ITSC Training Courses Student IT Competence Programme SIIS1 Information Security



Similar documents
Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Don t Fall Victim to Cybercrime:

COMPUTER-INTERNET SECURITY. How am I vulnerable?

How to stay safe online

BE SAFE ONLINE: Lesson Plan

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Content Teaching Academy at James Madison University

Infocomm Sec rity is incomplete without U Be aware,

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

ViRobot Desktop 5.5. User s Guide

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

PC Security and Maintenance

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

INSTANT MESSAGING SECURITY

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Computer Security Maintenance Information and Self-Check Activities

Malware & Botnets. Botnets

Guidelines for Account Management and Effective Usage

What are Viruses, Trojans, Worms & Spyware:

Chapter 11 Computers and Society, Security, Privacy, and Ethics

Network Security. Demo: Web browser

Cyber Security Awareness

Top tips for improved network security

Spyware: Securing gateway and endpoint against data theft

Introduction to Computer Security Table of Contents

Countermeasures against Spyware

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Stopping zombies, botnets and other - and web-borne threats

APWG. (n.d.). Unifying the global response to cybecrime. Retrieved from


Computers and Society: Security and Privacy

Network Incident Report

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

Cyber Security Awareness

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

Internet threats: steps to security for your small business

Introduction to Computer Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Remote Deposit Quick Start Guide

Contents. McAfee Internet Security 3

High Speed Internet - User Guide. Welcome to. your world.

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Section 12 MUST BE COMPLETED BY: 4/22

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

The Key to Secure Online Financial Transactions

WHITE PAPER. Understanding How File Size Affects Malware Detection

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

E-BUSINESS THREATS AND SOLUTIONS

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Internet Security. For Home Users

Advice about online security

K7 Mail Security FOR MICROSOFT EXCHANGE SERVERS. v.109

Information Security. Louis Morgan, CISSP Information Security Officer

Computer Security Literacy

Network Security and the Small Business

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

10 Quick Tips to Mobile Security

Get Started Guide - PC Tools Internet Security

Introduction to WSU

F-Secure Internet Security 2012

Computer Viruses: How to Avoid Infection

Quarterly Report: Symantec Intelligence Quarterly

Why is a strong password important?

E-COMMERCE and SECURITY - 1DL018

When visiting online banking's sign-on page, your browser establishes a secure session with our server.

Threat Events: Software Attacks (cont.)

Phishing Scams Security Update Best Practices for General User

Fraud Detection and Prevention. Timothy P. Minahan Vice President Government Banking TD Bank

Cisco EXAM Implementing Cisco Threat Control Solutions (SITCS) Buy Full Product.

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Security Goals Services

Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines

Common Cyber Threats. Common cyber threats include:

Basic Security Considerations for and Web Browsing

SHORT MESSAGE SERVICE SECURITY

CBI s Corporate Internet Banking Inquiry Services gives you the ability to view account details and transactions anytime, anywhere.

The Benefits of SSL Content Inspection ABSTRACT

CHAPTER 10: COMPUTER SECURITY AND RISKS

Transcription:

ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1

Course Outline What you should know from this lecture Fundamental Concepts Issues in Daily Computer and Internet Usage Public Key Infrastructure, SSL, and Digital Certificates Software Demo Policies and Practices Plus Class Activities! SI1-2

Services ( ) Services: what does information security () provide? Authentication 確 認 Confidentiality 保 密 Integrity 完 整 Non-repudiation 不 可 否 認 Availability 可 用 性 SI1-3

Services Authentication refers to the validation of the identity of an entity, before it is being authorized to access further information and services Confidentiality refers to the protection of information from being disclosed to unauthorized parties Integrity refers to the protection of information from being altered by unauthorized parties Non-repudiation refers to the prevention of message senders or digital signature signers to deny having sent or signed the corresponding digital message Availability refers to the assurance that information is available to authorized parties when requested SI1-4

Threats to Hackers Hackers are those who attack computer systems and networks for unauthorized accesses Some of them do so for malicious purposes such as stealing or corrupting data Some of them are just for fun Some of them hack with the goal of strengthening the security of systems and networks SI1-5

Threats to Backdoors Backdoors are mechanisms that originally established by system administrators and software manufacturers for convenience or business purposes Allow one to bypass normal authentication and gain access to computer systems Backdoor accesses remain hidden from casual inspection. One may not even know their existence on the computer However, hackers always have their ways to find them out and uses backdoor as a springboard to hack SI1-6

Threats to Loopholes loopholes are bugs in software that can be exploited for security attacks Even popular software such as Microsoft Windows cannot totally eliminate loopholes Sometimes, backdoors which are originally benign in nature are exploited by hackers to launch intrusions, and they eventually become security loopholes SI1-7

Measures To defense against various security threats, we should Install protection software such as anti-virus programs and personal firewalls Perform regular software updates to block the security loopholes Software manufacturers announce security bugs and release security patches from time to time Pay attention to newly available patches and perform software updates often E.g. Microsoft Central http://www.microsoft.com/security/ Practice Computer Safety! (Introduce in the rest of this course) SI1-8

Issues in Daily Computer and Internet Usage Let s have a brief introduction of Computer Viruses Worms Trojans Spyware Network for Computer Users Spam Adware Phishing SI1-9

Computer Viruses Computer viruses are executable codes that hide inside a program and then infect other programs Computer viruses damage our computers in many different ways, such as Deleting files Erasing programs, and Prompting annoying messages They can also replicate themselves without user intervention SI1-10

Computer Viruses Symptoms of computer virus infection include (but not limited to) Display of unusual messages or images Reduction of available memory Appearance of unknown programs or files Corrupted files Malfunction of programs and files SI1-11

How Computer Viruses Work? First, the virus hides inside a program or file and remains inactive until the infected program is run Once the infected program or file is executed, the virus is run as well It then infects other programs on the computer hard disk by duplicating itself The computer is then inflected SI1-12

How Computer Viruses Work? How we get the infected files? We can receive files and programs that are infected by computer viruses in many ways, including Email Internet downloads, and File transfer through instant messaging SI1-13

Trojans Is a special kind of computer virus The name Trojans come from the story of Trojan horse, in which the Greek solders hid inside a hollow wooden structure and thus sneaked through the city walls of Troy In computer security, a Trojan is a program that performs other than what it is expected E.g., a program claims to be a game but instead it creates backdoors for the hackers to gain unauthorized accesses to a computer Unlike general computer viruses, Trojans do not replicate themselves normally SI1-14

Worms Worms are another kind of computer viruses Spread directly from computer to computer without any action taken part by the computer users E.g., the Sasser worms that widespread in 2004 automatically scans computers on a network that have a particular Windows security loophole SI1-15

What If I Get Infected?! In case we suspect a computer being infected by viruses We should disconnect the computer from the network immediately! Next, run antivirus program to scan the computer for viruses If the computer is infected, the antivirus program will report the found viruses and the corresponding infected files after the virus scanning Usually, antivirus programs try cleaning the found viruses In case the viruses cannot be cleaned, the infected files will be quarantined It is too late to install antivirus programs at time you suspect your computer having been infected by viruses Therefore, antivirus programs should always be installed at the very first beginning SI1-16

What If I Get Infected?! Class Activity One Download Virus?! Visit the Website for EICAR Test Virus (a testing virus sample): http://www.rexswain.com/eicar.html Click eicar.com What happens? SI1-17

What If I Get Infected?! Screen shot (when viruses are found) Has virus SI1-18

Software Software that safeguards security and privacy of information and computer systems In particular: Anti-virus programs defend against computer viruses Anti-spyware program defend against spyware and adware Personal firewalls defend against security threats in network connections Nowadays, popular antivirus software provide the above protections all-in-one SI1-19

Software Class Activity Two Using Software Go to the following page of the SITC Homepage http://www.sitc.cuhk.edu.hk/usefullink.html#is Run the courseware of the following activities Add a New Scheduled Scan Task Protection from Hacker Set up Schedule for Updates SI1-20

Spyware and Adware Not being regarded as computer viruses Yet can be very annoying and dangerous Sometimes being referred to as malware Malware = software that has malicious purposes Computer users often install them unknowingly SI1-21

Spyware and Adware Spyware monitors computer users and collect their information E.g. a keyboard monitor spyware program can log every keystroke you type Adware s mission is to show advertisements Usually via pop-up windows or embedded in a webpage SI1-22

Spyware and Adware How do we get them? They install themselves onto a computer by exploiting Web browser security loopholes Sometimes come with the freeware that can be freely downloaded from the Web We may get them also when we click unknown hyperlinks out of curiosity We should take precautions similar to those dealing with computer viruses SI1-23

Network Internet connection is essential to almost every computer risk also increases SI1-24

Packet Sniffing (Not in Exam) Data being transmitted over the network can be read by computer software called Packet Analyzers Client computer Server (e.g. Gmail.com) SI1-25

SI1-26

Electronic Communication Email Viruses Are computer viruses that spread by means of emails Can spread by duplicating and sending themselves to email addresses in the address book of the email application Usually exist in form of email file attachments Sometimes may spoof sender addresses In March 1999, the Melissa email virus forced a number of global companies, including Microsoft, to turn off their turn off their e-mail systems completely! SI1-27

Electronic Communication Email Spam Unsolicited junk emails from unknown senders Can arrive in a huge volume and can be annoying Why it is bad? Spam occupies Internet and email server resources Uses up email disk quota Takes extra time from us to wade through a large number of spam emails to locate the legitimate ones SI1-28

Electronic Communication Dealing with Spam (at Server Side) Most Internet Service Providers have installed Anti-spam programs in their email servers E.g. the Anti-Spam and Anti-Virus (ASAV) gateway of ITSC Emails that are suspected to be spam are put to the quarantine server and are not directly delivered to users email boxes SI1-29

Electronic Communication Dealing with Spam (at Client Side) Server side anti-spam measures cannot totally remove spam We should take client-side precautions e.g. Do not response to the spam Do not post you and your friends email addresses on the Web Avoid including HTML email links in your personal homepage Create filter rules in our own email applications to filter out unwanted spam emails SI1-30

Electronic Communication Phishing Is a technique to steal ones important personal information Is usually conducted by emails Phishers pretend as organizations such as a bank, send emails and ask the recipients to enter personal information, account numbers and passwords to a counterfeit website that looks like that of the real organization Beware! Legitimate organization do not seek clients information in such way SI1-31

WWW and PKI Public Key Infrastructure, or PKI in short, is an umbrella term for a set of security technologies based on public key cryptography, e.g.: Digital Certificates Digital Signature Public Key encryption PKI provides security to the World Wide Web as well as computer systems and networks SI1-32

Encryption with Public Key Cryptography Suppose Alice wants to send a message to Bob: Encrypt the message with Bob s public key Decrypt the message with Bob s private key Bob has a pair of key: private and public Public Key private Key Public key is known to the public, Private key is kept secret Public Key Private Key SI1-33

Digital Signature with PKI With PKI, suppose Alice wants to sign on the message to Bob so that Bob can be assured it is really from Alice: Sign the message with Alice s private key Verify the signature with Alice s public key Public Key For security reason, encryption and signature should use different key pairs Private Key SI1-34

Digital Certificate and SSL Public keys are published in WWW by means of digital certificates A digital certificate is an electronic file containing information about the certificate holder and is authorized by the Certificate Authority (CA) Main components on a Digital Certificate Certificate holder s Certificate holder s public key Certificate Authority s digital signature Expiry date SI1-35

Digital Certificate and SSL SSL is the abbreviation of Secure Socket Layer Is a communication protocol for providing authentication and confidentiality to Internet traffic Digital certificate is required for communication over SSL When we connect to a Website over SSL We can see a small lock at the lower right hand corner The URL begins with HTTPS instead of HTTP SI1-36

(SSL and no SSL) Packets captured during Gmail login SSL-protected (URL begins with HTTPS) No encryption (in early Gmail) SSL Encrypted packet contents This is a secret message and is confidential! SI1-37

Policies and Practices security depends much on the safe practices of the computer users Computer users are often regarded as the weakest link in information security Organizations with a large number of computer users often define the Acceptable Use Policy (AUP) AUP is a set of rules that governs the use of organization computers, networks, and the Internet by members within an organization The Chinese University of Hong Kong also has its own AUP for staff and students http://www.cuhk.edu.hk/itsc/about/policies.html SI1-38

Policies and Practices Practices for Safe Computing Install and always enable anti-virus and anti-spyware programs. Scan all newly downloaded files and email attachments before you open or install them Check out and install Windows updates regularly Always enable personal firewalls Set strong and non-trivial passwords, and change the password from time to time Backup files and data regularly Do not share local files or directories by file sharing Disconnect from the Internet and wireless connections when not in use Keep your desktop and laptop computers physically safe SI1-39