internet safety csa 105 1.0 september 21, 2010. internet threats malware (viruses) spyware spam...

24
Internet Safety CSA 105 1.0 September 21, 2010

Upload: marvin-garrett

Post on 25-Dec-2015

214 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Internet Safety

CSA 1051.0

September 21, 2010

Page 2: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Internet Threats

• Malware (viruses)

• Spyware

• Spam

• Hackers

• Cyber-criminals

Page 3: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Malware

Malicious Software

Page 4: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Types of Malware

• Virus

• Worm

• Trojan Horse

Page 5: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Viruses

• Virus: A program that attaches itself to another program and spreads itself to other computers

• Viruses are hidden within the code of a host program• Replicate themselves– Slow down networks

• Secondary objectives– Display annoying messages– Delete files on the hard drive– Change computer settings

• Need human action to spread

Page 6: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

How Computers Catch a Virus

• Viruses copy themselves and infect a file on your computer

• Spread by – Sharing disks or flash

drives– Opening an e-mail

attachment– Downloading infected

audio or video files

Page 7: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Worms

• Infect computer networks

• Copy themselves over the network

• Slow down network traffic

• Do not need human action to spread

Page 8: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Trojan Horse

• Looks like something else

• Screen saver• Game• Malicious code hidden

inside• Cannot spread by itself• Commonly opens up a

back door to your computer

Page 9: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Spyware

• Piggybacks on another program

• May or may not be malicious– Records web sites

visited– Key logger

• Adware– Downloads or displays

ads

Page 10: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Spam

• SPAM: Unwanted or junk e-mail – To avoid SPAM

• Create free Web-based e-mail account for filling out online forms or making online purchases

• Use a spam filter• Do not try to “unsubscribe” from

spam e-mails• Use an e-mail forwarding service

• SPIM: Unsolicited instant messages

Page 11: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Hackers

• Anyone who unlawfully accesses a computer system

• Types of hackers – White hat– Black hat– Gray hat– Script kiddies

• May work for computer criminals

Page 12: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

What Hackers Steal

• Hackers try to steal data stored on hard drives:– Credit card numbers– Bank account numbers

• Also can steal information through packet sniffing

• Use information to commit identity theft

Page 13: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Cyber Crime

Criminal acts conducted by cybercriminals through the use of

computers

Page 14: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Types of Cyber Crimes• Fraud-related (58 percent of

cybercrime)– Auction fraud– Identity theft– Credit and debit card fraud

• Non-fraud-related – Computer intrusions– Unsolicited e-mail– Child pornography / child

exploitation• Extortion

Page 15: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Social Engineering

• Uses social skills to generate human interaction to entice individuals to reveal sensitive information– Usually does not use a

computer or face-to-face interaction

– Pretexting

• Kevin Mitnick

Page 16: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Phishing & Pharming• Phishing– Uses e-mail to lure user

to fake Web sites– Tricks user into

revealing private data• Pharming– Malicious code changes

Web browser’s ability to find Web addresses

– Bogus web sites spoofing real sites

Page 17: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Botnets

• Zombie computers– Backdoor access

• Tended by bot herders• May contain millions of

computers• Used by criminal gangs

for:– Spam– DOS & DDOS

Page 18: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Computer Protection

• Anti-virus program• Firewalls• Passwords• Back ups

Page 19: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Anti-virus Programs• Programs designed to

detect viruses– Scan files looking for virus

signatures (unique code)– Provide options for deleting

or fixing infected files– Inoculate files against

further infection• Needs to be updated

frequently– Good guys always one step

behind• Rogue security software

Page 20: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Good Passwords

• Create a strong password– At least 14 characters, including numbers,

symbols, and upper- and lowercase letters– Not a single word or a word from a dictionary– Not easily associated with you (birthday, name of

pet, nickname)– Use different passwords for different sites– Do not tell anyone or write down password– Change password regularly (every month)

Page 21: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

FirewallsSoftware programs or hardware designed to close computers to invaders

A software firewall is built into Windows Other software firewalls are available from vendorsNetwork routers can contain a hardware firewall

Firewalls are critical if you have an always-on broadband connectionTest your computer’s vulnerability

Page 22: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Data Back-up

• Backup– A copy of a file that can be used to replace the

original• Types of files to back up– Program– Data

• Backup routine– Frequency– Changed files

Page 23: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Data Back-up

• Software programs for easy backup– Schedule automatic backups– Can back up files, folders, or entire drives– Back up to USB device, CD, or DVD

• Entire system backup software– Takes an image of the entire system – Stores on a separate hard drive– In case of failure, a new drive is inserted

Page 24: Internet Safety CSA 105 1.0 September 21, 2010. Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals

Data Back-up

• Store backups offsite• Online backups– Store backup files on

Internet servers– Fees for the service

• Hardware can be replaced, data cannot