cornell Exploited holes in email servers, other programs Infected ~10% of the net Spawned multiple copies, crippling infected servers Sentenced to 3 years probation, $10,000 fine, 400 hours community service Robert Tappan Morris

“Can we just develop software to detect a virus/worm?” [Adleman’88] This task is undecidable. (so no software can work with 100% guarantee) Current methods: (i) Look for snippets of known virus programs on harddrive (ii) maintain log of activities such as network requests, read/writes to hard-drive and look for “suspicious” trends (iii) look for changes to OS code. No real guarantee

Spyware/Adware Hidden but not self-replicating Tracks web activity for marketing, shows popup ads, etc. Usually written by businesses: Legal gray area

Zombies Attacker’s Program Bot Bot program runs silently in the background, awaiting instructions from the attacker

Can we stop computer crime? Probably not! Wild West nature of the Internet Software will always have bugs Rapid exponential spread of attacks But we can take steps to reduce risks…

Protecting Your Computer Six easy things you can do… Keep your software up-to-date Use safe programs to surf the ‘net Run anti-virus and anti-spyware regularly Add an external firewall Back up your data Learn to be “street smart” online

Keep Software Up-to-Date

Use Safe Software to Go Online Fewer people trying to attack these programs than corresponding MS progs. Firefox (web browser) Thunderbird (email)

Anti-virus / Anti-spyware Scans Symantec Antivirus (Free from OIT) Spybot Search & Destroy (Free download)

Add an External Firewall Provides layered security (think: castle walls, moat) (Recent operating systems have built-in firewall features)

Tivoli Storage Manager Back Up Your Data Tivoli Storage Manager (Free from OIT)

Learn Online “Street Smarts” Be aware of your surroundings Is the web site being spoofed? Don’t accept candy from strangers How do you know an attachment or download isn’t a virus, Trojan, or spyware? Don’t believe everything you read Email may contain viruses or phishing attack – remember, bad guys can forge email from your friends

Quiz: A hacked computer can be used to… (select all that apply) Send spam and phishing emails. Harvest and sell email addresses and passwords. Illegally distribute music, movies and software. Distribute child pornography. Infect other systems. Hide programs that launch attacks on other computers. Record keystrokes and steal passwords. Access restricted or personal information on your computer or other systems that you have access to. Generate large volumes of traffic, slowing down the entire system

Next time is an exam Assignment Survey some of viruses and security incidents that ha been found in the last five years ?