ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.

Slides:



Advertisements
Similar presentations
Viruses & Spyware A Module of the CYC Course – Computer Security
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
BlueRedGreenPurpleOrange.
Protect your PC virus, worm, Trojan horse, phishing, spam, botnet and zombies, spoofing, social engineering, identity theft, spyware, rootkits Click.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Software programs that enable you to view world wide web documents. Internet Explorer and Firefox are examples. Browser.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computer Viruses.
Introduction to Security Computer Networks Computer Networks Term B10.
Threats To A Computer Network
Analysis of Attack By Matt Kennedy. Different Type of Attacks o Access Attacks o Modification and Repudiation Attacks o DoS Attacks o DDoS Attacks o Attacks.
Chapter 4 Application Security Knowledge and Test Prep
Internet Relay Chat Security Issues By Kelvin Lau and Ming Li.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Threats to I.T Internet security By Cameron Mundy.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Lecture#2 on Internet and World Wide Web. Internet Applications Electronic Mail ( ) Electronic Mail ( ) Domain mail server collects incoming mail.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
--Harish Reddy Vemula Distributed Denial of Service.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
EC-Council Copyright © by EC-Council All Rights reserved. Reproduction is strictly prohibited Security News Source Courtesy:
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Introduction to Network Security. Acknowledgements.
Databases Kevin Wright Ben Bruckner Group 40. Outline Background Vulnerabilities Log File Cleaning This Lab.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Vulnerabilities in Operating Systems Michael Gaydeski COSC December 2008.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
IT Security  .
Instructor Materials Chapter 7 Network Security
Computer Technology Notes 5
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the Internet and Attack Your PC

Introduction  Hackers attack targets of opportunity  Individuals  Corporate Web sites  ISPs  Why?  Might want to shut down a site  Revenge  Prove they can

Denial of Service  DOS attacks attempt to shut down a site  DDOS – Distributed Denial of Service  Incapacitates a network by flooding it with extraneous traffic  Might be requests for service

Denial of Service  Smurf attack  Uses ICMP – Internet Control Message Protocol  Fraggle attack  Re-write of a Smurf attack using UDP – User Datagram Protocol

 Example uses SubSeven  Installed via a virus onto your computer  Opens port 7374  Hacker can query your computer to see if port is open  If so, they have access as if they were sitting at your keyboard How Hackers Can Attack Your Computer

 Hacker can  Copy or delete files or programs  Examine and use personal data, credit card information, for example  Access your passwords  Upload files to your computer  Store illegal files on your computer and direct others to access them from you  Use your computer to launch attacks How Hackers Can Attack Your Computer

How Viruses Travel in Your  Malware authors are often good social engineers  They know what kinds of things we will respond to  Cute  Greed  “Personal”  Hidden with the could be any of a number of types of viruses

How Viruses Travel in Your  Attachment virus  Pretends to be something like a photo, sound, or movie file  May be able to determine based on file name of attachment  Example: Melissa virus  HTML virus might be active content  Used in processing forms, other interactivity

How Viruses Travel in Your  MIME virus  Mul.ti-Purpose Internet Mail Extension  Takes advantage of security vulnerabilities in Outlook Express and Internet Explorer  Forms in the header contain more content than will fit in buffer  Overflow content spills into another holding area from which the processor talkes its instructions  Virus is then executed as if it were legitimate code

How Viruses Travel in Your  Viruses attack in different ways  Attachment virus launches when attachment is run, usually by double-clicking the attachment  HTML viruses run when the user opens the message to read it  Might run when viewed in the preview window  MIME viruses can run without the user doing anything

How Viruses Travel in Your  Typical virus first propagates itself  Searches address book, old , even documents  Identifies names and addresses  Sends duplicates of itself to those addresses  This process repeats itself on all those destination computers

How Viruses Travel in Your  Results might be just an irritating message or something much more serious  Deleted files  Slow processing

How Zombies and Bot Networks Work  A zombie or a bot is a computer that can be controlled by someone remotely  A single controller might have a network of thousands of infected computers  A typical zombie connects to an IRC (Internet Relay Chat) channel  Lets controller know it is available

How Zombies and Bot Networks Work  Controller sends commands telling all his/her zombies to perform a certain command  Send out a spam or phishing attack  Because attacks are carried out by the zombies, the actual attacker is insulated  Attacks can’t be traced back to him/her

How Zombies and Bot Networks Work  After the attacks, the zombies can be placed into hibernation until needed again  Attackers look for computers with constant network cnnections (DSL or RoadRunner) and fairly high-speed connections

How Hackers Exploit Browsers  Browser attacks take advantage of security vulnerabilities in certain commonly-used browsers  Internet Explorer  Firefox  Buffer overflow attack  Buffers are areas of memory used to hold data

How Hackers Exploit Browsers  Buffer overflow attack (cont.)  If too much data is placed into the buffer it overflows into adjacent areas of memory  That data might be malicious code that can executed as if it were a normal program  Malicious code can damage computers in numerous ways  Allows a hacker to gain control

How Hackers Exploit Browsers  Drive-by downloads often occur without the user’s knowledge  Might be spyware or a Trojan  Often infects a computer as a result of clicking a pop-up generated by a Web site you’re visiting.

How Hackers Exploit Browsers  ActiveX is often used  A way to allow software to be downloaded and run inside the browser  Can be used to steal information, install spyware, run Trojans, etc.