Upload
julianna-newton
View
222
Download
0
Tags:
Embed Size (px)
Citation preview
Introduction to ITE Chapter 9
Introduction to ITE Chapter 9
Computer SecurityComputer Security
Why Study Security?Why Study Security?
This is a huge area for computer technicians.
Security isn’t just anti-virus.
Everyone who uses a computer is affected.
This is a huge area for computer technicians.
Security isn’t just anti-virus.
Everyone who uses a computer is affected.
Computer SecurityComputer Security
Threats can be internal or external.
They involve unauthorized access as well as malicious attacks on hardware or systems.
Threats can be internal or external.
They involve unauthorized access as well as malicious attacks on hardware or systems.
Some Types of ThreatsSome Types of Threats
Viruses Are intentionally written to
disrupt computers. Come into the computer
via email, IM’s, transferred files and even web pages.
Once on a computer viruses reproduce and attack other files.
Viruses Are intentionally written to
disrupt computers. Come into the computer
via email, IM’s, transferred files and even web pages.
Once on a computer viruses reproduce and attack other files.
Some Types of ThreatsSome Types of Threats
Worms Worms are similar to
viruses, except they need not attach themselves to files in order to spread.
Worms do not destroy files, but instead consume bandwidth. They slow network operations.
Worms Worms are similar to
viruses, except they need not attach themselves to files in order to spread.
Worms do not destroy files, but instead consume bandwidth. They slow network operations.
Some Types of ThreatsSome Types of Threats
Trojans Trojans enter the system
as part of software that appears to serve a legitimate purpose.
Trojans can be set up to damage files or send data to an outside computer.
Trojans Trojans enter the system
as part of software that appears to serve a legitimate purpose.
Trojans can be set up to damage files or send data to an outside computer.
Some Types of ThreatsSome Types of Threats
Adware Displays advertising on
your computer. You don’t even have to be
on-line for the ads to pop-up.
Phishing Phishing tries to persuade
people to provide personal information like social security or bank account numbers.
Adware Displays advertising on
your computer. You don’t even have to be
on-line for the ads to pop-up.
Phishing Phishing tries to persuade
people to provide personal information like social security or bank account numbers.
Some Types of ThreatsSome Types of Threats
Spyware Spyware reports your on-
line activity to an outside entity.
It may also report personal information it finds on your computer.
Spyware Spyware reports your on-
line activity to an outside entity.
It may also report personal information it finds on your computer.
Some Types of Threats Some Types of Threats
DoS Denial of Service attacks.
Data is sent to a network computer in such large numbers that the machine is effectively shut down.
DDoSDistributed Denial of Service
attacks. Use additional computers
called “Zombies” to assist in the attack.
DoS Denial of Service attacks.
Data is sent to a network computer in such large numbers that the machine is effectively shut down.
DDoSDistributed Denial of Service
attacks. Use additional computers
called “Zombies” to assist in the attack.
More DoS typesMore DoS types
Ping of death Email bomb
So many emails sent at once that the server becomes overwhelmed.
Ping of death Email bomb
So many emails sent at once that the server becomes overwhelmed.
Other ProblemsOther Problems
Spam Junk emails
Spam filters can remove many of these.
Social Engineering Depend upon the stupidity of
the user.
SYN attacks Opens up random ports and
ties up hardware
Spam Junk emails
Spam filters can remove many of these.
Social Engineering Depend upon the stupidity of
the user.
SYN attacks Opens up random ports and
ties up hardware
Other ProblemsOther Problems
Man-in-the-Middle Intercepts communications
Replay Captures keystrokes and sends
the data to outside sources.
DNS Poisoning DNS Servers are altered to
redirect traffic to counterfeit sites.
Man-in-the-Middle Intercepts communications
Replay Captures keystrokes and sends
the data to outside sources.
DNS Poisoning DNS Servers are altered to
redirect traffic to counterfeit sites.
Destroying Sensitive Data Destroying Sensitive Data
Erasing data normally only erases the first letter of the first work of the file name.
There is software that can completely erase a drive or the drive can be physically destroyed.
Erasing data normally only erases the first letter of the first work of the file name.
There is software that can completely erase a drive or the drive can be physically destroyed.
Security LevelsSecurity Levels
Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked
anytime they are on an unsecured network
Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked
anytime they are on an unsecured network
Physical SecurityPhysical Security
Laptops and hard drives can be stolen for their data.
Sensors similar to those used in stores can be used to track equipment.
Laptops and hard drives can be stolen for their data.
Sensors similar to those used in stores can be used to track equipment.
Secured NetworksSecured Networks
Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.
Passwords need to be secure. “Nothing in the dictionary” is a common rule.
Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.
Passwords need to be secure. “Nothing in the dictionary” is a common rule.
Wireless NetworksWireless Networks
Wireless Networks have their own issues. Wireless networks can be
secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.
Wireless Networks have their own issues. Wireless networks can be
secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.
OS UpdatesOS Updates
New vulnerabilities are constantly being discovered.
OS Updates often patch these security holes.
Anti-spy and anti-virus programs need to be updated often.
New vulnerabilities are constantly being discovered.
OS Updates often patch these security holes.
Anti-spy and anti-virus programs need to be updated often.
The troubleshooting process
The troubleshooting process
Section 9.5 outlines the troubleshooting process.
Most of these are simple common-sense approaches.
Please read through them on your own, it’s only a few screens.
Section 9.5 outlines the troubleshooting process.
Most of these are simple common-sense approaches.
Please read through them on your own, it’s only a few screens.