A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Security A system is secure if its resources are used and accessed as intended under all circumstances. It is not generally possible to achieve total security.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Exam ● On May 15, at 10:30am in this room ● Two hour exam ● Open Notes ● Will mostly cover material since Exam 2 ● No, You may not take it early.
Silberschatz, Galvin and Gagne  Operating System Concepts Module 19: Security The Security Problem Authentication Program Threats System Threats.
EMU/ICT Incident Response Team Firewall Access Session Presenter: IRT TEAM Member.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Protect Your Computer from Viruses and Other Threats! 1. Use antivirus software. 2. Run Windows updates. 3. Use a strong password. 4. Only install reputable.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Csci5233 Computer Security1 Bishop: Chapter 27 System Security.
Dr.Backup Online Backup Service (888) (toll free)
Anderson School of Management University of New Mexico.
IT security By Tilly Gerlack.
Why do you need to think about security?  Data loss  System loss  Identity theft.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Security Preventing and Detecting Unauthorized Use of Your Computer.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Honeypot and Intrusion Detection System
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
INTERNET SAFETY FOR KIDS
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Network Security & Accounting
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
CHAPTER 2 Laws of Security. Introduction Laws of security enable user make the judgment about the security of a system. Some of the “laws” are not really.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Intro to Network Security. Vocabulary Vulnerability Weakness that can be compromised Threat A method to exploit a vulnerability Attack Use of one or more.
What you need to know.  Each TDI vessel is equipped with satellite communications that supplies a LOW BANDWIDTH internet connection. Even though the.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
Computer Security Sample security policy Dr Alexei Vernitski.
By: Keith Reiter COSC 356. Today’s Agenda Introduction Types of firewalls Firewall Access Rules Firewall Logging Who needs a firewall Summary.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
1 Web Technologies Website Publishing/Going Live! Copyright © Texas Education Agency, All rights reserved.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Chapter Objectives In this chapter, you will learn:
Common Methods Used to Commit Computer Crimes
Backdoor Attacks.
Information Security Session November 11, 2004
Cybersecurity Awareness
Intrusion detection systems?
Security.
Operating System Concepts
Test 3 review FTP & Cybersecurity
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
G061 - Network Security.
INTERNET SECURITY.
Presentation transcript:

A Basic Introduction to Computer Security John H. Porter University of Virginia Department of Environmental Sciences

Achieving Absolute Computer Security n There is only one method that can assure absolute security for the data and programs on your computer n Unplug it from the power outlet!!!

The Bad Guys n Trojan Horses Software that does other things than it says it does – often maliciousSoftware that does other things than it says it does – often malicious n Worms Attempt to circumvent controls on network accessAttempt to circumvent controls on network access n Viruses Attempt to modify programs on your computer to add malicious codeAttempt to modify programs on your computer to add malicious code

The Bad Guys n Sniffers Tap network lines to capture data and passwordsTap network lines to capture data and passwords n Thieves Stolen computersStolen computers n Bad Luck Floods, fire, lightning, power surgesFloods, fire, lightning, power surges

Achieving Relative Security n Backups n Boundary Defense n Defense on the homefront

Backups n All computers will, at some point, experience a security breach Backups let you recover lost dataBackups let you recover lost data n Off-site backups protects you against data loss due to violations of physical security Try getting your data back off a stolen or burned hard drive!Try getting your data back off a stolen or burned hard drive!

Boundary Defense n Boundary defenses focus on keeping malicious users or programs from having access to files on your computer PasswordsPasswords Control of Internet PortsControl of Internet Ports Restricting ways files may be stored on your computerRestricting ways files may be stored on your computer

Passwords n Not all passwords are created equal – some are easier to crack Ones based on publically available information about you (e.g., your name)Ones based on publically available information about you (e.g., your name) Passwords based on dictionary rulesPasswords based on dictionary rules Passwords that are too short or use repeating charactersPasswords that are too short or use repeating characters

Strong Passwords n One easy way to create strong passwords is to take the first letter off each word in a sentence and add some punctuation E.g., Iwtbot, - “It was the best of times,”E.g., Iwtbot, - “It was the best of times,” 2b,ON2b – “To Be, or Not to be”2b,ON2b – “To Be, or Not to be” n Also, varying capitalization can help JHwaPDM!JHwaPDM!

Protecting Passwords n Even the most “secure” password is vulnerable if communication lines are compromised E.g., “sniffers”E.g., “sniffers” n Use of encrypted connections (ssl, https) can eliminate or greatly reduce this risk

Know What You are Sharing n Your computer provides a number of Internet Ports You want to eliminate access to ports that are not serving a legitimate purposeYou want to eliminate access to ports that are not serving a legitimate purpose n You can test at sites like ShieldsUp: Not all access is bad, but you want to KNOW what is exposed!

Limit the Places that can Access your Computer n Most SQL databases support restricting access to particular network domains, or even individual machines If your web and database servers are on the same host, you may be able to eliminate ALL network access to the database, since all interactions are mediated by your web serverIf your web and database servers are on the same host, you may be able to eliminate ALL network access to the database, since all interactions are mediated by your web server

Keep your Eyes Open! n Just as you would not walk down a darkened alley without paying attention to your surroundings, you need to be alert to strange computer behaviors that may indicate a security problem n Check your software support pages frequently for news about vulnerabilities and fixes

Defense on the Homefront n Limit access of your computer to trusted individuals Usually not too much trouble at field stationsUsually not too much trouble at field stations Is especially an issue for web pages that contain DBMS login information in free textIs especially an issue for web pages that contain DBMS login information in free text n Get a good virus checker and update it frequently (daily if possible, at least weekly)

Defense on the Homefront n Keep updates to Windows current As security holes are detected, fixes will become availableAs security holes are detected, fixes will become available Windows provides for automatic updatesWindows provides for automatic updates Recent worms (e.g., Blaster) utilized a flaw in the RPC module of Windows to infect large numbers of otherwise protected computers before a fix was availableRecent worms (e.g., Blaster) utilized a flaw in the RPC module of Windows to infect large numbers of otherwise protected computers before a fix was available

Protecting the Homefront n Monitor your logs to detect attempts to attack your system Window’s Events logsWindow’s Events logs Web server logsWeb server logs n Exercise good judgment on downloading files Every file downloaded is a potential security intrusionEvery file downloaded is a potential security intrusion

Security is Relative n Security is always relative, but it is possible to create a reasonable level of security n The more obscure a resource is, either because it uses “unusual” software or is inconspicuous on the web, the less likely someone is to try to break into it

Useful Places to Look n - Computer Emergency Response Team n - home of ShieldsUp and others n - Symantec anti- virus site n curity_internet/index.html - a general guide to Internet Security issues curity_internet/index.html curity_internet/index.html