promote education internet security
TRANSCRIPT
Internet Security
Zoaib MirzaPromote Education
www.promoteeducation.com
04/13/23 Zoaib Mirza 2
Topic of Discussions About Me What defines an incident? General Statistics General Threats Best Practices Free Tools Conclusion Q&A Game Bibliography and References
04/13/23 Zoaib Mirza 3
About Me Instructional Associate / Distance
Technology Specialist – DePaul University
Visiting Professor – DePaul University Introduction to Computer Productivity Database Design and Implementation for
Small Business Applications Internet Applications for Small Businesses Management of Information Technology
CEO and founder of www.promoteeducation.com
04/13/23 Zoaib Mirza 4
What defines an incident? A computer security incident covers a
large range of violations, including: Harassment, Denial/Interruption of Service, Malware Infection (worm, virus), Unauthorized Access, Misuse of Data or Services, Copyright Infringement, Spam
04/13/23 Zoaib Mirza 5
General Statistics
http://www.cert.org/stats/
2000-2003
Year 2000 2001 2002 2003
Incidents 21,756 52,658 82,094 137,529
04/13/23 Zoaib Mirza 6
General Threats Virus - A computer virus is a computer program that can copy
itself and infect a computer without permission or knowledge of the user.
Example an infected file. Worm - A computer worm is a self-replicating computer
program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.
For example, a worm could send out copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. When new worms are unleashed, they spread very quickly. They clog networks and possibly cause a long wait for you (and everyone else) to view Web pages on the Internet.
04/13/23 Zoaib Mirza 7
Types of Threats Trojan horse – A Trojan horse is a program that unlike
a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.
Examples include various implementations of weather alerting programs, computer clock setting software, Software that you download for free, and peer to peer file sharing utilities.
Spam - Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. The most widely recognized form of spam is email spam. Spam is also called junk mail.
Example: Emails for unknown senders
04/13/23 Zoaib Mirza 8
Types of Threats Phishing - phishing is a criminal activity using
“social engineering” techniques which is manipulating people into performing actions or revealing confidential information. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.
eBay and PayPal are two of the most targeted companies, and online banks are also common targets.
Phishing is typically carried out using email or an instant message, and often directs users to give details at a website, although phone contact has been used as well.
04/13/23 Zoaib Mirza 9
Best Practices1. Install Operating system Updates and Patches2. Install Anti-Virus and Spyware Protection 3. Use a Host Based Firewall4. Create a strong password5. Use caution when opening email attachments 6. Never share personal information 7. Do not respond to Spam 8. Back up Files 9. Do not Share Folders10. Use a Spyware program
04/13/23 Zoaib Mirza 10
Free Tools Microsoft Baseline Security Analyzer
http://www.microsoft.com/technet/security/tools/mbsahome.mspx
Microsoft Windows Update http://update.microsoft.com/
windowsupdate/v6/default.aspx?ln=en-us
Trend Micro for virus scan http://housecall.trendmicro.com/
04/13/23 Zoaib Mirza 11
Conclusion Secure your computer like you would
secure your home. Do not respond to any emails or
messages if you do not know the sender. Always keep your computer up to date. Do now share any important information
via chatting or emails. Do not download any free software on
your computer. Make sure it is from an authentic website. E.g. http://www.download.com/
04/13/23 Zoaib Mirza 12
Questions and Answers
04/13/23 Zoaib Mirza 13
Game - Questions
You cannot stop me, I can come in your machine in many ways, can you guess the type of threat I am, and what are you doing
to do about itmuhuaaahahahahahah!
04/13/23 Zoaib Mirza 14
Game - Questions1. If I am an unknown email and showing up in
your mailbox almost everyday, who am I? 2. If I am a fake url link or while chatting you
get a link from me on your chat screen asking for personal information, who am I?
3. If I am an infected file on your computer, who am I?
4. If I am an infected file on your network computer and have clog networks, who am I?
5. If I look innocent and harmless but when executed can harm your computer, who am I?
04/13/23 Zoaib Mirza 15
Game - Answers1. If I am an unknown email and showing up in
your mailbox almost everyday, who am I?1. Answer: Spam 2. Action: Use Spam filters, users using yahoo
should set up their spam setting from low to medium or high
2. If I am a fake url link or while chatting you get a link from me on your chat screen asking for personal information, who am I?
1. Answer: Phisher2. Action: Do not click on any unknown link,
respond to any unknown user or share any personal information
04/13/23 Zoaib Mirza 16
Game - Answers
3. If I am an infected file on your computer, who am I?
1. Answer: Virus2. Action: Use an antivirus software to scan
the file4. If I am an infected file on your network
computer and have clog networks, who am I?
1. Answer: Worm2. Action: Unplug the computer from the
internet and scan the whole computer using an antivirus software
04/13/23 Zoaib Mirza 17
Game - Answers
5. If I look innocent and harmless but when executed can harm your computer, who am I?
1. Answer: Trojan2. Action: Uninstall any unknown or
free application downloaded from an unauthentic website
04/13/23 Zoaib Mirza 18
Bibliography and References
http://www.cert.org/stats/ http://is.depaul.edu/security/
information_security/software.asp http://en.wikipedia.org/wiki/Main_P
age