Security Awareness Chapter 2 Desktop Security. After completing this chapter, you should be able to do the following:  Describe the different types of.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
September,2012 Managing Files and Folders 4/23/2015 Compiled By:- Solomon W. Demissie 1.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Security Awareness Chapter 2 Desktop Security. Objectives After completing this chapter, you should be able to do the following: Describe the different.
Security+ Guide to Network Security Fundamentals, Third Edition
Computer Viruses.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Security+ Guide to Network Security Fundamentals, Third Edition
Chapter 2 Desktop Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Desktop Security After completing this lesson, you should be able to do the following: Describe the different types of software and hardware attacks List.
Essential Computer Concepts
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
VIRUS Is a computer program that can copy itself and infect a computer without permission or knowledge of the user or is a program or piece of code that.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
For more notes and topics visit: eITnotes.com.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 2 Systems Threats and Risks Security+ Guide to Network Security Fundamentals, Third Edition.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Malicious Software.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Understand Malware LESSON Security Fundamentals.
System Threats and Risks Niken D Cahyani Gandeva Bayu Satrya Telkom Institute of Technology.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Your Interactive Guide to the Digital World Discovering Computers 2012.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Keeping you and your computer safe in the digital world.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
Chapter Objectives In this chapter, you will learn:
Discovering Computers 2012: Chapter 8
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Chap 10 Malicious Software.
G061 - Network Security.
Presentation transcript:

Security Awareness Chapter 2 Desktop Security

After completing this chapter, you should be able to do the following:  Describe the different types of software and hardware attacks  List types of desktop defenses  Explain how to recover from an attack Security Awareness, 3 rd Edition2

 Most attacks fall into two categories  Malicious software attacks  Attacks on hardware Security Awareness, 3 rd Edition3

 Malware  Wide variety of damaging or annoying attack software  Enters a computer system without the owner’s knowledge or consent  Primary objectives of malware  Infect a computer system with destructive software  Conceal a malicious action Security Awareness, 3 rd Edition4

 Viruses  Malicious program that needs a ‘‘carrier’’ to survive  Two carriers  Program or document  User Security Awareness, 3 rd Edition5

 Viruses have performed the following functions:  Caused a computer to crash repeatedly  Erased files from a hard drive  Installed hidden programs, such as stolen software, which is then secretly distributed from the computer  Made multiple copies of itself and consumed all of the free space in a hard drive  Reduced security settings and allowed intruders to remotely access the computer  Reformatted the hard disk drive Security Awareness, 3rd Edition6

 Types of computer viruses  File infector  Resident  Boot  Companion  Macro  Polymorphic Security Awareness, 3 rd Edition7

 Worms  Take advantage of a vulnerability in an application or an operating system  Enter a system  Deposit its payload  Immediately searches for another computer that has the same vulnerabiliy Security Awareness, 3 rd Edition8

 Different from a virus  Does not require program or user  Actions that worms have performed include  Deleting files on the computer  Allowing the computer to be remote-controlled by an attacker Security Awareness, 3 rd Edition9

 Trojan horse (or just Trojan)  Program advertised as performing one activity but actually does something else  Typically executable programs that contain hidden code that attacks the computer system Security Awareness, 3 rd Edition10

 Rootkit  Set of software tools  Used to break into a computer, obtain special privileges to perform unauthorized functions  Goal is not to damage a computer directly  Go to great lengths to ensure that they are not detected and removed  Replace operating system commands with modified versions that are specifically designed to ignore malicious activity  Detecting a rootkit can be difficult Security Awareness, 3 rd Edition11

 Logic bomb  Computer program or a part of a program that lies dormant until it is triggered by a specific logical event  Once triggered, performs malicious activities  Extremely difficult to detect before they are triggered Security Awareness, 3 rd Edition12

Table 2-1 Famous logic bombs Security Awareness, 3 rd Edition13 Course Technology/Cengage Learning

 Zombie  Infected ‘‘robot’’ computer  Botnet  Hundreds, thousands, or tens of thousands of zombies  Internet Relay Chat (IRC)  Used to remotely control the zombies  Number of zombies and botnets is staggering Security Awareness, 3 rd Edition14

Table 2-2 Uses of botnets Security Awareness, 3 rd Edition15 Course Technology/Cengage Learning

 Types of hardware that is targeted includes  BIOS  USB devices  Cell phones  Physical theft of laptop computers and information Security Awareness, 3 rd Edition16

 Basic Input/Output System (BIOS)  Coded program embedded on the processor chip  Recognizes and controls different devices on the computer system  Read Only Memory (ROM) chip  Older systems  PROM (Programmable Read Only Memory) chip  Newer computers  Flashing the BIOS  Reprogramming Security Awareness, 3 rd Edition17

 USB (universal serial bus)  Small, lightweight, removable, and contain rewritable storage  Common types  USB flash memory  MP3 players  Primary targets of attacks to spread malware  Allow spies or disgruntled employees to copy and steal sensitive corporate data Security Awareness, 3 rd Edition18

 Reduce the risk introduced by USB devices  Prohibit by written policy  Disable with technology  Disable the USB in hardware  Disable the USB through the operating system  Use third-party software Security Awareness, 3 rd Edition19

 Portable communication devices  Rapidly replacing wired telephones  Types of attacks  Lure users to malicious Web sites  Infect a cell phone  Launch attacks on other cell phones  Access account information  Abuse the cell phone service Security Awareness, 3 rd Edition20

 Portable laptop computers are particularly vulnerable to theft  Data can be retrieved from a hard drive by an attacker even after its file has been deleted Security Awareness, 3 rd Edition21

 Defenses include:  Managing patches  Installing antivirus software  Using buffer overflow protection  Protecting against theft  Creating data backups Security Awareness, 3 rd Edition22

 Patch  Software security update intended to cover vulnerabilities that have been discovered after the program was released Security Awareness, 3 rd Edition23

 Automatic update configuration options for most operating systems  Install updates automatically  Download updates but let me choose when to install them  Check for updates but let me choose whether to download and install them  Never check for updates Security Awareness, 3 rd Edition24

 Scan a computer’s hard drive for infections  Monitor computer activity  Examine all new documents that might contain a virus  Drawback of AV software  Must be continuously updated to recognize new viruses  Should be configured to constantly monitor for viruses and automatically check for updated signature files Security Awareness, 3 rd Edition25

 Buffer overflow  Occurs when a computer process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer  May cause computer to stop functioning  Windows-based system protection  Data Execution Prevention (DEP)  Address Space Layout Randomization (ASLR) Security Awareness, 3 rd Edition26

Figure 2-4 Buffer overflow attack Security Awareness, 3 rd Edition27 Course Technology/Cengage Learning

 Applies to laptops especially  Device lock  Steel cable and a lock  Software tracking system Security Awareness, 3 rd Edition28

 Copying data from a computer’s hard drive onto other digital media  Then storing it in a secure location  Sophisticated hardware and software can back up data on a regular schedule  Personal computer users  Operating system functions  Third-party software Security Awareness, 3 rd Edition29

 What information to back up  Back up only user files  Back up all files  Frequency of backups  Regular schedule  RAID (Redundant Array of Independent Drives)  Uses multiple hard disk drives for increased reliability  Several RAID configurations  Called levels Security Awareness, 3 rd Edition30

Table 2-3 Types of data backups Security Awareness, 3 rd Edition31 Course Technology/Cengage Learning

 Backup storage media  Temporary media should not be used  Alternatives  Portable USB hard drives  Network Attached Storage (NAS)  Internet services  Disc storage Security Awareness, 3 rd Edition32

 Location of backup storage  Protect against not only virus attacks but also against hardware malfunctions, user error, software corruption, and natural disasters  Backups ideally should be stored in a location away from the device that contains the information Security Awareness, 3 rd Edition33

 Basic steps to perform  Disconnect  Identify  Disinfect  Recheck  Reinstall  Analyze Security Awareness, 3 rd Edition34

 Malicious software (malware)  Enters a computer system without the owner’s knowledge or consent  Includes a wide variety of damaging or annoying software  Infecting malware  Concealing malware  Hardware is also the target of attackers  Tactics for defending desktop systems  Basic steps to disinfect and restore a computer Security Awareness, 3 rd Edition35