protecting your on-line privacy and pc
DESCRIPTION
Protecting your On-Line Privacy and PC. Viruses, Worms, Trojan Horses, Spam, and Hoaxes. Of the billions of e-mail messages per year, an increasing proportion of which is unpleasant. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/1.jpg)
1
Protecting your On-Line Privacy and PC
![Page 2: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/2.jpg)
2
Viruses, Worms, Trojan Viruses, Worms, Trojan Horses, Spam, and HoaxesHorses, Spam, and Hoaxes
Of the billions of e-mail messages per year, an increasing proportion of which is unpleasant.
An e-mail security firm scanned 413 million e-mails in August 2003. Three percent contained a virus, 52 percent were spam, and in many cases contained some kind of pornographic image.
![Page 3: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/3.jpg)
3
VirusesViruses Designed to replicate themselves and
potentially cause harmful actions. Often hidden inside innocuous programs. Viruses in e-mails often masquerade as
games or pictures and use beguiling subject lines (e.g., "My girlfriend nude") to encourage users to open and run them.
Try to replicate themselves by infecting other programs on your computer.
![Page 4: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/4.jpg)
4
WormsWorms Like viruses, worms attempt to
replicate themselves, but they are programmed to use one’s mail list and send out e-mails rather than simply infecting programs on a single computer.
![Page 5: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/5.jpg)
5
Trojan HorsesTrojan Horses Malicious programs that pose as
benign applications (do not replicate like viruses and worms).
Trojan horses are used to smuggle viruses and worms inside your computer.
![Page 6: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/6.jpg)
6
SpamSpam Spam, or unsolicited commercial e-
mail, wastes bandwidth and time. The sheer volume of it can be overwhelming, and it can be a vehicle for viruses. Much of it is of an explicit sexual nature, which can create an oppressive working environment and, potentially, legal liabilities if companies do not take steps to stop it.
![Page 7: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/7.jpg)
7
Hoax e-mailsHoax e-mails Hoax e-mails, such as fake virus
warnings, chain letters, or implausible free offers, waste readers' time. Hoax e-mails often contain viruses or Trojan horses.
![Page 8: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/8.jpg)
8
Common Security Common Security Threats Against Threats Against NetworksNetworks
Attackers have different motivations—profit, mischievousness, glory—but they all work in similar ways.
The Basic Threats (infinite variation): Spoofing Tampering Repudiation Information disclosure Denial of Service Elevation of privilege
![Page 9: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/9.jpg)
9
SpoofingSpoofing IP spoofing means creating
packets that look as though they have come from a different IP address.
E-mail spoofing means forging an e-mail so that the From address does not indicate the true address of the sender.
![Page 10: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/10.jpg)
10
TamperingTampering Altering the contents of packets
as they travel over the Internet or altering data on computer disks after a network has been penetrated.
![Page 11: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/11.jpg)
11
RepudiationRepudiation The ability of a user to falsely deny
having performed an action that other parties cannot prove otherwise.
For example, a user that deleted a file can successfully deny doing so if no mechanism (such as audit records) can prove otherwise.
![Page 12: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/12.jpg)
12
Information DisclosureInformation Disclosure Information disclosure consists of
the exposure of information to individuals who normally would not have access to it.
![Page 13: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/13.jpg)
13
Denial of Service (DoS)Denial of Service (DoS) DoS attacks are computerized
assaults launched by an attacker in an attempt to overload or halt a network service, such as a Web server or a file server.
For example, clogging a server with superfluous requests and thus making it impossible for legitimate inquiries to get through.
![Page 14: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/14.jpg)
14
Elevation of PrivilegeElevation of Privilege A process by which a user
misleads a system to grant unauthorized rights, usually for the purpose of compromising or destroying the system.
For example, attacker exploits a weakness in the software that lets her/him change the guest privileges to administrative privileges.
![Page 15: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/15.jpg)
15
SpywareSpyware Spyware is the latest threat
to computers and its users. It joins a host of parasites, such as, viruses, worms, spam, plus e-mail, and network attacks.
![Page 16: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/16.jpg)
16
Spyware Spyware Spyware is a self installing
software that presents varying degrees of maliciousness that range from a program running on your computer in the background (without your knowledge) to a simple tracking cookie.
![Page 17: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/17.jpg)
17
Spyware ActivitiesSpyware Activities Monitors Web-browsing
patterns Triggers related pop-up ads Resets Home Page or Search
Engines Adds links to Bookmarks Attempts to capture personal
information
![Page 18: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/18.jpg)
18
AdwareAdware Adware is another form of
spyware that monitors users’ Web-browsing patterns and displays related pop-up and pop-under ad windows based on this information.
Adware may also send the gathered information back to its creator.
![Page 19: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/19.jpg)
19
Spyware Scanning Tools
Computer Associates’ eTrust PestPatrol
FBM Software ZeroSpyware and ZeroAds
LavaSoft Ad-Aware McAfee Anti-Spyware Trend Micro’s InterScan Web
Security Suite
![Page 20: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/20.jpg)
20
Eliminating Adware & Spyware
Find Remove and, Keep out
![Page 21: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/21.jpg)
21
Finding Spyware
Step 1: Scanning for spyware Requires antispyware tools Consider several categories
of spyware scanning tools (do not run the tools concurrently)
![Page 22: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/22.jpg)
22
Step 2: Eliminating Spyware Since Spyware programs are
constantly modified (DLL and registry settings) use a variety of tools and in hard cases manual removal may also be necessary.
Reformatting the HD and reinstalling the OS may be less work than manually looking for Spyware.
![Page 23: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/23.jpg)
23
Step 3: Install Spyware-blocking Software Install at least two
Spyware-blocking applications and run them one at a time.
Enlist users in the fight against Spyware
![Page 24: Protecting your On-Line Privacy and PC](https://reader036.vdocument.in/reader036/viewer/2022062309/56814f49550346895dbceee6/html5/thumbnails/24.jpg)
24
ReferencesReferences CDW-G Higher Education March
2005 An Introduction to Criminal Hacking,
Viruses, and Malicious Activities. Retrieved March 28th, 2005. http://www.microsoft.com/smallbusiness/gtm/securityguidance/articles/an_introduction_to_criminal_hacking_viruses_and_malicious_activities.mspx