internet security group five

Upload: jerald-jasper

Post on 04-Apr-2018

220 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Internet Security Group Five

    1/19

    Internet SecurityBy: Kyle Lutz, Amber Kariker THE BEST, Greg Krutick, A.J. Nezamabadi,Sharon Kimemia

  • 7/29/2019 Internet Security Group Five

    2/19

    Presentation Over:

    Internet Security Threats Current Issues

    Internet Statistics, did you know?

    Industry Response

    Available Tools

    Hackers: History, who they are, techniques

    Hackers: Top tools, most likely to be hacked,

    successful hackers Intrusion Prevention

    Intrusion Detection

    Conclusion

  • 7/29/2019 Internet Security Group Five

    3/19

    Internet Security Threats

    Identity theft

    Phishing

    Viruses

    Spam

  • 7/29/2019 Internet Security Group Five

    4/19

    Current Issues

    Case Study -TJX Computer breach

    Costs- 12 million (1st quarter)

    Legal issues

    Credit Card Fraud

    Timeline

  • 7/29/2019 Internet Security Group Five

    5/19

    Internet Statistics, did you know?

    Top e-mail sites in2006 for spaminclude.(according to Commtouch).

    Hotmail 4.7 millionYahoo 4.2 million

    MSN 2.1 million

    Cisco 1.9 million

    G-mail 1.5 million

  • 7/29/2019 Internet Security Group Five

    6/19

    Internet Statistics, did you know?

    Both viruses and spam have continued to increase over the years

  • 7/29/2019 Internet Security Group Five

    7/19

    Industry Response

    Software analyst meet todiscuss the latesttechnology

    Demand for security

    professionals Many companies have

    spent money on securityand repairs

    Microsoft estimated twobillion dollars in 2005

    www.Getsafeonline.com

    http://www.homeoffice.gov.uk/

  • 7/29/2019 Internet Security Group Five

    8/19

    Available Tools

    Anti-Virus- Norton 2007;Best known namein anti-virus and internet security

    Anti-Spy Ware

    Firewall Protection

    Anti-spam

  • 7/29/2019 Internet Security Group Five

    9/19

    History of Hackers

    In December of 1947, the transistor was invented. Captain Crunch

    Steve Jobs

    Kevin Mitnick AT&T

    The Worm- Robert Tappan Morris

    Kevin Poulsen (a.k.a. Dark Dante)

    Tsumomu Shimomura David Smith

    Jon Johansen (a.k.a. DVD Jon)

  • 7/29/2019 Internet Security Group Five

    10/19

    Who are Hackers?

    Definition The word Hacker

    Computer programming must be a hobby, something done

    for fun, not out of a sense of duty or for the money. A person who practices hacking is called a hacker.

    Hacking can be just to find out how it works withoutcriminal intent.

    Hacking can be simply to crack a code

    A hacker can be breaking into a computer that's yours,often not wanted, and now prohibited by law.

  • 7/29/2019 Internet Security Group Five

    11/19

    Different Hacker Techniques

    Information Sharing Information Disseminating The belief that system-cracking for fun and exploration is

    ethically OK as long as the cracker commits no theft,vandalism, or breach of confidentiality.

    Telecommunications Studying Redistributing money and credit information maintained in

    credit bureau computers. Obtaining money and property from companies by altering

    the computerized information used by the companies.

  • 7/29/2019 Internet Security Group Five

    12/19

    Top Tools Hackers Use

    Spam Downloads

    Pop-ups

    Active X

  • 7/29/2019 Internet Security Group Five

    13/19

    Most Likely to be Hacked

    Small businesses with 10 or feweremployees.

    Most vulnerable

    Less resources Ignore or unaware of risks

    Large businesses with 100 or more

    employees Higher profile

    Larger network

  • 7/29/2019 Internet Security Group Five

    14/19

    Successful Hackers

    Eric McCarty hacks into USC databaseAustralian hacker attacks sewage control

    computers

  • 7/29/2019 Internet Security Group Five

    15/19

    Intrusion Prevention

    To prevent virus infection Disable Active X controls on IE

    Run anti-virus software with updates

    Do not open suspicous e-mails

    Malware/Spyware infection

    Run anti-spyware software

    Avoid using P2P/file-sharing software

    Intrusions Run a firewall

    Be cautious towards ActiveX and Java Applet prompts

  • 7/29/2019 Internet Security Group Five

    16/19

    Intrusion Detection

    Intrusion detection systems are the nextgeneration of security beyond firewall protection

    Host Based IDS: For servers that contain sensitive

    information.

    Network Based IDS: Monitors certain networksegments.

    Gives administrators a more proactive approach tostopping a potential threat.

  • 7/29/2019 Internet Security Group Five

    17/19

    Introduction to Detection

  • 7/29/2019 Internet Security Group Five

    18/19

    Conclusion

    User awareness is key to a securecomputer/network

    Do not open suspicious files/emails

    Verify ActiveX/Java promptsAvoid using P2P programs

    Avoid downloading freeware

    If attacked, disconnect the network. Do not turnoff the computer

  • 7/29/2019 Internet Security Group Five

    19/19

    Resources

    Alex (2006). A Short History of Hacking. Retrieved May 23, 2007, from Neatorama Website: http://www.neatorama.com/2006/08/28/a-short-history-of-hacking

    Breeding, M. (2007, January). Spam Wars: The Battle of the Formbots. Computers inLibraries,27(1), 32-34. Retrieved May 22, 2007, from Computer Source database.

    Damman H. Whose problem is it?.Process & Control Engineering (PACE) [serial online].November 2005;58(10):31-35. Available from: Business Source Premier, Ipswich, MA.Accessed May 24, 2007.

    Ending the age of the password. (2005, February 22). Computer Weekly, Retrieved May 23,2007, from Business Source Premier database.

    Harvery, Brian (1985). What is a Hacker?. Retrieved May 23, 2007, from What is aHacker? Web site: .

    (2006). Hacking and Hackers An Introduction. Retrieved May 23, 2007, from Hacking andHackers Web site: http://www.thocp.net/reference/hacking/hacking.htm

    Lemos, R. TJX breach larger than previously thought. Retrieved from.

    Pasquariello A. THREAT REDUCTION.Fast Company [serial online]. May 2007;115:22-23. Available from: Computer Source, Ipswich, MA. Accessed May 24, 2007.

    Spanbauer, S. (2007, March). Thwart the Three Biggest Internet Threats of 2007.PC World,25(3), 120-122. Retrieved May 23, 2007, from Academic Search Premier database.

    Trigaux, Robert (2000). A History of Hacking. Retrieved May 23, 2007, from St. PetersburgTimes Online Web site: http://www.sptimes.com/Hackers/history.hacking.html

    http://www.cs.berkeley.edu/~bh/hacker.htmlhttp://www.cs.berkeley.edu/~bh/hacker.html