How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA 92697 USA

Slides:



Advertisements
Similar presentations
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
Advertisements

1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
LittleOrange Internet Security an Endpoint Security Appliance.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Internet safety By Lydia Snowden.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer Security: How to Protect Your Computer By Roopa Mathur Computer Information Management Irvine Valley College
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Security Issues, Ethics, & Emerging Technologies in Education
Cyber Security Anchorage School District – 7 th grade Internet Safety.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
What is Spam? d min.
 Keeps data and equipment functioning  Lack of security can expose confidential information and reduce network resources  Can degrade.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Computer Security Keeping you and your computer safe in the digital world.
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Risk of the Internet At Home
Presentation transcript:

How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA

About the Class Schedule: Mondays, 10: :50 in DBH 1420 Website: Look at Readings: The Symantec Guide to Home Internet Security, Andrew Conry-Murray and Vincent Weafer, Addison-Wesley, 2006 Topics: Computer security risks (i.e. phishing, spam, malware, etc) and how to protect against them (i.e. firewalls, anti-virus, patching software, etc.) This course is meant to be practical, not too technical. I can give pointers to more technical information.

Social Engineering Exploiting vulnerabilities in the user, not the network or device  Traditional scams using the computer (and/or the phone) as a vehicle  People trust official looking s and websites  Not primarily technical attacks  Often used to gain information for larger attacks

Social Engineering Examples Examples: “Dear Honorable Sir, I need to transfer $10,000,000,000 to your account”  Required to pay a “small” transfer fee “You need to update your Paypal account …”  Directed to send personal information Call computer support and masquerade as a technician  “Where is that TFTP server located again?”

Spoofing Making a fake version of something in order to trick a user Often used as part of a social engineering scam Example: 1.You get an saying something is wrong with your ebay account. 2.It provides a link to a website The website is fake but can look completely real Can be done with addresses and calling trees

Preventing Social Engineering  Don’t trust anyone or any information that you can’t verify 1.Don’t give critical info to unverified websites/phone numbers 2. Don’t accept anything (i.e. programs) from unverified sources  This may be inconvenient 1.If Citibank calls, you should call them back at a known Number 2. Can’t purchase online from unknown vendors 3. Be careful about freeware/shareware

“Technical” Threats Exploiting vulnerabilities in the computational device or in the network Require some technical ability  Understand network protocols and components  Write code (at least execute scripts)  Deeply understand networked applications May be directed at your machine  You can defend against these May impact you but be directed against other machines  You can’t really stop these

Typical Technical Threats Denial of Service - A service provided by the device is caused to fail Cellphone cannot receive calls, desktop reboots Quality of Service - Quality is degraded, not destroyed Noise added to a phone call, anti-lock brakes slow Data Theft - Important data is taken from the device Passwords, name, usage patterns, location Botnet Zombie - Complete ownership of the device to use in the future for other attacks.

Threats Against Other Machines Your machine’s operations are impacted by an attack on another machine  Usually part of the network infrastructure Examples:  Your Domain Name Server (DNS) is attacked so you can no longer resolve domain names  Your university’s computers are attacked and your personal data is stolen You can’t do much about these attacks, except complain/sue

Threats Against Your Machine Most such threats require executing malicious code on your machine Malware - General term for “Malicious code” Common types of malware: Spyware - Record information inside your device  Browsing habits, keystrokes, etc.  Also change behavior (web page redirects …) Adware - Record information and display ads catered to you

How Does Malware Work? Need to know this in order to defend against it 1.Gets into the memory of your computer 2.Tricks your computer into executing it 3.Hides itself 4.Spreads itself to other machines

Getting Into Your Computer User-driven - User allows the malware in Read your Click on an attachment Click on a website link File transfer (ftp) Background traffic - Many programs communicate on the network in the background IM, skype, automatic updates, etc.

Executing on Your Machine How can foreign programs run on my computer? User Gives Permission “Do you want to enable this macro?” Bad default settings, (ex. Automatically enable all macros) These vulnerabilities can be fixed fairly easily Software Vulnerability A networked application has a coding flaw which allows unauthorized code execution

Rootkits A rootkit is a program that uses stealth - Sneaks onto your machine without you knowing - Hides itself on your machine so that is can’t be removed Rootkits change components of the operating system to hide their presence Example of stealth - A rootkit may attach itself to a good executable - Detected by examining properties of the executable (i.e. size) - Checking properties is a call to an OS program - Rootkit may change the “check properties” program to print the original size Most malware is fundamentally a specialized rootkit

Malware Propagation/Spread Trojan Horse - Malware which is part of another program which the user believes is safe Spread occurs when the user installs the “safe” program Social engineering may be involved Virus - Malware which is part of a larger program or file Ex. Macro in an.xls spreadsheet Self-replicates by inserting itself into new programs/files Worm - Malware which is not attached to another program/file Self-replicates over the network