cosc1078 introduction to information technology lecture 22 internet security
DESCRIPTION
James Harland [email protected]. COSC1078 Introduction to Information Technology Lecture 22 Internet Security. Introduction to IT. 1 Introduction 2 Images 3 Audio 4 Video 5 Binary Representation WebTest 1, Assignment 1 6 Data Storage - PowerPoint PPT PresentationTRANSCRIPT
Lecture 22: Internet Security Intro to IT
COSC1078 Introduction to Information Technology
Lecture 22
Internet SecurityJames Harland
Lecture 20: Internet Intro to IT
Introduction to IT
1 Introduction
2 Images
3 Audio
4 Video
5 Binary Representation WebTest 1, Assignment 1
6 Data Storage
7 Machine Processing
8 Review WebLearn Test 2
9 Processes Assignment 2
10 Internet
11 Internet Security WebLearn Test 3
12 Future of IT Assignment 3, Peer and Self Assessment
Lecture 21: Internet Security Intro to IT
Overview
Questions?
Mock Exam
Assignment 3
Peer and Self Assessment
Internet Security
Questions?
Lecture 6: Audio Intro to IT
Mock Exam
Date and time to be confirmed Bring your own paper, pens, etc. No calculators allowed Answers will be available from me when you leave
Schedule (times to be confirmed):
(assuming room available 10.00-12.30) 10.00 Access to room 10.15 Reading time commences 10.30 Writing time commences 12.30 Exam concludes
Lecture 21: Internet Security Intro to IT
Assignment 3
Review
(re-) answer What is IT? questions from Tutorial 1
Identify difficult parts of the course
Suggest new questions
Include favourites from Assignments 1 and 2
Reflect
Answer reflection questions from tutorials
Research
Write about a particular IT topic of your choice
(5-6 paragraphs)
Lecture 21: Internet Security Intro to IT
Internet Security
pass wordpatch spa
mfire wall
virus war drivingkey logge
r
proxy worm
phishing
Trojan horse
Security vs access
It is always a trade-off (a balance between two competing forces)
More security means less access
More access means less security
Redundancy can be either fatal or vital
Nothing is perfect!
Freedom vs security `Everything which is not forbidden is allowed’
-- Principle of English Law `Everything which is not allowed is forbidden’
-- Common security principle
`Anything not mandatory is forbidden’
-- “military policy” `Anything not forbidden is compulsory’ (??)
— T.H. White (The Once and Future King)
Lecture 7: Internet Security Intro to IT
Passwords
Should be: Long (8 characters or more) Not obvious or from a dictionary Contain capitals, numerals and non-
alphanumeric characters (!&^*$@.,’[]{}? …) Recorded securely somewhere Transmitted in encrypted form only Older programs such as FTP, Telnet transmit
this in plaintext …
Lecture 7: Internet Security Intro to IT
Firewalls
Device which limits internet connections Limit network uses to only approved ones Prevent malicious software reporting
information Prevent outside attacks May need to have ports opened to allow
applications to work Only work on applications, not on content
Lecture 7: Internet Security Intro to IT
Proxy servers
All internet traffic routed via proxy server Acts as an internet gateway Once proxy is secure, so is network Can filter content Can cache content Often used with a firewall in a corporate
environment
Lecture 7: Internet Security Intro to IT
Wardriving
Driving around to find a vulnerable wireless signal Find a wireless connection that doesn’t require a
password (so add one to yours if you haven’t!) Attack systems that use a default admin login
name and password (change yours!) Snoop on transmissions which are not encrypted
(encrypt yours!)
Using a MAC address whitelist means only specified devices can connect to your router
Lecture 7: Internet Security Intro to IT
Viruses,Worms,Trojans
Virus: self-replicating program that attaches itself to files and is spread when they are transferred
Worm: self-replicating program that pro-actively spreads itself
Trojan horse: a program that appears legitimate but is in fact malicious
Lecture 7: Internet Security Intro to IT
Malware and Spyware Malicious software: Hidden mail server Key logging (to capture passwords) Enable machine takeover Direct traffic to particular web sites Analyse behaviour Act as a proxy …
Lecture 7: Internet Security Intro to IT
Denial of service
Prevent network from working normally Flood a server with ‘invalid’ inputs Use a network of compromised machines
to generate an overwhelming number of requests (Conficker?)
Such zombie machines can form a botnet, which then attack a particular server
Lecture 7: Internet Security Intro to IT
Tricking the user
Users are often the weakest link in security Email attachments containing trojan horses ‘Phishing’ Malicious web pages Malicious documents (macros in spreadsheets) Account stealing (via key logging) Scams (‘I have $10 million to import’, ‘You
have just won the lottery’, …)
Lecture 7: Internet Security Intro to IT
Protecting your system
Keep up to date with patches (Windows update, Software update)
Use a firewall Use anti-virus software and keep it up to date Use anti-spyware tools Filter email for spam and suspicious messages Be aware of ‘fake alerts’
Lecture 7: Internet Security Intro to IT
Stuxnet?
Windows-based worm Discovered in July, 2010 Designed to attack a very specific industrial
plant Assumes plant operator would use a Windows
laptop to reprogram plant machinery Not clear who was behind it … Look at the video
Lecture 21: Internet Security Intro to IT
Conclusion
Work on Assignment 3
Check your software defenses!