1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
IS 2101 Spring 2009 Chapter 12 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Learning In A Techno World How Safe is Your Cyberspace?
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
Internet Security and Your Computer Welcome to Boot Camp.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
NetTech Solutions Protecting the Computer Lesson 10.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
HI150 – Automation of Health Information Unit 2 Seminar.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Security Risks Todays Lesson Security Risks Security Precautions
Malware and Computer Maintenance
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
G061 - Network Security.
Presentation transcript:

1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware

2 Computer Threats Cyber-crimes are criminal acts conducted through the use of computers by Cyber-criminals. Hacker : Anyone who unlawfully accesses a computer system

3 What Hackers Do Steal information from computers: Credit card numbers Bank account numbers Internet packet sniffing Commit identity theft

4 Denial of Service Attacks Web servers are sent millions of bogus requests Overloads the system Consequently they shut down Service is denied legitimate users

5 Denial of Service Attacks Distributed denial of service attacks use many computers Backdoor programs Trojan horse Zombies

6 How Hackers Gain Access Direct access: Hacking software Indirect access: Internet connection Logical ports

7 Computer Safeguards: Firewalls Software programs or hardware devices designed to close logical ports to invaders A firewall is built into Windows XP More robust firewalls are available from other vendors. Firewalls are critical if you have an always-on broadband connection.

8 Firewall Always on Internet service is a problem use a router or firewall software see IT website for Firewall informationIT website for Firewall information

9 Firewall Objective: to keep the internal network secure from the outside It is a hardware device or software through which all traffic must pass Firewall LANWAN

10 Firewall LANWAN Router Does dynamic address translation IP address IP addresses known only to the router, not to the ISP ISP

11 Protecting a Wireless Network Wireless network range doesn’t stop at the property line. Default device and network ID settings allow intruders to enter the network. Internet bandwidth can be stolen Computers can be vulnerable to hacker intrusion and takeover.

12 Secure Your Wireless Router Change Your Network Name (SSID) Disable SSID Broadcast Change the Default Password on Your Router Turn on Encryption (WAP is best) Implement Media Access Control Apply Firmware Upgrades

13 Change Your Network Name Disable SSID Broadcast Change the Default Password Turn on Encryption Implement Media Access Control

14 Software Sabotage Risks Virus Worm Trojan horse Spyware DOS Attacks Protection

15 Computer Threat - Viruses A virus is a program that attaches itself to another program It hides within the code of the host program When host program executes the virus code executes also and copies itself to other programs

16

17 What Viruses Do Replicate themselves: Slow down networks Secondary objectives: Annoying messages Delete files on the hard drive Change computer settings

18 How Does a Computer Catch a Virus

19 Virus Macro virus Attach to documents virus Attachments

20 Antivirus Software Programs designed to detect viruses: Scan files looking for virus signatures (unique code) Provides options for deleting or fixing infected files Detect known viruses Antivirus programs need to be updated frequently

21 Use Anti-virus Software Install and update anti-virus software UofC IT anti-virus web page Free software: McAffee ISP might provide free Otherwise buy it (McAffee, Norton, …)

22 Virus Detection ISP mail server (UofC IT and CPSC) Scans incoming and outgoing messages, notifies user if finds virus (strips attachments), and quarantines the message User can recover message from quarantine If you suspect: don’t open the attachment Delete the message Scan in program or save to disk and then scan with virus detection software

23 Sober Source: Calgary Herald

24 Virus Detection From: Subject: WARNING - VIRUS (Worm.Sober.U) IN MAIL TO YOU Date: November 25, :20:55 AM MST (CA) My

25 *** VIRUS ALERT *** Dear user, This is an automatically generated message from the University of Calgary, Department of Computer Science (CPSC). The CPSC system has detected a piece of with a virus called: Worm.Sober.U in an addressed to you from: The Subject of this was: Mail delivery failed Delivery of the original has been stopped. A copy of the message has been placed under quarantine. Please visit the CPSC Maia Mailguard system located: to view your quarantined messages. You will be required to log into this system using your CPSC address and your CPSC Login Password. For your reference, here are some selected headers from the Date: Fri, 25 Nov :20: (MST) From: (Empty if virus is known to forge sender address) To: Subject: Mail delivery failed Received: dpwtlcd.com (S f1f983b.cg.shawcable.net [ ])

26 Worm Program that travels independently over computer networks, seeking uninfected sites Replicates and starts up thousands of processes Overloads a system

27 The Cost of Worms Nimba, Sept. 18, 2001 In 24 h infected 2.2 million computers Microsoft Windows Huge traffic disabled web and servers Damaged system files

28 Trojan Horse Program that performs a useful task while also being secretly destructive A logic bomb responds to a particular event Cannot replicate E.G. Logon Trojan horse

29 Denial of Service Attacks Web servers are sent millions of bogus requests Overloads the system Consequently they shut down Service is denied legitimate users

30 Protection from Viruses and Security Risks Use anti-virus software Update frequently Use anti-spyware software Update your operating system Automatic updates and security patches Microsoft Macintosh

31 Computer Security: Reducing Risks Disaster Planning backup power monitoring, alarms backup of data redundant sites or hot sites

32 Computer Security: Reducing Risks Physical Access Restrictions something you have: key, ID card you know: password, personal informationpassword you do: signature, … About you: BiometricsBiometrics

33 Passwords The most common tool for restricting access to computer systems Weakness user sustained guessing program guesses words from online dictionaries

34 Password Guidelines Don’t use real words names plurals common expressions reversal

35 Passwords Do mix letters and numbers change frequently keep secret

36 Biometrics