lect4_2015

54
4. lecture 4. lecture Technical informatics Technical informatics

Upload: priscila-quintela

Post on 07-Dec-2015

215 views

Category:

Documents


1 download

DESCRIPTION

informatic

TRANSCRIPT

Page 1: lect4_2015

4. lecture4. lecture

Technical informaticsTechnical informatics

Page 2: lect4_2015

Last lecture

• Operating systems– History – development, task, versions– Mobile OS

• Info-communication– Solutions– Applications

Page 3: lect4_2015

Outline

• System sw, applications, utilities• Virus/malware protection• Firewalls• Encryption and e-signs• Archivers• Office applications• LibreOffice• PDF

Page 4: lect4_2015

Software types

• System sw: operating software• Application software

– For a particular area, task

• Utility programs– Secure operation– Additional help for the user

Page 5: lect4_2015

Computer security• Before 1980

– No network– Computers operated by experts

• After 1990– Computers on networks– Not only expert users

• After 2005– Every device is connected– Wide range of users/applications

Page 6: lect4_2015

Damage• Why do they attack?

– Data– Passwords, codes (phishing)– Resource

• EU: over 22 billion €/year• Hacker – Cracker, Government

Page 7: lect4_2015

Viruses

Computer viruses are programs deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet, often slowing things down and causing other problems in the process.

Page 8: lect4_2015

Worms

A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer’s memory.

Page 9: lect4_2015

Trojans

A Trojan Horse, similar to its Greek mythological counterpart, often presents itself as one form while it is actually another.

Page 10: lect4_2015

Spywares

Spyware refers to software that performs certain tasks on the computer, typically without the user’s consent. This may include giving advertising or collecting personal information (e.g. passwords) about the user.

Page 11: lect4_2015

Malware

Page 12: lect4_2015

Other unwanted applications

• Adware (<>spyware)• Financing software• Uncareful installing

– Java and the ask toolbar– Zonealarm and the Firefox browser

Page 13: lect4_2015

Botnet - zombies

• DoS – Denial of Service, DDoS – Distributed DoS

• Infection and sending SPAMs within seconds• Difficult identification (detecting origin IP)• Unequal computer security (by government)• Mobile phone botnet

Page 14: lect4_2015

SPAM

• Unsolicited, unwanted, irrelevant or inappropriate messages, especially for commercial advertising in mass quantities („junk mail”)

• 50-90% of emails• 2005: 50+ billion USD• Protection/filtering

– By the service provider– At home

Page 15: lect4_2015

Phishing

• Acquiring sensitive information (passwords, credit card numbers etc.)

• Fake web sites (e.g. PayPal)• VoIP phishing• How to protect?

– Reporting phising– Browser settings– Cautious behaviour

Page 16: lect4_2015

How can our computer be infected?

• WEB• E-mail• Copying data

–CD-ROM, Pen-drive…

Page 17: lect4_2015

How to protect?

• Virusbuster, antispyware• Software updates (SP, patches)• Software settings (e.g. mails, browsers)• Firewall• Passwords

– Alternative methods

• Back-up!

Page 18: lect4_2015

Antivirus software• Utility program, runs in the background

– Shield

• Parameters– Virus-library, clearing rate, reaction speed,

platform dependency, heuristic search, price, trial version…

• NOD32 (ESET), VirusBuster, Norton Antivirus (Symantec), Virusscan (McAfee)

Page 19: lect4_2015

Antivirus functions I. (example)

• Integrated control panel• Virus and spyware protection• Firewall• SPAM filter• Botnet protection• Memory protecion• Exploit blocking• Social media scanner

Page 20: lect4_2015

Antivirus functions II. (example)

• Steel protection• Phising protection• Idle scanning• Energy saving mode• Cloud-based protection• Protecting external drives• Parental surveillance

Page 21: lect4_2015

Antispyware

• Recognizing and destroying spyware• Ad-Aware (Lavasoft), Spykiller

(TrustSoft), McAffee Antispyware • MS AntiSpyware

–Windows Defender (Vista)

Page 22: lect4_2015

Firewalls

• A firewall is a program or hardware device that filters the information coming through the Internet connection into private network or computer system .

• Software/hardware firewalls

Page 23: lect4_2015

Firewall

Page 24: lect4_2015
Page 25: lect4_2015

Firewall settings

Page 26: lect4_2015

Firewall messages

Page 27: lect4_2015

Windows (7) protection

Page 28: lect4_2015

Mobile security

• Viruses– Cabir – bluetooth– Smart phones

• Phising• Licenses, regulations; iPhone – jailbreak• No efficient antivirus software

Page 29: lect4_2015

Mobile platform security

• Open/closed application, platform and hardware

• Level of platform fragmentation• What is modified by Android supplier?

Page 30: lect4_2015

Blackberry

• 40% of financing service poviders use Blacberry

• Server at RIM• Data encryption on the device• Direct connection between group members• Fast messaging• Exception: governmental control (e.g.

counterterrorist activities)

Page 31: lect4_2015

Encryption

•Encryption is a mathematical process that modifies information in a way that makes it unreadable until the exact same process is reversed.

•Algorithm (cipher) + key•Encrypted data storage

– EFS (NTFS)– TrueCrypt, BitLocker

Page 32: lect4_2015

Encryption methods• Symmetric key

– Advantage: simple, fast– Shortcoming: shared secret key

• Asymmetric key– Public key, private key– Safe but slow

• Combination of symmetric and asymetric methods (pl. SSL, SSH)

Page 33: lect4_2015

SSL• Secure Socket Layer

• Safe transfer protocol • Communication between webservers and

clients• Supported by the new web-based mail

systems, in order to keep e-business safe; https://...

• Communication channel encryption, not verification

Page 34: lect4_2015

E-sign

Verification not encryption: Signing the documents/data with a digital signature assures that it comes from the sender and hasn't been altered or corrupted since it was created and signed.

Page 35: lect4_2015

Browser/mail client security settings

Page 36: lect4_2015
Page 37: lect4_2015

Compression and archiver utilities

• Reducing the number of bits for storing data

• Lossy data compression– Images, video

• Lossless data compression– Pl. text

• DOS: arj, rar…• Windows: winzip, winrar…

Page 38: lect4_2015
Page 39: lect4_2015

OFFICE

• Office applications for Windows (even for Windows Phone and 8) and Mac OS

• MS versions: standard, home, student, professional etc.

Page 40: lect4_2015

Office desktop applications

• Word, Excel, PowerPoint, Outlook, Access• Microsoft Access — database manager• Microsoft InfoPath — an application to design rich XML-based forms• Microsoft OneNote — note-taking software for use with both tablet and conventional PCs• Microsoft Project — project management software to keep track of events and to create

network charts and Gantt charts (not bundled in any Office suite)• Microsoft Publisher — desktop publishing software mostly used for designing brochures,

labels, calendars, greeting cards, business cards, newsletters, and postcards.• Microsoft SharePoint Workspace (formerly known as Groove) — a proprietary peer-to-peer

collaboration software leveled at businesses• Microsoft Visio — diagram and flowcharting software (not bundled in any Office suite)• Microsoft Office InterConnect — business-relationship database available only in Japan• Microsoft Office Picture Manager — basic photo management software (similar to Google's

Picasa or Adobe's Photoshop Elements), replaced Microsoft Photo Editor

Page 41: lect4_2015

Office environment

Page 42: lect4_2015

Office 2010

• Environment• 32/64 bit versions (add-ons!)• Web Apps

– Multiuser mode: multiple users working on the same documents

– www.live.com

• Multimedia support in powerpoint, links from web

Page 43: lect4_2015

Office365

• Monthly subscription, continuous network connection• All MS Office applications, always updated• 5 computers (Windows and Mac) + 5 (Windows OS)

tablet/smart phone• Storage on OneDrive, synchronized devices• Win 7 and Mac OS X 10.6 and newer versions• Premium version

– 1TB storage space/user– 60 international Skype minutes

Page 44: lect4_2015

Google docs, spreadsheet…

• Drive (2012 April), 15GB (100GB/$5), HTML, PDF, TXT etc.

Page 45: lect4_2015

LibreOfficewww.libreoffice.org: LibreOffice is the power-packed free, libre and open source personal productivity suite for Windows, Macintosh and GNU/Linux, that gives you six feature-rich applications for all your document production and data processing needs: Writer, Calc, Impress, Draw, Math and Base. Support and documentation is free from our large, dedicated community of users, contributors and developers.

Page 46: lect4_2015

LibreOffice applications

• Writer• Calc• Impress• Draw• Math• Base

Page 47: lect4_2015

Advantages - shortcomings

• Free, multiplatform, multilingual • Reliable

– OpenOffice– LibreOffice v4.4.1

• Standardized software package–Environment, databases

• Market penetration

Page 48: lect4_2015

LibreOffice environment

Page 49: lect4_2015

PDF (Portable Document Format)• AdobeAdobe

Recent version: Adobe Acrobat Recent version: Adobe Acrobat XIXI Acrobat for Acrobat for mobile platformsmobile platforms Different solutions (standard/pro)Different solutions (standard/pro)

Adobe Creative CloudAdobe Creative Cloud Main featuresMain features

Convert PDFs to other formatsConvert PDFs to other formats Edit PDF documentsEdit PDF documents Create and analyze formsCreate and analyze forms Create PDF filesCreate PDF files Merge and combine filesMerge and combine files Simplify reviews and approvalsSimplify reviews and approvals Protect PDF filesProtect PDF files Prepare files consistentlyPrepare files consistently Work with new cloud servicesWork with new cloud services

Page 50: lect4_2015

PDF, fonts, application fields

• StandardStandard• MMultiplatformultiplatform• Vector + raster, saves format, search in pdf Vector + raster, saves format, search in pdf

documentsdocuments• Compression, authorizationCompression, authorization• Even fonts can be stored in PDFEven fonts can be stored in PDF• Application fieldsApplication fields

• Printing, publishingPrinting, publishing• InternetInternet

Page 51: lect4_2015
Page 52: lect4_2015

Control questions

• What is a computer virus/worm/trojan?• How can we protect computers against viruses?• How can we use firewalls?• What kind of archivers do you know?• What encryption methods do you know?• What does an Office suite contain?• What’s the difference between MS Office and

LibreOffice?• What are the main advantages of using PDF?

Page 53: lect4_2015

References• http://www.microsoft.com/hun/athome/security/viruses/virus101.mspx• http://www.microsoft.com/hun/biztonsag/7fogas1.mspx• http://www.microsoft.com/hun/security/protect/spyware.mspx• http://www.microsoft.com/hun/security/protect/firewall.mspx• http://ecdlweb.uw.hu/m7-15.html• http://facesreklam.hu/help/grafikai_formatumok.htm• http://www.hvgpress.hu/index.php?option=com_generic_editor&Itemid=185• http://www.iesz.hu/index.php?word_id=97• http://www.cert.hu/ismert/11felhasznalo/hcs_hun.html?a=mod#intro• http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp• http://www.libreoffice.org/• http://www.x2net.com/webcompiler/authenticode.htm• http://www.adobe.com

Page 54: lect4_2015

Thanks for your attention!