Download Chapter 6a PowerPoint

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Transcript
Chapter 6 Network and Internet
Security and Privacy
Why be concerned about Internet security?
The Computer Fraud and Abuse Act of 1986 is the main law protecting against
computer crimes. The USA PATRIOT Act increased
the scope and penalties of computer fraud:
1. raising the maximum penalty for violations
to 10 years (from 5) for a first offense and
20 years (from 10) for a second offense;
2. ensuring that violators only need to intend to
cause damage generally, not intend to cause
damage or other specified harm over the $5,000 statutory damage threshold;
3. allowing aggregation of damages to different computers over a year to reach
the $5,000 threshold;
4. enhancing punishment for violations involving any (not just $5,000) damage to
a government computer involved in criminal justice or the military;
5. including damage to foreign computers involved in US interstate commerce;
6. including state law offenses as priors for sentencing; and
7. expanding the definition of loss to expressly include time spent investigating
and responding for damage assessment and for restoration.
Unauthorized Access (hacking)
Gaining access to a computer, network, or system without authorization.
Businesses, schools, and organizations have codes of conduct outlining
acceptable computer use.
Theft of Data
Data theft or information theft is the theft of data or information located on or
being sent from a computer.
Interception of Communications
Instead of accessing data stored on a computer via hacking, some criminals gain
unauthorized access to data, files, email messages, VoIP calls, and other content
as it is being sent over the Internet.
A new trend is criminals intercepting credit and
debit card information during the card verification
process; that is, intercepting the data from a card
in real time as a purchase is being authorized.
Botnets and Zombie Computers
• A computer that is controlled by a hacker or other computer criminal is referred
to as a bot or zombie computer.
• A group of bots that are controlled by one individual and can work together in a
coordinated fashion is called a botnet.
• According to the FBI, an estimated one million U.S. computers are currently part
of a botnet.
WiFi Piggybacking
Many home users have wireless (WiFi) networks.
Many people do not have security implemented
and neighbors or someone driving down the street
could access their network and use their Internet
access.
Computer/Data Sabotage
Malicious destruction to a computer or data. This could be performed
physically or electronically. A disgruntled employee could destroy
a network server or backup tapes. Data or programs could be
altered. Web sites could be defaced.
Denial of Service
A denial of service (DoS) attack is an act of sabotage that attempts to flood a
network server or Web server with so many requests for action that it shuts down or
simply cannot handle legitimate requests any longer, causing legitimate users to be
denied service.
Identity Theft
This occurs when someone obtains enough information about a person (e.g. name,
birth date, SS#, address, credit card#, mother’s maiden name) to be able to
masquerade as that person. The thief could get a driver’s license and credit cards
under your name.
Salami Shaving/Slicing
Writing a computer program that transfers small
amounts of money (e.g. a few cents) from each
transaction to a secret account. This is usually
performed by someone within a company.
e.g. the movie Office Space
Online Auction Fraud
Purchase items on eBay and never receive them. Craigslist also has many scams.
Phishing
The use of a spoofed e-mail to gain credit card numbers, usernames and passwords, or other
personal info. The user is often redirected to a fraudulent (spoofed) web site.
Spoofed or Fraudulent
Web Sites (dot cons)
Many phishing scams use spoofed
web sites. The user will type in his
username/password which is stored
on the server.
• In addition to disclosing personal information only when it is necessary and
only via secure Web pages, you should use security software and keep it up
to date.
• To avoid phishing schemes, never click a link in an email message to go to a
secure Web site—always type the URL for that site in your browser.
Malware – Malicious programs installed without your knowledge.
This includes
adware, spyware, and viruses. The best defense is anti-virus software and good
practices.
Adware
Software that delivers advertisements to
your desktop. It could be installed without
your knowledge, or built in to legitimate apps.
Spyware
Software that secretly gathers information
about the user and transmits it on the
Internet. It could be marketing information transmitted to advertisers or it could be more
malicious and transmit your keystrokes (e.g. usernames and passwords) to someone on
the internet.
Viruses
A program that is installed without the permission or knowledge of the user. It will affect
the computer’s operation in some manner. Viruses are attached to legitimate executable
files and can replicate themselves to other files when you execute them. It is common to
get a virus from executable files downloaded from the Internet, or from executable files
attached to e-mails and instant messages.
A couple types of viruses:
Trojan Horse is a virus that is disguised as a legitimate program. They are downloaded
from the Internet and executed by the user. For example: a game. A regular virus
attaches itself to a legitimate program and executes when you run the program.
Worm is a type of virus that replicates itself over the network or Internet without user
intervention, as opposed to being attached to a file that is downloaded. Without a
firewall, your computer could get a worm when you connect to the Internet.
E-mail Hoaxes/Chain Letters
E-mails chain letters are usually an unreliable source of news. You can go to
snopes.com to verify the content of an e-mail, as well as other rumors.
>>> TO: [email protected] >>> FROM: [email protected] >>> ATTACH:
[email protected]/Track883432/~TraceActive/On.html >>> Hello Everyone, >>> And thank you
for signing up for my Beta Email Tracking >>> Application or (BETA) for short. My name is Bill Gates.
>>> Here at Microsoft we have just compiled an >>> e-mail tracing program that tracks everyone to
whom this message >>> is forwarded to. It does this through an unique IP (Internet Protocol) >>>
address log book database. We are experimenting with >>> this and need your help. Forward this to
everyone you know >>> and if it reaches 1000 people everyone on the list will >>> receive $1000 and a
copy of Windows98 at my expense. >>> Enjoy. >>> Note: Duplicate entries will not be counted. You will
be >>> notified by email with further instructions once this email >>> has reached 1000 people.
Windows98 will not be shipped >>> unitl it has been released to the generalpublic. >>> Your friend,
>>> Bill Gates & The Microsoft Development Team.
Subject: Make A Wish Foundation (fwd) A plea from a sick little girl Little Kimberly Anne is
dying of a horrible tropical disease. Her goal, before she passes into the Great Beyond, is
to collect as many free America Online disks as she can, to make the Guiness Book of
Records. Her project is being sponsored by the Wish-Upon-a-Star Foundation, which
specializes in fulfilling the final wishes of such sick little girls. So, next time you get an
unwanted AOL disk in the mail, don't throw it away! Think of the sparkle it will bring to the
eye of a dying child. Write on the package: [Address deleted to prevent this hoax from
continuing.] Please copy this message and circulate it to your friends, neighbors, and
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ co-workers. Only
you can child's wish reality! God bless you from the Wish-Upon-a-Star Foundation!</h3>
Email Encryption
E-mail is currently the popular form of business communication. E-mail (SMTP) messages
are not encrypted when being sent over the Internet. Some companies will have encryption
for internal e-mails. Some devices such as Blackberries offer encryption for messages to
other Blackberry users.
Web Site Encryption
Web sites which are encrypted
use public/private key encryption.
These web sites use the https://
The web browser will also display
a lock. If you click on the area to
the left of the https, you can see
the security certificate. The web
site is also verified as authentic
by a 3rd party such as VeriSign.
Protecting Against Hardware Loss, Hardware
Damage, and System Failure
Who would you trust to give you drugs?
Since a program can affect your computer the same way a drug can affect your
body, who do you trust to install a program on your computer?
Which one of these software programs
is from a well-known company?
Be careful when you install legitimate
software because the installation
program often tries to install extra
unneeded software.
Be careful installing web
browser plug-ins – this is a
popular way to trick you into
installing malware.
The safest way to install a
plug-in is to go to the site that
makes the software rather
than the site that tries to install
it for you. Here are some
popular browser plug-ins.
Java – from www.sun.com
Flash – from www.adobe.com
Acrobat Reader – from www.adobe.com
Shockwave – from www.adobe.com
Quicktime – from www.apple.com
RealPlayer – from www.realaudio.com
Windows Media Player – from www.microsoft.com
Most add-on toolbars contain adware and/or spyware
My recommendation: DON’T install them. If you REALLY want it, research it first.
To protect hardware from damage due
to power fluctuations, everyone should
use a surge suppressor with a
computer whenever it is plugged into a
power outlet.
Users who want their desktop
computers to remain powered up when
the electricity goes off should use an
uninterruptible power supply (UPS).
Anti-Virus Software
WiFi Security
- prevents unauthorized
access and piggybacking
- provides encryption
WEP (least secure)
Wired Equivalent Privacy
WPA (more secure)
WiFi Protected Access
Firewalls
• Firewalls block unrequested Internet traffic to your computer.
• Windows includes the Windows Firewall (software firewall)
• Many home DSL/Cable routers include a firewall (hardware firewall)
What is your primary defense against hardware loss,
damage, or system failure? Backups!!!!!!!!!!!
•Securing Backup Media
The media used to store backups (tapes, CD-R, DVD-R) needs to be secure.
Fireproof safes provide some protection. Off-site storage of backups adds
considerable protection of media. Data storage companies store backup media
at secure remote locations.
Disaster Recovery Plan
Spells out what an organization will do to prepare for and recover from a
disruptive event.
Q: What data do YOU have that should be backed up?
Q: How do YOU backup your data?