internet technology assign
TRANSCRIPT
-
8/6/2019 Internet Technology Assign.
1/103
InternetSecurity
M.Jayakumar CT230 Internet Technology
Individual Assignment 1
-
8/6/2019 Internet Technology Assign.
2/103
P art 1 The Threats
-
8/6/2019 Internet Technology Assign.
3/103
The threats
most peopleare not awareof.
The threatsmany of us areaware of.
-
8/6/2019 Internet Technology Assign.
4/103
The Global Scope of the P roblem
Estonia, a tiny buthighly wired country
on the Baltic Sea,was essentially shutdown for 3 weeksduring April and Mayof 2007 by organizedcyber attacks.
-
8/6/2019 Internet Technology Assign.
5/103
The Global Scope of the P roblem
2 dozen SouthKorean & U.S.Government
agencies & otherswere attacked inJuly 2009. Targetsincluded the DoD,
FAA, HomelandSecurity, NYSE,NASDAQ, etc.
-
8/6/2019 Internet Technology Assign.
6/103
The National Scope of the P roblem
Database breach by hackers personalinformation on 160,00 current and former students and alumni stolen.
530,000 medical records stolen includingsocial security numbers.
Sensitive information on 65,000 currentand former employees stolen.
A few of the many major security breachesthat became public in the 2 nd Quarter of 2009.
-
8/6/2019 Internet Technology Assign.
7/103
The P ersonal Scope of the P roblem
E-mail scamsIdentity theft
Damage, repairs & replacementsP roductivity loss
-
8/6/2019 Internet Technology Assign.
8/103
Malware Headlines YouMight Have Missed
10-11-09 - Spam dominates e-mail traffic (86%)10-11-09 - Malware threats in search engine results
10-08-09 - FBI nets 100 people in phishing ring10-07-09 - Fox Sports site hacked toserve malware
10-06-09 - Malware flea market pays hackersto hijack P C
10-06-09 - Weak passwords dominateHotmail phishing leak
-
8/6/2019 Internet Technology Assign.
9/103
Malware Headlines YouMight Have Missed
10-05-09 - P hony Facebook profilesspreading malware
09-30-09 - Malware re-writes online bankstatements cover fraud
09-30-09 Earthquake / tsunami searcherstargeted by malware
09-15-09 - Malware ads hit NY Times09-15-09 - Operating systems not thekey security risk anymore
08-20-09 - Malware designed to stealIDs increased 600%
-
8/6/2019 Internet Technology Assign.
10/103
Malware malicious software
Intent is todamage, disrupt,
steal, or otherwise inflictproblems on
data, hosts, or networks.
-
8/6/2019 Internet Technology Assign.
11/103
The Scope of the P roblemThe number of NEW malware threats is increasing
New malicious codesignatures - Symantec
2007
2008
-
8/6/2019 Internet Technology Assign.
12/103
What are the Threats?
Tracking CookiesFlash CookiesAdwareHoaxesScamsP hishingVishing
Not malwareBackdoor KeyloggersViruses & WormsWormsTrojansSpywareRootkitsBots
Malware
-
8/6/2019 Internet Technology Assign.
13/103
Tracking CookiesNot malwareTag containinginfo, sometimes
useful to youNo personal infounless offeredCookie storage canbe limitedMay expireEasy to remove
-
8/6/2019 Internet Technology Assign.
14/103
Flash CookiesLargely unknown,widely usedInstalled by a FlashpluginNever expireMore cumbersome
to removeCan send info w/ouser permission
Adobe
Flashlogo
-
8/6/2019 Internet Technology Assign.
15/103
Flash Cookies
Widelyused
includingin Extension
-
8/6/2019 Internet Technology Assign.
16/103
AdwareFree software thatplays, displays or downloads advertising
May be toolbars,search boxes, games,utilitiesMostly safe but some isspywareRead privacy policies
-
8/6/2019 Internet Technology Assign.
17/103
Social Engineering
Means:Manipulatingpeople to dothings or todivulge
confidentialinformation
-
8/6/2019 Internet Technology Assign.
18/103
P hishing
Aim is to stealvaluable informationsuch as credit cards,social securitynumbers, user IDsand passwordsUsually done by e-mailSocial engineering
-
8/6/2019 Internet Technology Assign.
19/103
P hishingOften masquerades as legitimateperson or business, even governmentOften contains a threat or consequenceE-mail may look genuine, trustworthyAlways points to different website thanit appears to come from.Legitimate organizations never ask for sensitive information through e-mail
-
8/6/2019 Internet Technology Assign.
20/103
P harming
Intent is to redirect alegitimate website's
traffic to another,nearly identical butbogus website for
the purpose of stealing sensitiveinformation.
-
8/6/2019 Internet Technology Assign.
21/103
Scams
Based on socialengineeringOften appeal tocompassion or greedDisasters typically
generate largenumbers of scamsAppear legitimate
-
8/6/2019 Internet Technology Assign.
22/103
ScamsDont click on linksin these e-mailsTypically offer something of value,ask for money in advanceNearly impossible to track themonetary transactionsScammers are accomplished socialengineers
-
8/6/2019 Internet Technology Assign.
23/103
ScamsNigerian money fraud scams began in1997 or before by fax!These scams have spreadto 80 countries or more.U.S. and U.K. are major targets
-
8/6/2019 Internet Technology Assign.
24/103
Scam TargetsDating sites - exploitthe victims desire for a companionship
Religious sites - seekdonations from their victims for worthy
causeSocial websites -exploit personal info
-
8/6/2019 Internet Technology Assign.
25/103
Scams
US - $1-$2 billion
UK 150 millionpoundsAustralia - $36
million AUD
Estimated annual losses
-
8/6/2019 Internet Technology Assign.
26/103
TrojansP rograms thatmasquerade asgood programs
Can spy, stealinformation, logkeystrokes,download other malwareOpen backdoors,over write data
-
8/6/2019 Internet Technology Assign.
27/103
Trojans
Cannotreproduce
Must be spreadby user interactionMany differenttypes of trojans
-
8/6/2019 Internet Technology Assign.
28/103
VirusCan create files,move files, erase filesCan consume
memory and causecomputer problemsCan replicateCan attach to other
programsCan travel acrossnetworks
-
8/6/2019 Internet Technology Assign.
29/103
WormsA special type of virusCan replicate itself and usememory
Reproduce so fast theyoverload and shut downentire systemsCannot attach itself to other
programs.Spreads mostly by e-mail
-
8/6/2019 Internet Technology Assign.
30/103
Backdoor
Malware thatallows access to acomputer withoutknowledge of theusers passwordand user name.Allows attackerseasy remoteaccess
-
8/6/2019 Internet Technology Assign.
31/103
Spyware
P urpose is tocapture information
Email, usernames,passwords, creditcard info, etc.Can transmit thisinformation
-
8/6/2019 Internet Technology Assign.
32/103
Rootkit
Help intruders gainaccess to systemsAvoid detectionSubversion &evasionMay avoid anti-virus or anti-spyware scan
-
8/6/2019 Internet Technology Assign.
33/103
Bots or ZombiesA computer infectedwith malware,controlled remotely
without the knowledgeof the user Combined into
networks calledbotnetsRented or sold tocriminal interests
-
8/6/2019 Internet Technology Assign.
34/103
Bots or Zombies
Can be used to propagate malware or for cyber attacks
Botnets may consist of thousands of machines worldwideUsed to send about 80% of all spamand to attack commercial websitesand other systems
-
8/6/2019 Internet Technology Assign.
35/103
Bot Network
-
8/6/2019 Internet Technology Assign.
36/103
IntermissionWhen we returnhow do we protect our computers and our data?
-
8/6/2019 Internet Technology Assign.
37/103
P art 2 The P rotection
Weve covered the threats, but how
do we protect ourselves?
-
8/6/2019 Internet Technology Assign.
38/103
UseBestP ractices
Data
Router w/hardware firewall
ZoneAlarmsoftware firewall
Spybot w/ teatimer
Super AntiSpyware
Anti virussoftware
BackupData
-
8/6/2019 Internet Technology Assign.
39/103
Best P racticesP hysical computer securityLegal agreements - read the fine print
Use good passwordsKeep passwords safeUse a flash drive capable of read-only
Update your operating system (OS)Update your applications
-
8/6/2019 Internet Technology Assign.
40/103
Best P ractices
Use a hardware firewallUse a software firewall
Use and update security products ie: anti-spyware, anti-virus, etc.Clean the system regularly
Backup system regularly (after cleaning)Suggest using FireFox w/ security plugins
-
8/6/2019 Internet Technology Assign.
41/103
P hysical Computer Security
Limit physicalaccess tocomputersespecially laptops
-
8/6/2019 Internet Technology Assign.
42/103
P hysical Computer Security
All users shouldbe required to login, even at homeA P C with no log-in password is likea car with the keysin the ignition.
-
8/6/2019 Internet Technology Assign.
43/103
Legal AgreementsA software licenseagreement is a legalcontract between a
producer and apurchaser of computer software.Called End User
Licensing Agreements(EULA) or Terms of Use(TOU)P rivacy Agreements
-
8/6/2019 Internet Technology Assign.
44/103
Read the Fine P rint
Agreeing to theseelectronic documentsmeans you are signinga legal contract.Read them beforeagreeing
Suggest you keep acopy (paper or digital)
-
8/6/2019 Internet Technology Assign.
45/103
Use Good P asswords
Great Internetsecurity meansnothing if thebad guys canguess your passwords
-
8/6/2019 Internet Technology Assign.
46/103
Keep P asswords Safe
Need a system of choosing and usinggood passwords orP asswordmanagementsoftwareExamples: Roboform,Kee P ass, others
KeeP
ass
RoboForm
-
8/6/2019 Internet Technology Assign.
47/103
P assword Management Software
P assword generator Master password
Encrypted database of passwordsDesktop, portable, Web-based
-
8/6/2019 Internet Technology Assign.
48/103
USB MalwareFlash drivesbanned by USArmy in 2008 due
to malware andsecurity concerns.An estimated 10%of malware waswritten to move ona flash drive.
-
8/6/2019 Internet Technology Assign.
49/103
USB Flash Drive w/ Read-OnlyMay be difficult tofindHave a physical
switch that preventswriting (andspreading malware)to the flash drive
useful on unknown /unfamiliar computers
-
8/6/2019 Internet Technology Assign.
50/103
Upgrade vs Update
An upgrade from v2.5to v2.6 for example issimply a major updateUpgrading is takingyour vitamins; fixing ahack is open-heartsurgery. MattMullenweg, foundingdeveloper of Word P ress
-
8/6/2019 Internet Technology Assign.
51/103
Update Your Operating System
Install allsecuritypatchesGo toWindowsUpdatewebsite
-
8/6/2019 Internet Technology Assign.
52/103
Update Your
OperatingSystem
Set autoupdates todownload
but notinstallunless youapprove
-
8/6/2019 Internet Technology Assign.
53/103
Update/ Upgrade Your Applications
Hackers are finding waysto embed malware ineveryday programsIn July 2009 it happened to Adobe P DFfiles. Adobe issued a patch.Unless you install the patch, yourevulnerable when viewing P DFs
-
8/6/2019 Internet Technology Assign.
54/103
Update Your Applications
Average computer holds 80+ programsHow to keep them all updated?
If offered, turn the auto-update onUpdate often-used programs manuallyHelper programs for the rest - Secunia
Free, checks your programs, notifiesyou when updates are needed
-
8/6/2019 Internet Technology Assign.
55/103
Update Your Applications
-
8/6/2019 Internet Technology Assign.
56/103
Data
Router w/hardware firewall
ZoneAlarmsoftware firewall
Spybot w/ teatimer
Super AntiSpyware
Anti virussoftwareUse
BestP
ractices
BackupData
-
8/6/2019 Internet Technology Assign.
57/103
Firewall Technology
Hardware or software designed and implemented tocontrol the flow of network traffic.A firewall is simply a program or hardware devicethat filters the information coming through theInternet connection into your private network or computer system.If an incoming packet of information is flagged bythe filters, it is not allowed through.
-
8/6/2019 Internet Technology Assign.
58/103
Firewall TechnologyA company will have hundreds of computers that allhave network cards connecting them together. Oneor more computer will have connections to theInternet. Without a firewall in place, all of thosehundreds of computers are directly accessible to
anyone on the Internet.Out of the 500 computers inside this company, onlyone of them is permitted to receive public FT P traffic.Allow FT P connections only to that one computer
and prevent them on all others.Company can control how employees connect toWeb sites, whether files are allowed to leave thecompany over the network
-
8/6/2019 Internet Technology Assign.
59/103
Firewall TechnologyFirewalls use one or more of three methods to controltraffic flowing in and out of the network:
P acket filteringP roxy serviceStateful inspection
-
8/6/2019 Internet Technology Assign.
60/103
Hardware Router w/Firewall
First line of defenseAvailable in wired or wireless versionsWired is more secureP rotects againstincoming attacks$100 - $150
-
8/6/2019 Internet Technology Assign.
61/103
-
8/6/2019 Internet Technology Assign.
62/103
Software Firewall
Use the pre-installed Windowsfirewall only if you have no other options.Turn it off before installing a better product.If you have the X P operating systemyou MUST obtain a software firewallDO NOT use X P s firewall.
-
8/6/2019 Internet Technology Assign.
63/103
Install firewall first,then install other security software
antivirus, antispyDo not install multiplesoftware firewallsZoneAlarm P ro isadequate - $40Does require systemresources
Software Firewall
-
8/6/2019 Internet Technology Assign.
64/103
Data
Wireless Router w/hardware firewall
ZoneAlarmsoftware firewall
Spybot w/ teatimer
Super AntiSpyware
Anti virussoftwareUse
BestP
ractices
BackupData
-
8/6/2019 Internet Technology Assign.
65/103
Antivirus Software
Many softwareoptionsMany are free,or free trial
-
8/6/2019 Internet Technology Assign.
66/103
Antivirus SoftwareWorries for all computer users is the threat of viruses entering their systemsFight against all kinds of malicious attacks andprevent adware, spyware, Trojans and worms fromentering into the computer System for analyzing information and then, if it findsthat something is infected, it disinfects itAntivirus software acts basically in two ways
- Scanning files- Heuristic Approach.
-
8/6/2019 Internet Technology Assign.
67/103
Antivirus SoftwareScanning Files
Employs a database of familiar virus code andapplies it to compare the files with the knownmalicious codeDatabase of the antivirus updated so that it canprevent the malicious attacks which are beingcrafted each and every day.After the match have been detected, Antivirus willtake action in three different forms:
- Quarantine the file- Repair the infected files- Remove the file
-
8/6/2019 Internet Technology Assign.
68/103
Antivirus SoftwareThe Heuristic Approach
Keeps track of the type of the programs that areexecutable on a computer Doubtful behavior is identified then a prescheduledrange of responses are activatedThe response can start from asking the owner of theP C how execute the process of deleting themalicious code automaticallyP rotects against latest malware threats that are yetto be identified or registered in theantivirus database.
-
8/6/2019 Internet Technology Assign.
69/103
Security P olicySecurity policies are rules that are electronicallyprogrammed and stored within security equipmentto control such areas as access privilegesThe policies that are implemented should controlwho has access to which areas of the network andhow unauthorized users are going to be preventedfrom entering restricted areasThe security policy management function should be
assigned to people who are extremely trustworthyand have the technical competence required.
In the future, some passwords may be replaced by biometrics, which is technology that identifies users based on physical characteristics, such as fin
-
8/6/2019 Internet Technology Assign.
70/103
Security P olicyImplementation
Identity methods and technologies must beemployed to help positively authenticate and verifyusers and their access privileges.Making sure that certain areas of the network arepassword protectedonly accessible by thosewith particular passwordsThe golden rules, or policies, for passwords are:
- Change passwords regularly- Make passwords as meaningless as possible- Never divulge passwords to anyone until
leaving the company
-
8/6/2019 Internet Technology Assign.
71/103
Security P olicy
-
8/6/2019 Internet Technology Assign.
72/103
Security policyDigital Certificate
E-commerce has flourished because of the ability to performsecure transactions online using the proper tools. These toolsare public key encryption and digital certificates.P ublic key encryption uses SSL (Secure Sockets Layer) toencrypt all data between the customer's computer and the e-commerce websiteAnyone can create a website and key pair using a name thatdoesn't belong to them. This is where digital certificates comein.Digital certificates are trusted ID cards in electronic form thatbind a website's public encryption key to their identity for purposes of public trust
S i li
-
8/6/2019 Internet Technology Assign.
73/103
Security P olicyDigital Certificate
Digital certificates are issued by an independent,recognized and mutually trusted third party thatguarantees that the website operating is who itclaims to be. This third party is known as aC ertification Authority ( C A) .Digital certificate contains an entity's name, address,serial number, public key, expiration date and digitalsignature, among other information.
When a Web browser like Firefox, Netscape or Internet Explorer makes a secure connection, thedigital certificate is automatically turned over for review..
-
8/6/2019 Internet Technology Assign.
74/103
Security P olicyDigital Certificate
The browser checks it for anomalies or problems,and pops up an alert if any are found.When digital certificates are in order, the browser completes secure connections without interruptionDigital certificates play an integral role in keepingonline commerce safe. If your browser alerts you toa problem with a digital certificate, you are well-advised not to click through. Instead, call the
business using a telephone number from your statements or phone book, and inquire as to theproblem.
-
8/6/2019 Internet Technology Assign.
75/103
Security P olicyDigital Certificate
-
8/6/2019 Internet Technology Assign.
76/103
Access ControlAccess control systems are electronic systems which aredesigned to control who has access to a networkDoor which can be locked, limiting people to one side of thedoor or the other.
Access control servers validate the users identity anddetermine which areas or information the user can accessbased on stored user profilesAccess control systems which span over computer networksare typically administered in a central location, with each user being given a unique identity.An administrator grants access privileges to personnel on acase by case basis, using settings within the administrationsoftware.
-
8/6/2019 Internet Technology Assign.
77/103
EncryptionEncryption technology ensures that messagescannot be intercepted or read by anyone other thanthe authorized recipientEncryption is usually deployed to protect data that istransported over a public network and usesadvanced mathematical algorithms to scramblemessages and their attachments.All VP N hardware and software devices support
advanced encryption technology to provide theutmost protection for the data that they transport.
-
8/6/2019 Internet Technology Assign.
78/103
Encryption
-
8/6/2019 Internet Technology Assign.
79/103
Intrusion DetectionA network-based intrusion detection system (IDS)provides around-the-clock network surveillanceAn IDS analyzes packet data streams within anetwork, searching for unauthorized activity, such asattacks by hackers, and enabling users to respond tosecurity breaches before systems are compromisedWhen unauthorized activity is detected, the IDS cansend alarms to a management console with details
of the activity and can often order other systems,such as routers, to cut off the unauthorizedsessions.
-
8/6/2019 Internet Technology Assign.
80/103
Intrusion Detection
-
8/6/2019 Internet Technology Assign.
81/103
Network ScanningNetwork scanners conduct detailed analyses of networked systems to compile an electronicinventory of the assets and detect vulnerabilities thatcould result in a security compromiseAllows network managers to identify and fix securityweaknesses before intruders can exploit them
-
8/6/2019 Internet Technology Assign.
82/103
Spybot Search & Destroy
Eliminatesadware,spyware,Trojans,keyloggers,dialers
- Free- Real-time protection
-
8/6/2019 Internet Technology Assign.
83/103
Spybot Search & Destroy
Malware often changesthe registrySpybot warns of potential
registry changes withTea-timerLegitimate softwareinstallations also changethe registry and maycause false alarms
-
8/6/2019 Internet Technology Assign.
84/103
Spybot Search and Destroy
Will immunizethe systemLike a Do NotCall list of websites for your browser
-
8/6/2019 Internet Technology Assign.
85/103
Super AntiSpyware
Removesspyware,Adware
Trojans,Dialers,Worms,HiJackers,KeyLoggers,P arasites,Rootkits
- Free
- Real-time protection- Can be scheduled
-
8/6/2019 Internet Technology Assign.
86/103
MalwareBytes
Free versionFull version (onetime fee of $24.95)includes real-timeprotection.
-
8/6/2019 Internet Technology Assign.
87/103
Data
Wireless Router w/hardware firewall
ZoneAlarmsoftware firewall
Spybot w/ teatimer
Super AntiSpyware
Anti virussoftwareUse
BestP ractices
BackupData
How to Use These
-
8/6/2019 Internet Technology Assign.
88/103
How to Use TheseTools Effectively
P ick one day of the week (Sunday AM?)Use the tools in this order: Spybot,SuperAntispyware, AntivirusStart one tool, go read the paper When one tool has finished, start thenext, go read the paper When all tools are done, do a completebackup and label it w/ date & clean
-
8/6/2019 Internet Technology Assign.
89/103
Backup Your DataWhy backup?Data loss or corruption
Human error, fire,flood, malwareBacking up is
cheaper, easier thanre-creating the data
-
8/6/2019 Internet Technology Assign.
90/103
Backup Your DataMany ways tobackupData only, wholesystem, online,localCompressed,
uncompressed,automated
-
8/6/2019 Internet Technology Assign.
91/103
Data-Only Backup
Dozens of softwarechoices for everybudget & free
Backs up selected filesTypically usesproprietarycompressionSyncToy Free MSprogram nocompression
Back2Zipfree software
-
8/6/2019 Internet Technology Assign.
92/103
Whole-System BackupTakes an image of the whole system noteach file individually
Several choicesincluding Acronis,Norton Ghost, others
Backup in 15-20 min,restore - 30 min to 1 hr
-
8/6/2019 Internet Technology Assign.
93/103
Online Backup Service
AdvantagesInexpensive
Some operate inthe backgroundDisadvantagesMonthly feeDepends onInternet access
-
8/6/2019 Internet Technology Assign.
94/103
Local External BackupAdvantagesLow one-time costMulti-purpose
Easily accessibleDisadvantageRisks similar tooriginal dataNote keep unitunplugged unless in use
ExternalHard Drive
-
8/6/2019 Internet Technology Assign.
95/103
FireFox with Security P lugins
A plugin is an additionalcomponent or featurethat can be added to alarger programNoScript to stop webscripts from running
Better P rivacy tocontrol Flash cookies
-
8/6/2019 Internet Technology Assign.
96/103
Virtual P C P roductsThese programs create a virtual P Cwithin your real P C.When programs run in the virtual P C,
they cant make changes to the real P CRequires some technical knowledgeRequires extra processing power
Extremely safe if the VirtualP
C getsinfected, simply delete it and create anew one.
-
8/6/2019 Internet Technology Assign.
97/103
Virtual P C Software
Microsoft Windows Virtual P CVMware
Connectix VirtualP
CSun VirtualBox
-
8/6/2019 Internet Technology Assign.
98/103
Creates a small virtual space insideyour computer called a sandbox.Can run a program or browser insidethe sandbox.Smaller learningcurve than aVirtual P C
Less processing power neededthan a Virtual P C
Sandboxie
C i l Wh d h l
-
8/6/2019 Internet Technology Assign.
99/103
You
CommercialRepair
Local P C
Users Groups
Friends & family
CompUSA
GeekSquad
Localrepair shop
Etc.
When you need help
-
8/6/2019 Internet Technology Assign.
100/103
When You Need Help
You are a key componentBecome knowledgeable about basiccomputer problems whats serious,whats notUnderstand who your resources are,who can deal with which problemsAsk around about commercial repair options whos recommended?
-
8/6/2019 Internet Technology Assign.
101/103
50+ organized groups around thestate. Dues avg $25-$35/yr FACUG Fla Assn of Computer User Groups is the umbrellaorganization - list is athttp://www.facug.org/Members help members w/
problemsAttend meetings occasionally build relationships
P C Users Groups
-
8/6/2019 Internet Technology Assign.
102/103
DisclaimersInformation presented here is based oncurrently available information.This information changes frequently. Noguarantee of accuracy is possible.
Hardware, software, companies and techniquesdiscussed are options, not recommendations. You alone are responsible for software and /or hardware choices and use of any techniques.
P lease read all legal agreements, instructions,user agreements and privacy terms associatedwith any hardware, software or websites.
-
8/6/2019 Internet Technology Assign.
103/103
Thanks You