Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security Submitted to Professor Mort Anvari

Similar presentations


Presentation on theme: "Internet Security Submitted to Professor Mort Anvari"— Presentation transcript:

1 Internet Security Submitted to Professor Mort Anvari
Author: Yungeng Qi ID: Date: 11/16/2000

2 Internet Security Internet has become a part of people’s life, when you are surfing on the internet enjoying the huge resources, you are also open your door to rest of the world ! Today we will address some internet security holes regarding windows .xx operating system

3 Background information
Nearly 80 percent home computers use windows operating system.(PC World) 80 percent of People using internet have E-transaction experience(PC world) Hundreds of IP address scanners can be obtained freely via internet(Asmodeus)

4 You may have known : “Denial of Service” shutting down Yahoo “Microsoft has been hacked recently and stolen of latest source code” You may not aware of your computer is also in danger caused by its operating system.

5 Let’s look at an experiment
Visiting to probe my DSL-connected windows 98 system. The system contains : MS personal web server; internet explorer; pc anywhere; quicken; IRC,; ICQ;Telnet;FTP.

6 Here is the result: Pavilion is at IP is being probed

7 Here is my network configuration

8 Here are the security holes
The default File and Printer Sharing by NetBIOS & NetBEUI protocol. Blank logon password Too many application software installed

9 Two reasons causing security holes:
NetBIOS & NetBEIU Vulnerability Inappropriate protocol binding

10 NetBIOS & NetBEIU Vulnerability
Releasing machine name, volume name whenever connection established and being asked Backward compatibility. Allowing anonymous logon.

11 Inappropriate protocol binding

12 Solutions * Remove “Client for Microsoft Networks and
its related file and printer sharing”

13 Solutions The improved protocol binding

14 Solutions Beware your other backdoors, such as:PWS;
IRC;ICQ,;Telnet;browsers and readers. They are also potential security holes. Try to use logon password, it can delay attack. Never run executable file from untrusted source

15 Solutions Install Internet Firewall software

16 Solutions Turn off the internet access when you do not need it!

17 Questions Thank You Can you tell me what information I can get
from your sent with MS Outlook Express? Thank You


Download ppt "Internet Security Submitted to Professor Mort Anvari"

Similar presentations


Ads by Google