Chapter 7: Computer and Network Security
|
|
|
- Lester Ryan
- 10 years ago
- Views:
Transcription
1 Chapter 7: Computer and Network Security 1
2 Chapter Overview Introduction Hacking Malware Cyber crime and cyber attacks Online voting 2
3 7.1 Introduction Computers getting faster and less expensive Utility of networked computers increasing Shopping and banking Managing personal information Controlling industrial processes Increasing use of computers growing importance of computer security 3
4 7.2 Hacking 4
5 Hackers, Past and Present Original meaning of hacker: explorer, risk taker, system innovator MIT s Tech Model Railroad Club in 1950s 1960s-1980s: Focus shifted from electronics to computers and networks 1983 movie WarGames Modern meaning of hacker: someone who gains unauthorized access to computers and computer networks 5
6 Obtaining Login Names, Passwords Eavesdropping Dumpster diving Social engineering 6
7 Password Dos and Don ts Do not use short passwords. Do not use a word from the dictionary. Do not rely on substituting numbers for letters. Do not reuse passwords. Give ridiculous answers to security questions. Enable two-factor authentication if available. Have password recoveries sent to a secure address. 7
8 Computer Fraud and Abuse Act Criminalizes wide variety of hacker-related activities Transmitting code that damages a computer Accessing any Internet-connected computer without authorization Transmitting classified government information Trafficking in computer passwords Computer fraud Computer extortion Maximum penalty: 20 years in prison and $250,000 fine 8
9 Sidejacking Sidejacking: hijacking of an open Web session by capturing a user s cookie Sidejacking possible on unencrypted wireless networks because many sites send cookies in the clear Internet security community complained about sidejacking vulnerability for years, but ecommerce sites did not change practices 9
10 Case Study: Firesheep October 2010: Eric Butler released Firesheep extension to Firefox browser Firesheep made it possible for ordinary computer users to easily sidejack Web sessions More than 500,000 downloads in first week Attracted great deal of media attention Early 2011: Facebook and Twitter announced options to use their sites securely 10
11 Act Utilitarian Analysis Release of Firesheep led media to focus on security problem Benefits were high: a few months later Facebook and Twitter made their sites more secure Harms were minimal: no evidence that release of Firesheep caused big increase in identity theft or malicious pranks Conclusion: Release of Firesheep was good 11
12 Virtue Ethics Analysis By releasing Firesheep, Butler helped public understand lack of security on unencrypted wireless networks Butler s statements characteristic of someone interested in protecting privacy Butler demonstrated courage by taking responsibility for the program Butler demonstrated benevolence by making program freely available His actions and statements were characteristic of someone interested in the public good 12
13 Kantian Analysis Accessing someone else s user account is an invasion of their privacy and is wrong Butler provided a tool that made it much simpler for people to do something that is wrong, so he has some moral accountability for their misdeeds Butler was willing to tolerate short-term increase in privacy violations in hope that media pressure would force Web retailers to add security He treated victims of Firesheep as a means to his end It was wrong for Butler to release Firesheep 13
14 7.3 Malware 14
15 Viruses Virus: Piece of self-replicating code embedded within another program (host) Viruses associated with program files Hard disks, floppy disks, CD-ROMS attachments How viruses spread Diskettes or CDs Files downloaded from Internet 15
16 One Way a Virus Can Replicate 16
17 Attachment with Possible Virus 17
18 How an Virus Spreads 18
19 Antivirus Software Packages Allow computer users to detect and destroy viruses Must be kept up-to-date to be most effective Many people do not keep their antivirus software packages up-to-date Consumers need to beware of fake antivirus applications 19
20 Worm Self-contained program Spreads through a computer network Exploits security holes in networked computers 20
21 How a Worm Spreads 21
22 The Internet Worm Robert Tappan Morris, Jr. Graduate student at Cornell Released worm onto Internet from MIT computer Effect of worm Spread to significant numbers of Unix computers Infected computers kept crashing or became unresponsive Took a day for fixes to be published Impact on Morris Suspended from Cornell 3 years probation hours community service $150,000 in legal fees and fines 22
23 Ethical Evaluation Kantian evaluation Morris used others by gaining access to their computers without permission Social contract theory evaluation Morris violated property rights of organizations Utilitarian evaluation Benefits: Organizations learned of security flaws Harms: Time spent by those fighting worm, unavailable computers, disrupted network traffic, Morris s punishments Virtue ethics evaluation Morris selfishly used Internet as experimental lab He deceitfully released worm from MIT instead of Cornell He avoided taking responsibility for his actions Morris was wrong to have released the Internet worm 23
24 Conficker Worm Conficker (a.k.a. Downadup) worm appeared 2008 on Windows computers Particularly difficult to eradicate Millions of copies of worm are circulating Purpose of worm still unknown 24
25 Cross-site Scripting Another way malware may be downloaded without user s knowledge Problem appears on Web sites that allow people to read what others have posted Attacker injects client-side script into a Web site Victim s browser executes script, which may steal cookies, track user s activity, or perform another malicious action 25
26 Drive-by Downloads Unintentional downloading of malware caused by visiting a compromised Web site Also happens when Web surfer sees pop-up window asking permission to download software and clicks Okay Google Anti-Malware Team says 1.3 percent of queries to Google s search engine return a malicious URL somewhere on results page 26
27 Trojan Horses and Backdoor Trojans Trojan horse: Program with benign capability that masks a sinister purpose Backdoor Trojan: Trojan horse that gives attack access to victim s computer 27
28 Rootkits Rootkit: A set of programs that provides privileged access to a computer Activated every time computer is booted Uses security privileges to mask its presence 28
29 Spyware and Adware Spyware: Program that communicates over an Internet connection without user s knowledge or consent Monitor Web surfing Log keystrokes Take snapshots of computer screen Send reports back to host computer Adware: Type of spyware that displays pop-up advertisements related to user s activity Backdoor Trojans often used to deliver spyware and adware 29
30 Bots Bot: A kind of backdoor Trojan that responds to commands sent by a command-and-control program on another computer First bots supported legitimate activities Internet Relay Chat Multiplayer Internet games Other bots support illegal activities Distributing spam Collecting person information for ID theft Denial-of-service attacks 30
31 Botnets and Bot Herders Botnet: Collection of bot-infected computers controlled by the same command-and-control program Some botnets have over a million computers in them Bot herder: Someone who controls a botnet 31
32 Defensive Measures Security patches: Code updates to remove security vulnerabilities Anti-malware tools: Software to scan hard drives, detect files that contain viruses or spyware, and delete these files Firewall: A software application installed on a single computer that can selectively block network traffic to and from that computer 32
33 7.4 Cyber Crime and Cyber Attacks 33
34 Phishing and Spear-phishing Phishing: Large-scale effort to gain sensitive information from gullible computer users At least 67,000 phishing attacks globally in second half of 2010 New development: phishing attacks on Chinese e-commerce sites Spear-phishing: Variant of phishing in which addresses chosen selectively to target particular group of recipients 34
35 SQL Injection Method of attacking a database-driven Web application with improper security Attack inserts (injects) SQL query into text string from client to application Application returns sensitive information 35
36 Denial-of-service and Distributed Denial-of-service Attacks Denial-of-service attack: Intentional action designed to prevent legitimate users from making use of a computer service Aim of a DoS attack is not to steal information but to disrupt a server s ability to respond to its clients Distributed denial-of-service attack: DoS attack launched from many computers, such as a botnet 36
37 Cyber Crime Criminal organizations making significant amounts of money from malware Jeanson James Ancheta Pharmamaster Albert Gonzalez Avalanche Gang 37
38 The Rise and Fall of Blue Security Part I: The Rise Blue Security: An Israeli company selling a spam deterrence system Blue Frog bot would automatically respond to each spam message with an opt-out message Spammers started receiving hundreds of thousands of opt-out messages, disrupting their operations 6 of 10 of world s top spammers agreed to stop sending spam to users of Blue Frog 38
39 The Rise and Fall of Blue Security Part II: The Fall One spammer (PharmaMaster) started sending Blue Frog users times more spam PharmaMaster then launched DDoS attacks on Blue Security and its business customers Blue Security could not protect its customers from DDoS attacks and virus-laced s Blue Security reluctantly terminated its anti-spam activities 39
40 Politically Motivated Cyber Attacks Estonia (2007) Georgia (2008) Georgia (2009) Exiled Tibetan Government (2009) United States and South Korea (2009) Iran (2009) Espionage attributed to People s Liberation Army Anonymous 40
41 Attacks on Twitter and Other Social Networking Sites Massive DDoS attack made Twitter service unavailable for several hours on August 6, 2009 Three other sites attacked at same time: Facebook, LiveJournal, and Google All sites used by a political blogger from the Republic of Georgia Attacks occurred on first anniversary of war between Georgia and Russia over South Ossetia 41
42 Fourth of July Attacks 4 th of July weekend in 2009: DDoS attack on governmental agencies and commercial Web sites in United States and South Korea Attack may have been launched by North Korea in retaliation for United Nations sanctions 42
43 Supervisory Control and Data Acquisition (SCADA) Systems Industrial processes require constant monitoring Computers allow automation and centralization of monitoring Today, SCADA systems are open systems based on Internet Protocol Less expensive than proprietary systems Easier to maintain than proprietary systems Allow remote diagnostics Allowing remote diagnostics creates security risk 43
44 SCADA Systems Carry Security Risks p77/zuma Press/Newscom 44
45 Stuxnet Worm (2009) Attacked SCADA systems running Siemens software Targeted five industrial facilities in Iran that were using centrifuges to enrich uranium Caused temporary shutdown of Iran s nuclear program Worm may have been created by Israeli Defense Forces 45
46 Cyber Espionage Attributed to People s Liberation Army Hundreds of computer security breaches in more than a dozen countries investigated by Mandiant Hundreds of terabytes of data stolen Mandiant blamed Unit of the People s Liberation Army China s foreign ministry stated that accusation was groundless and irresponsible 46
47 Anonymous Anonymous: loosely organized international movement of hacktivists (hackers with a social or political cause) Various DDoS attacks attributed to Anonymous members Year Victim Reason 2008 Church of Scientology Attempted suppression of Tom Cruise interview 2009 RIAA, MPAA RIAA, MPAA s attempt to take down the Pirate Bay 2009 PayPal, VISA, MasterCard 2012 U.S. Dept. of Justice, RIAA, MPAA Financial organizations freezing funds flowing to Julian Assange of WikiLeaks U.S. Dept. of Justice action against Megaupload 47
48 7.5 Online Voting 48
49 Motivation for Online Voting 2000 U.S. Presidential election closely contested Florida pivotal state Most Florida counties used keypunch voting machines Two voting irregularities traced to these machines Hanging chad Butterfly ballot in Palm Beach County 49
50 The Infamous Butterfly Ballot AP Photo/Gary I. Rothstein 50
51 Benefits of Online Voting More people would vote Votes would be counted more quickly No ambiguity with electronic votes Cost less money Eliminate ballot box tampering Software can prevent accidental over-voting Software can prevent under-voting 51
52 Risks of Online Voting Gives unfair advantage to those with home computers More difficult to preserve voter privacy More opportunities for vote selling Obvious target for a DDoS attack Security of election depends on security of home computers Susceptible to vote-changing virus or RAT Susceptible to phony vote servers No paper copies of ballots for auditing or recounts 52
53 Utilitarian Analysis Suppose online voting replaced traditional voting Benefit: Time savings Assume 50% of adults actually vote Suppose voter saves 1 hour by voting online Average pay in U.S. is $21.00 / hour Time savings worth $10.50 per adult American Harm of DDoS attack difficult to determine What is probability of a DDoS attack? What is the probability an attack would succeed? What is the probability a successful attack would change the outcome of the election? 53
54 Kantian Analysis The will of each voter should be reflected in that voter s ballot The integrity of each ballot is paramount Ability to do a recount necessary to guarantee integrity of each ballot There should be a paper record of every vote Eliminating paper records to save time and/or money is wrong 54
55 Conclusions Existing systems are highly localized Widespread tainting more possible with online system No paper records with online system Evidence of tampering with online elections Relying on security of home computers means system vulnerable to fraud Strong case for not allowing online voting 55
Chapter 6: Computer and Network Security
Chapter 6: Computer and Network Security Ethics for the Information Age Third Edition by Michael J. Quinn Copyright 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter Overview Introduction
Spyware. Michael Glenn Technology Management [email protected]. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management [email protected] Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Stopping zombies, botnets and other email- and web-borne threats
Stopping zombies, botnets and other email- and web-borne threats Hijacked computers, or zombies, hide inside networks where they send spam, steal company secrets, and enable other serious crimes. This
Countermeasures against Bots
Countermeasures against Bots Are you sure your computer is not infected with Bot? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Bot? Bot is a computer
Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1
Threats and Attacks Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to:
NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT
Appendix A to 11-02-P1-NJOIT NJ OFFICE OF INFORMATION TECHNOLOGY P.O. Box 212 www.nj.gov/it/ps/ 300 Riverview Plaza Trenton, NJ 08625-0212 NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT The Intent
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 2 Systems Threats and Risks Objectives Describe the different types of software-based attacks List types of hardware attacks Define
PROTECT YOUR COMPUTER AND YOUR PRIVACY!
PROTECT YOUR COMPUTER AND YOUR PRIVACY! Fraud comes in many shapes simple: the loss of both money protecting your computer and Take action and get peace of and sizes, but the outcome is and time. That
Spyware. Summary. Overview of Spyware. Who Is Spying?
Spyware US-CERT Summary This paper gives an overview of spyware and outlines some practices to defend against it. Spyware is becoming more widespread as online attackers and traditional criminals use it
When you listen to the news, you hear about many different forms of computer infection(s). The most common are:
Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than ever. Thanks to the Internet, you can conduct your banking,
Countermeasures against Spyware
(2) Countermeasures against Spyware Are you sure your computer is not infected with Spyware? Information-technology Promotion Agency IT Security Center http://www.ipa.go.jp/security/ 1. What is a Spyware?
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
COB 302 Management Information System (Lesson 8)
COB 302 Management Information System (Lesson 8) Dr. Stanley Wong Macau University of Science and Technology Chapter 13 Security and Ethical Challenges 安 全 與 倫 理 挑 戰 Remarks: Some of the contents in this
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
WEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
GlobalSign Malware Monitoring
GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Module 5: Analytical Writing
Module 5: Analytical Writing Aims of this module: To identify the nature and features of analytical writing To discover the differences between descriptive and analytical writing To explain how to develop
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
ZNetLive Malware Monitoring
Introduction The criminal ways of distributing malware or malicious software online have gone through a change in past years. In place of using USB drives, attachments or disks to distribute viruses, hackers
Network Security and the Small Business
Network Security and the Small Business Why network security is important for a small business Many small businesses think that they are less likely targets for security attacks as compared to large enterprises,
BE SAFE ONLINE: Lesson Plan
BE SAFE ONLINE: Lesson Plan Overview Danger lurks online. Web access, social media, computers, tablets and smart phones expose users to the possibility of fraud and identity theft. Learn the steps to take
7 Cs of WEB design - Customer Interface
7 Cs of WEB design - Customer Interface Exhibit 6-1: The 7Cs of the Customer Interface Context Site s layout and design Content Text, pictures, sound and video that web pages contain Commerce Site s capabilities
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Computer Security DD2395
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh11/ Fall 2011 Sonja Buchegger [email protected] Lecture 7 Malicious Software DD2395 Sonja Buchegger 1 Course Admin Lab 2: - prepare
Barracuda Web Site Firewall Ensures PCI DSS Compliance
Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online
CHAPTER 10: COMPUTER SECURITY AND RISKS
CHAPTER 10: COMPUTER SECURITY AND RISKS Multiple Choice: 1. In a survey of more than 500 companies and government agencies, percent detected computer security breaches. A. 20 B. 75 C. 85 D. 99 Answer:
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for
Cyber Security Awareness
Cyber Security Awareness User IDs and Passwords Home Computer Protection Protecting your Information Firewalls Malicious Code Protection Mobile Computing Security Wireless Security Patching Possible Symptoms
Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange
The responsibility of safeguarding your personal information starts with you. Your information is critical and it must be protected from unauthorised disclosure, modification or destruction. Here we are
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
Web Application Security 101
dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in
BotNets- Cyber Torrirism
BotNets- Cyber Torrirism Battling the threats of internet Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director Why Talk About Botnets? Because Bot Statistics Suggest Assimilation
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
WEB ATTACKS AND COUNTERMEASURES
WEB ATTACKS AND COUNTERMEASURES February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in
Spyware: Securing gateway and endpoint against data theft
Spyware: Securing gateway and endpoint against data theft The explosion in spyware has presented businesses with increasing concerns about security issues, from data theft and network damage to reputation
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
WHITE PAPER. Understanding How File Size Affects Malware Detection
WHITE PAPER Understanding How File Size Affects Malware Detection FORTINET Understanding How File Size Affects Malware Detection PAGE 2 Summary Malware normally propagates to users and computers through
SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning
SECURITY TERMS: Advisory - A formal notice to the public on the nature of security vulnerability. When security researchers discover vulnerabilities in software, they usually notify the affected vendor
Retail/Consumer Client. Internet Banking Awareness and Education Program
Retail/Consumer Client Internet Banking Awareness and Education Program Table of Contents Securing Your Environment... 3 Unsolicited Client Contact... 3 Protecting Your Identity... 3 E-mail Risk... 3 Internet
Cyber Security Awareness
Cyber Security Awareness William F. Pelgrin Chair Page 1 Introduction Information is a critical asset. Therefore, it must be protected from unauthorized modification, destruction and disclosure. This brochure
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
Threat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
ACS-3921/4921-050 Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security
ACS-3921/4921-050 Computer Security And Privacy Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security ACS-3921/4921-050 Slides Used In The Course A note on the use of these slides: These
3 day Workshop on Cyber Security & Ethical Hacking
3 day Workshop on Cyber Security & Ethical Hacking 1 st day-highlights-hands On Phishing Attack Hammad Mashkoor Lari Freelancer What is Cyber Security? What is Ethical hacking? What is Computer Science?
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning
Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning Lee Zelyck Network Administrator Regina Public Library Malware, Spyware, Trojans
FKCC AUP/LOCAL AUTHORITY
FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and
DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest
DDoS Attacks: The Latest Threat to Availability Dr. Bill Highleyman Managing Editor Availability Digest The Anatomy of a DDoS Attack Sombers Associates, Inc. 2013 2 What is a Distributed Denial of Service
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Advanced & Persistent Threat Analysis - I
Advanced & Persistent Threat Analysis - I Burak Ekici [email protected] Department of Computer Engineering, Yaşar University, Turkey. April 21, 2012 Burak Ekici (Dept. of Comp. Eng.) Advanced & Persistent
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall
Protecting against DoS/DDoS Attacks with FortiWeb Web Application Firewall A FORTINET WHITE PAPER www.fortinet.com Introduction Denial of Service attacks are rapidly becoming a popular attack vector used
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services
Malware, Spyware, Adware, Viruses Gracie White, Scott Black Information Technology Services The average computer user should be aware of potential threats to their computer every time they connect to the
COMPUTER-INTERNET SECURITY. How am I vulnerable?
COMPUTER-INTERNET SECURITY How am I vulnerable? 1 COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2 VIRUS A computer virus is a small program written to alter the way a computer
Security awareness training is not a substitute for the LEADS Security Policy.
Revised 4/2014 This training will discuss some of the duties of the Terminal Agency Coordinator (TAC), Local Agency Security Officer (LASO) and provide basic security awareness training. Security awareness
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
What you need to know to keep your computer safe on the Internet
What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS
Software Engineering 4C03 Class Project Computer Networks and Computer Security COMBATING HACKERS Done By: Ratinder Ricky Gill Student Number: 0048973 E-Mail: [email protected] Due: Tuesday April 5, 2005
Topic 1 Lesson 1: Importance of network security
Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them
Lab Exercises Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Review Questions 1) In class, we made the distinction between a front-door attack and
Overview. Common Internet Threats. Spear Phishing / Whaling. Phishing Sites. Virus: Pentagon Attack. Viruses & Worms
Overview Common Internet Threats Tom Chothia Computer Security, Lecture 19 Phishing Sites Trojans, Worms, Viruses, Drive-bydownloads Net Fast Flux Domain Flux Infiltration of a Net Underground economy.
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500
INFO 1500 9. Information Assurance and Security, Protecting Information Resources 11. ecommerce and ebusiness Janeela Maraj Tutorial 9 21/11/2014 9. Information Assurance and Security, Protecting Information
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系
資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系 Outline Infosec, COMPUSEC, COMSEC, and Network Security Why do we need Infosec and COMSEC? Security
INTERNET & COMPUTER SECURITY March 20, 2010. Scoville Library. [email protected]
INTERNET & COMPUTER SECURITY March 20, 2010 Scoville Library [email protected] Internet: Computer Password strength Phishing Malware Email scams Identity Theft Viruses Windows updates Browser updates Backup
Malware Trend Report, Q2 2014 April May June
Malware Trend Report, Q2 2014 April May June 5 August 2014 Copyright RedSocks B.V. 2014. All Rights Reserved. Table of Contents 1. Introduction... 3 2. Overview... 4 2.1. Collecting Malware... 5 2.2. Processing...
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Cracking and Computer Security
Cracking and Computer Security Ethics and Computing Chapter 4 Summer 2001 CSE 4317: Computer Security 1 Motivation Computer security is crucial for trust Cracking activity is harmful, costly and unethical
Incident Response 101: You ve been hacked, now what?
Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape
Network Incident Report
To submit copies of this form via facsimile, please FAX to 202-406-9233. Network Incident Report United States Secret Service Financial Crimes Division Electronic Crimes Branch Telephone: 202-406-5850
1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Guideline for Prevention of Spyware and other Potentially Unwanted Software Introduction Most users are aware of the impact of virus/worm and therefore they have taken measures to protect their computers,
