diytp 2009. computer security – virus scanners works in two ways: list of known ‘bad’ files ...

16
DIYTP 2009

Upload: henry-gaines

Post on 22-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

DIYTP 2009

Page 2: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Virus Scanners Works in two ways:

List of known ‘bad’ files Suspicious activity

Terminate and Stay Resident (TSR) program File that persists in memory after execution

Five ways of scanning E-mail/attachment Download File Heuristic

Rules that determine if a file is behaving like a virus

Active code (i.e. Java, ActiveX)

Page 3: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Virus Scanners Mcafee www.mcafee.com Symantec www.symantec.com AVG www.avg.com Trend Micro www.trendmicro.com

Page 4: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Anti-Spyware Spyware

Toolbars, skins, enhancements Threat to privacy

Ad-aware www.lavasoft.com Spybot Search and Destroy

www.safer-networking.org

Page 5: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Intrusion Detection Systems Intrusion Detection Systems (IDS)

Inspects incoming and outgoing activity and looks for patterns

Common categorizations: Misuse vs. Anomaly Passive vs. Reactive Network-based vs. Host-based

Page 6: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Intrusion Detection Systems Misuse Detection vs. Anomaly Detection

Misuse detection Attack signatures

Anomaly detection Detects intrusions and notifies administrator

Passive Systems vs. Reactive Systems Passive

Detects, logs, and sends alert Reactive

Reacts by logging off user or blocking traffic on firewall

Page 7: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Intrusion Detection Systems Network-Based vs. Host-Based

Network-based Analyzes packets on network

Host-based Analyzes a specific host/computer

Page 8: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Intrusion Detection Systems

Figure 1.0 – Intrusion Detection System typical setup

Page 9: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security – Intrusion Detection Systems Snort www.snort.org Cisco IDS

http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/index.shtml

BASE http://sourceforge.net/projects/secureideas/

Page 10: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls Firewall

Barrier between network and the outside world

Filters packets based on certain parameters IP address Protocol

Components Screening Application gateway Circuit-level gateway

Page 11: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls Screening

Also known as ‘packet-filtering’ Most basic type Works in ‘Network’ layer of OSI Examines incoming packets and allows

or prohibits based on a set of pre-established rules

Example: Windows firewall

Page 12: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls Application Gateway

Also known as ‘application proxy’ Runs on firewall Client connects to program and then

proxy establishes connection for client Protects client computers Supports user authentication

Page 13: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls Circuit-level Gateway

More secure than application gateway Generally found on high-end equipment User must be verified before

communication can take place Passes traffic on to destination and vice

versa Internal systems are not visible to

outside world

Page 14: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls How firewalls look at packets

Stateful packet inspection (SPI) Examine each packet Bases decision on current and previous

packets Can look at actual contents of packet

Stateless packet inspection Very basic Only looks at current packet Does not look at contents

Page 15: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)

Computer Security - Firewalls Software-based

Zone Alarm www.zonealarm.com Mcafee Personal Firewall

www.mcafee.com Norton Personal Firewall

www.symantec.com/norton Hardware-based

Cisco www.cisco.com Juniper NetScreen www.juniper.net

Page 16: DIYTP 2009. Computer Security – Virus Scanners  Works in two ways:  List of known ‘bad’ files  Suspicious activity  Terminate and Stay Resident (TSR)