Computer Security
Download
Report
Transcript Computer Security
Security
WeeSan Lee [email protected]
Roadmap
Security Risks
Preventions
References
Security Risks
Computer Virus
Worm
Trojan Horse
Adware
Spyware
Browser Hijacker
Web Bug
Email Hoaxes & Chain Letters
Phishing
Security Risks - Computer Virus
A small computer program that infects your
computer without permission or knowledge of
the user
Infects others via a host media
Floppy disk
Email
…
http://www.healthinitiative.org/IMAGES/virus_big.jpg
Security Risks - Worm
A self-replicating program, spreads across
the Internet
May contain viruses
1st worm was created by Robert T. Morris, a
graduate student at Cornell U. in 1988
Computer Emergency Response Team
(CERT) was created as a result
http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG
Security Risks - Trojan Horse
A program that
disguises itself to be
something useful or
harmless
Eg. screensaver
In fact, a backdoor
program which allows
unauthorized access
remotely
http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg
Security Risks - Adware
An advertising-supported software
Security Risks - Spyware
Adware + collecting user’s information
without the user’s consent
Security Risks - Browser Hijacker
A program that changes the settings on the
web browser
Change the homepage to other website
Security Risks - Web Bug
Originally, use 1x1 image embedded in web
pages or HTML emails to keep track of users
AKA web beacon, tracking bug, …
To avoid that:
Turn off image loading on email clients
Use text-based email such as pine
http://www.prospexis.net/images/beatle2.gif
Security Risks - Hoaxes and Chain Letters
Hoaxes are fake warnings, instructing you to
delete files, playing on your sympathy, etc
Chain letters implore you to pass the
message to as many people as possible
For examples
“This is not a hoax.”
“Forward this email to 10 people you know for
good luck …”
“VIRUS! DELETE NTFS.SYS”
Security Risks - Phishing
Security Risks - Phishing
Preventions
Use anti-virus/firewall software
For examples
AVG (http://free.grisoft.com/)
Nod32 (http://www.eset.com/)
Norton Antivirus (http://www.symantec.com/)
Schedule auto-update
Preventions (cont)
Backup
Use 2 HDs
Burn CDs/DVDs and give them to your
mom
Use online backup services
http://www.carbonite.com/
Be educated
Don’t “fool” around
References
Internet Effectively
Ch 1
Ch 4
Wikipedia
http://www.wikipedia.com/