Internet Security facilities for secure communication.

Slides:



Advertisements
Similar presentations
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Security Fundamentals by Chuck Easttom Chapter 4 Denial of Service Attacks.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Security Awareness: Applying Practical Security in Your World
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Computer Networks IGCSE ICT Section 4.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
Firewall Slides by John Rouda
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Securing Information Systems
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
1 Guide to Network Defense and Countermeasures Chapter 2.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
 a crime committed on a computer network, esp. the Internet.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
DOS Attacks Lyle YapDiangco COEN 150 5/21/04. Background DOS attacks have been around for decades Usually intentional and malicious Can cost a target.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Network System Security - Task 2. Russell Johnston.
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Firewalls.
Computer Security.
Computer Security.
G061 - Network Security.
Presentation transcript:

Internet Security facilities for secure communication

MALWARE Malware refers to any program or computer code deliberately designed to harm any portion of a computer system The three most common forms of malware are viruses are viruses, worms and trojan horses Morris worm was created in 1988 and infected 6,000 computers using the UNIX operation system.

MALWARE COUNTERMEASURES Antivirus – Signature scanning: a virus signature is a string of binary code unique to a particular virus. Virus signatures are also known as fingerprints or patterns. Because new viruses appear all the time, a virus program’s signature file must be updated frequently to maintain the program’s ability to defend against threats. Many antivirus programs will automatically inform users when a new virus signature update is available for download.

Disadvantages of signature scanning – Polymorphic viruses change with each replication. The constantly changing signature of a polymorphic virus makes it more difficult to detect using signature files alone. – Signature scanning also is ineffective against new viruses for which signature updates do not yet exist – It detects malware only after it has infected a computer system

Heuristic scanning looks for general malware characteristics rather than specific characteristics such as a signature. Heuristic problem solving relies on previous experience or knowledge. An antivirus program that uses heuristic scanning examines file size, architecture, or code behavior. Heuristic scanning can produce false positives and negatives.

For e.g.. It might report a legitimate software program as malware on the basis that it shares some characteristics with known malware programs. Just as with signature scanning, heuristic scanning software requires periodic updates to ensure that the catalog of suspicious characteristics is up to date.

Behavior Blocking looks for typical malware behaviors, such as attempts to change computer settings, the opening and or alteration of files, attempts to open computer ports etc. Ports are computer doorways used for various activities, and an open or unguarded port can be the entryway for malware. It is becoming popular since hackers face greater difficulty changing the behavior of malware than changing a virus signature

FIREWALLS It is a hardware or software barrier located between the internet and a computer or computer network. Many routers available nowadays contain built-in firewalls A firewall is a system of hardware and software that connects the intranet to external networks, such as the internet. It blocks unauthorized traffic from entering the intranet and cal also prevent unauthorized employees from access the intranet

Two components of firewalls are a proxy server and caching. Proxy server is a server, or remote computer, that may exist outside of the organization’s network, ad all communications to the organization are routed through it. The proxy server decides which messages or files are safe to pass through to the organization’s network. It can also provide document caching

Caching is to store copies of web pages for quick access; the purpose is to speed up the web for their users. The only difficulty with this practice is that the original web page may have been updated, but this is not reflected on the copy in the cache in the proxy computer.

Firewalls Routers available nowadays contain built-in firewalls. A firewall filters data arriving through the internet to protect the system from any threats. Firewalls can be configured to reject incoming packets based on the IP address or domain name they originate from. This prevents the entry of data from sites known to harbor threats.

Firewall A user can configure a firewall to allow or disallow the use of different protocols e.g. restricting FTP to prevent unauthorized file transfers from taking place. Firewalls can also filter incoming packets for text they might contain. Start with the highest level of security when you configure a firewall. If it creates problems denying access to legitimate data, adjust the configuration until an appropriate balance between security and convenience is achieved

Firewalls can help prevent malware but antivirus are also needed.

Service Patches and updates It’s important to install security patches.

Password protection Passwords help protect your computers

CYBER CRIME It refers to crimes committed using the internet. Some cyber crimes are phishing/spoofing, 419 scams, DOS attacks, brute force attacks

Phishing It is when an online scammer sends a user an that appears to be from a legitimate and well-known company to try to trick the user into sending confidential information. The practice of disguising an or a web site so that it appears to belong to a well- known company such as yahoo, Google or others is called spoofing.

Phishing The typically lists a URL that will direct victims to a spoofed web site that gives every appearance of being the legitimate web site of a familiar company. Many users recognize phishing attempts by noticing obvious spelling or grammatical errors. Current phishing attacks are estimated to have a 3% success rate.

419 Scams The 419 scam, or advance fee fraud, is a very popular cyber crime committed using . This scam gets its name from a section of the Nigerian penal code, because the vast majority of this type of crime originates in that country. E.g. have to pay money to attend a seminar or has money and needs help etc.

DOS attacks Sending a lot of traffic to deny the network from functioning. DDOS (distributed denial of service), a Trojan horse is used to download a small program onto an unsuspecting internet user’s computer. The program transforms the computer into a zombie that is used to send messages to the target of coordinated DDOS attack.

Brute force attacks

Cyber crime countermeasures Internet explore security settings Encryption and authentication – Symmetric and asymmetric encryption – Digital certificates – Digital signatures – Secure sockets layer (SSL) protocol Biometric authentication

Threats to privacy Spam Adware/spyware Cookies Inappropriate content

Privacy countermeasures Spam blocking methods Spyware/adware avoidance Cooking blocking Parental control software