COMPUTER-INTERNET SECURITY. How am I vulnerable?



Similar documents
Introduction to Computer Security Table of Contents

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

PC Security and Maintenance

Multi State Information Sharing and Analysis Center. Briefing Paper. Keeping Your Broadband Internet Connection Secure

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

How To Understand What A Virus Is And How To Protect Yourself From A Virus

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

BE SAFE ONLINE: Lesson Plan

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Module 5: Analytical Writing

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

Computer Viruses: How to Avoid Infection

Emerging Trends in Malware - Antivirus and Beyond

Computer Security Maintenance Information and Self-Check Activities

Network Security and the Small Business

What are Viruses, Trojans, Worms & Spyware:

COB 302 Management Information System (Lesson 8)

STANDARD ON CONTROLS AGAINST MALICIOUS CODE

Chapter 8 Types of Utility Programs and Operating Systems. Discovering Computers Your Interactive Guide to the Digital World

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Securing small business. Firewalls Anti-virus Anti-spyware

Understanding Virus Behavior in 32-bit Operating Environments

Computer infiltration

F-Secure Anti-Virus for Mac. User's Guide

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Section 12 MUST BE COMPLETED BY: 4/22

Virus Definition and Adware

Common Cyber Threats. Common cyber threats include:

F-Secure Anti-Virus for Mac 2015

Understanding Internet Security. What you need to protect yourself online.

Don t Fall Victim to Cybercrime:

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

C&G FLUX MARKET Internet Safety

1 Introduction. Agenda Item: Work Item:

Different Types of Adware and Services

Client Guide for Symantec Endpoint Protection and Symantec Network Access Control

Ohio University Computer Services Center October, 2004 Spyware, Adware, and Virus Guide

Chapter 11 Computers and Society, Security, Privacy, and Ethics

How to easily clean an infected computer (Malware Removal Guide)

Understanding Spyware

E-BUSINESS THREATS AND SOLUTIONS

Outpost For Home Users

Chapter 12 Objectives. Chapter 12 Computers and Society: Security and Privacy

7 Cs of WEB design - Customer Interface

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

ANTIVIRUS AND SECURITY SOFTWARE

Willem Wiechers 3 rd March 2015

Printed Documentation

Protecting Organizations from Spyware

PC & Internet Security

Spyware Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft

TROJAN HORSES: THEY DECEIVE, THEY INVADE, THEY DESTROY

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

Sophos Endpoint Security and Control Help

Spyware: Securing gateway and endpoint against data theft

WHITE PAPER. Understanding How File Size Affects Malware Detection

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

How To Monitor The Internet In Idaho

Network Incident Report

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Is your data secure?

Information Resource Management Directive USAP Software Management and Protection

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

1 Introduction. Agenda Item: Work Item:

Spyware and Adware What s in Your Computer?

LAW OFFICE SECURITY for Small Firms and Sole Practitioners. Prepared by Andrew Mason, Scott Phelps & Mason, Saskatoon Saskatchewan

Countermeasures against Spyware

Contents. McAfee Internet Security 3

Computers and Society: Security and Privacy

This document provides information to install X-Spam for Microsoft Exchange Server

ANTIVIRUS BEST PRACTICES

Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them

It is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

ERA6 OBJECTIVE QUSESTION

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Sophos Computer Security Scan startup guide

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Software. Webroot. Spy Sweeper. User Guide. for. Webroot Software, Inc. PO Box Boulder, CO Version 6.

A Crawler-based Study of Spyware in the Web. Alex Moshchuk, Tanya Bragin, Steve Gribble, Hank Levy

Symantec AntiVirus Corporate Edition Client Guide

ACS-3921/ Computer Security And Privacy. Lecture Note 5 October 7 th 2015 Chapter 5 Database and Cloud Security

Spyware. Summary. Overview of Spyware. Who Is Spying?

The Care and Feeding of Your Computer Troubleshooting and Maintenance

What's the difference between spyware and a virus? What is Scareware?

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Part I: Ethics. Moral guidelines that govern use of computers and information systems. Unauthorized use of computer systems

Step-by-Step Guide to Securing Windows XP Professional with Service Pack 2 in Small and Medium Businesses

IRM NEWS CYBER SECURITY AWARENESS FIREWALLS THE GUARDIAN AT THE GATE FLORIDA ATLANTIC UNIVERSITY

Spyware Study. Prof. Robila CMPT 495. Computer and Data Security. Group: Francis Rivera Douglas Schemly Igor Yussim. Due:

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

HIPAA Training Part III. Health Insurance Portability and Accountability Act

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Transcription:

COMPUTER-INTERNET SECURITY How am I vulnerable? 1

COMPUTER-INTERNET SECURITY Virus Worm Trojan Spyware Adware Messenger Service 2

VIRUS A computer virus is a small program written to alter the way a computer operates, without the permission or knowledge of the user. A virus must meet two criteria: It must execute itself. It will often place its own code in the path of execution of another program. It must replicate itself. For example, it may replace other executable files with a copy of the virus infected file. Viruses can infect desktop computers and network servers alike. 3

VIRUS - DAMAGE Some viruses are programmed to damage the computer by damaging programs, deleting files, or reformatting the hard disk. Others are not designed to do any damage, but simply to replicate themselves and make their presence known by presenting text, video, and audio messages. Even these benign viruses can create problems for the computer user. They typically take up computer memory used by legitimate programs. As a result, they often cause erratic behavior and can result in system crashes. In addition, many viruses are bug-ridden, and these bugs may lead to system crashes and data loss. 4

WHAT IS NOT A VIRUS It is easy to blame any computer problem on a virus. The following are not likely to be caused by a virus or other malicious code: Hardware problems. There are no viruses that can physically damage computer hardware, such as chips, boards, and monitors. You have two antivirus programs installed and one of them reports a virus. While this could be a virus, it can also be caused by one antivirus program detecting the other program's signatures in memory. 5

WORMS Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will then travel from computer to computer, so the entire document should be considered the worm. 6

TROJAN Trojan Horses are impostor files Files that claim to be something desirable but, in fact, are malicious. A very important distinction from true viruses is that they do not replicate themselves, as viruses do. 7

TROJAN - DAMAGE Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan Horse to spread, you must, in effect, invite these programs onto your computers -- for example, by opening an email attachment. 8

SPYWARE Spyware is a generic term for a class of software designed to gather information. Although software of this type can be legitimate, it can, in some cases, be installed on your computer without your knowledge. This poses privacy concerns for many people. 9

SPYWARE - PURPOSE The general purpose of spyware is to gather information about your Internet surfing habits and deliver that information to its customers. It can also gather information on the use of your personal computer and even the keystrokes entered into your computer s keyboard. 10

SPYWARE FORMS OF Spyware basically comes in, but is not confined to, three forms: As software bundled and installed with another software application, As a stand-alone installation package, As a modification to the HTML of a Web page. 11

SPYWARE - DAMAGE Spyware programs, while they may be objectionable, are generally not malicious as far as damaging the computer. Most spyware programs have Web sites, and many of these sites have privacy statements or FAQs that explain what they do and what types of information they collect. This information can assist you in making an informed decision on whether to keep or uninstall the spyware. 12

SPYWARE - NOTES In many cases, when the spyware is installed with a utility or game you downloaded, you may have to uninstall the utility or game to uninstall the spyware. If you uninstall only the spyware, the utility or game may become unusable. Spyware is often bundled with free downloadable Internet programs such as Web browsers, browser enhancements, desktop utilities, browser theme packages, and games. 13

ADWARE Adware is a type of program that displays an advertisement of some sort, usually related to a specific Web site in your Web browser. In some cases, it changes the home page of your Web browser to point to a specific Web site. 14

ADWARE - INSTALLATION In most cases, some user interaction is required to install adware. You must either double-click the program to run it, or there is information on the Web site to inform you that it will install a program on your computer. (This information may not be obvious, however.) Because adware programs are not generally malicious, and are not viruses, worms, or Trojans, Most AntiVirus programs do not detect them as such. 15

ADWARE - DAMAGE Intrusion on your computer by an unknown third party, Annoying windows on desktop, Unwanted redirection to another website. 16

MESSENGER SERVICE Operates over NetBIOS Ports 135, 136, & 137 All versions of Windows, and many other operating systems, use these ports in networking 17

MESSENGER SERVICE - USES Most often used to deliver unwanted SPAM Often used to try to scare the computer user into purchasing a program to protect the user from viruses, etc by saying your computer is unprotected 18

WHAT CAN I DO? Be aware of what is being installed on your computer, Don t automatically accept attachments in email, Disable automatic download in web browsers, Limit use of JavaScript, ActiveX & Windows Scripting Host in your web browsers. Turn off the messenger service if not needed or use a firewall or router to block those ports 19

WHERE CAN I GET MORE INFORMATION? Websites: http://grc.com/su-bondage.htm http://www.staff.uiuc.edu/~ehowes/main.htm 20

WHERE CAN I GET MORE INFORMATION? Newsgroups: news.grc.com Your ISP s newsgroup i.e. news.tyler.net 21

HOW CAN I STOP THE INTRUSION? AntiVirus (software) AntiTrojan (software) AntiSpyware/AntiAdware (software) Router/Switch (hardware) Firewall (software or hardware) 22

QUESTIONS? 23