Presentation is loading. Please wait.

Presentation is loading. Please wait.

Internet Security: Les Smee Georgia Tech Research Institute.

Similar presentations


Presentation on theme: "Internet Security: Les Smee Georgia Tech Research Institute."— Presentation transcript:

1 Internet Security: Les Smee Georgia Tech Research Institute

2 Famous Hacking Claim to fame: Figured out how to make free phone calls using a plastic prize whistle he found in a cereal box. Cap'n Crunch introduced generations of hackers to the glorious concept of phone "phreaking." John Draper Handle: Cap'n Crunch

3 Famous Hacking Robert Morris Handle: rtm Claim to fame: The son of the chief scientist at the National Computer Security Center part of the National Security Agency (NSA) this Cornell University graduate student introduced the word "hacker" into the vernacular when he accidentally unleashed an Internet worm in 1988. Thousands of computers were infected and subsequently crashed.

4 Famous Hacking Kevin Mitnick Handle: Condor Claim to fame: The first hacker to have his face immortalized on an FBI "Most Wanted" poster. His status as a repeat offender, a teenage hacker who couldn't grow up, earned Mitnick the nickname "The Lost Boy of Cyberspace." Inspired the movie “War Games” by hacking NORAD.

5 Hacking Methods Viruses: computer programs with the sole purpose of destroying data Boot Infectors Program Infectors

6 Hacking Methods cont. Worms: Reproducing Virus Emails itself to entire address book

7 Hacking Methods cont. Trojans: Appears safe but look out

8 Hacking Methods cont. Cracking: using a known vulnerability of a running program to gain additional access/privileges to a system

9 Prevent Hacking Software updates Port Scan http://www.dslreports.com Turn off the computer

10 Antivirus Antivirus software - Norton - McAfee - AVG (Free) Updates (auto) Routine Scans Scan files before use

11 Firewalls Software (Good) - Norton - ZoneAlarm - McAfee - Sygate Hardware (Better) - Linksys - Dlink Both (Best)

12 Encryption History  Cryptography  Military use

13 Encryption cont. Symmetric-key encryption  Must know all computers involved  “Shift by 2” example Public-key encryption  Public key  Private key  PGP

14 Encryption cont. Public-key on a grand scale  digital certificates  certificate authority  Secure Sockets Layer (SSL) - developed by Netscape

15 Encryption cont. How it works  128 bit = 2 128 = 3,402,823,669,209,384,634,633,746,074,300,000,0 00,000,000,000,000,000,000,000,000,000,000  Hashing

16 Encryption cont. What to look for  Padlock on IE Status Bar  https://

17 Wireless Networks WEP Easy to hack Fixed soon?

18 Cookies Small text file to identify you “doubleclick” Controlling Cookies http://www.cookiecentral.com

19 IE Security Avoid profiles “Do you trust content from …?” Running scripts (pros and cons)

20 Spyware Often comes with useful program Weather program, clock sync program Causes pop-ups Gives out information Ad-aware Spybot

21 Email Not secure Easy to intercept Auto Running Programs Filters Spam - report

22 Email Don’ts Use full name as sender Give out passwords Use primary email for posting in public forums Respond to spam unsubscribe address Buy from spammers Include name in address

23 Passwords No simple words or phrases Longer is better “Remembering” passwords Change regularly Combine letters, numbers, other characters

24 Network Monitoring Keystroke Virtual Desktop Idle Time Email (deleted?) 50% Admit to monitoring

25 Snooping on Kids History (cleared?) “Documents” Check on them Filters

26 Internet Filtering Block by key word Block by url Products -Net Nanny -CyberPatrol -ISP provided

27 Filtering Software Differences Customizable filtering Filters other software applications. Blocks chat rooms and forums Prevents sending personal information in email Produces activity logs Produces periodic screen shots

28 Chatting for Kids Never give real name and location Never meet anyone offline Never post email publicly Remember people lie Private chat? Monitored chat rooms Use manners

29 Shopping Online Look for the secure transaction symbol Check for a money back guarantee from the seller and the product's warranty before buying. Use a credit card instead of a bank debit card. On auction sites be sure to check the feedback area about the seller.

30 Shopping Online cont. When you make a purchase online, get some proof that you did. Try to determine if the company is genuine before ordering. Does it have brick and mortar stores? Does it have a good reputation? You can contact The Better Business Bureau (www.bbb.org) and The National Associations Of Attorneys General (www.naag.org) online to investigate a company.

31 “You have zero privacy anyway” -Scott McNealy (Sun Microsystems)


Download ppt "Internet Security: Les Smee Georgia Tech Research Institute."

Similar presentations


Ads by Google