Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.

Slides:



Advertisements
Similar presentations
Primary Threats to Computer Security
Advertisements

1 Computer and Internet Security JCCAA Presentation 03/14/2009 Yu-Min (Phillip) Hsieh Sr. System Administrator Information Technology Rice University.
7 Effective Habits when using the Internet Philip O’Kane 1.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
 What is a botnet?  How are botnets created?  How are they controlled?  How are bots acquired?  What type of attacks are they responsible for? 
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
Bots and Botnets CS-431 Dick Steflik. DDoS ● One of the most common ways to mount a Distributed Denial of Service attacks is done via networks of zombie.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
Australian High Tech Crime Centre What is cybercrime & trends Monday 5 November 2007.
How You Can Protect Yourself from Cyber-Attacks Ian G. Harris Department of Computer Science University of California Irvine Irvine, CA USA
Lecture 1 Page 1 CS 236, Spring 2008 Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
CYBER CRIME AND SECURITY TRENDS
Norman SecureSurf Protect your users when surfing the Internet.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Botnets An Introduction Into the World of Botnets Tyler Hudak
Introduction to Honeypot, Botnet, and Security Measurement
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Crime & Security Hackers & Crackers & Worms! Oh my!!
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
BotNet Detection Techniques By Shreyas Sali
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crime & Security Prepared by : Rughani Zarana.
Internet Security facilities for secure communication.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director.
CYBER CRIME.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
C YBER C RIME any criminal act dealing with computers and networks traditional crimes conducted through the Internet.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
BOTNETS Presented By : Ramesh kumar Ramesh kumar 08EBKIT049 08EBKIT049 A BIGGEST THREAT TO INERNET.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Lecture 1 Page 1 CS 236 Online Introduction to Computer Security Why do we need computer security? What are our goals and what threatens them?
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Host and Application Security Lesson 17: Botnets.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
From viruses to theft Joakim von Braun Security Consultant von Braun Security Consultants Uppsala universitet
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
MALWARE Autumn Mattis.
Instructor Materials Chapter 7 Network Security
Chapter 19.1 Cyberlaw and Cybercrime
Securing Information Systems
Forensics Week 12.
Malware CJ
Networking for Home and Small Businesses – Chapter 8
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
An overview over Botnets
Presentation transcript:

Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz

National Priorities Counterterrorism Counterintelligence Cyber Crime

Cyber Crime Components Computer Intrusions BOTNETS DDOS Attacks Intellectual Property Theft Theft of Trade Secrets Virus/Worm Activity Child Pornography Internet Fraud

How Severe is the Threat? THREATTHREAT Professional Cyber Criminals Organized Crime ( Foreign and Domestic) Money Information

Growing Trend BOTNETS Distributed Denial Of Service Attacks (DDoS) Extortion Malicious Attacks Pay for Click (Adware installations) Network Traffic Identity Theft (keylogging, phishing) SPAM

Components of BOTNET Internet Relay Chat (IRC) Server Usually a compromised Linux box Zombies- Compromised computers Home, Military, Government, Education, and Business infected by a worm, trojan, or virus Botherder – Person controlling BOTNET

Attack Network Attack Control Computer

Recent BOTNET Case ZOTOB Released ~8/2005 Spreads through and MS05-039(PnP) Sets up Backdoor via trojan Controlled by Internet Relay Chat (IRC) Zotob A, B, C derived from MyTob Zotob D, E, F derived from Rxbot

ZOTOB- victims IRC SERVER Diabl0.turkcoders.net

ZOTOB - Subjects Code Analysis e b 78 5d f 74 7a 6f 72 B-O-T-Z-O-R.SCAN....[x] Botzor c 4f By DiablO

ZOTOB - Subjects Diabl0 FBI Headquarters Cyber FBI Seattle Cyber Squad Identify hotmail account for Diabl0 through DNS Whois for blackcarder.net Worm analysis “greetz to my good friend coder”

ZOTOB - Subjects FBI flies to Morocco/Turkey

ZOTOB Conclusion Two subjects located and arrested in less than two weeks from infection

Cyber Prevention Current, patched Operating System Enable automatic updates Current virus protection Update as often as service allows Software and Hardware based firewall Anti-Spyware Protection Now a necessity Identify points of vulnerability Remote access Laptops

Resources ( )

Contact Special Agent Kenneth A. Schmutz (206)