58
Lecture 10. Personal Safety Online Instructor: Beibei Yang Department of Computer Science University of Massachusetts Lowell 91.113 Exploring the Internet Some slides courtesy of Michael Krolak and Patrick Krolak

Lecture 10. Personal Safety Online

  • Upload
    zyta

  • View
    20

  • Download
    0

Embed Size (px)

DESCRIPTION

91.113 Exploring the Internet. Lecture 10. Personal Safety Online. Instructor: Beibei Yang Department of Computer Science University of Massachusetts Lowell. Some slides courtesy of Michael Krolak and Patrick Krolak. Meet “Little Fatty”, an Internet celebrity in China. Taking Charge. - PowerPoint PPT Presentation

Citation preview

Page 1: Lecture  10.  Personal Safety Online

Lecture 10. Personal Safety Online

Instructor: Beibei YangDepartment of Computer ScienceUniversity of Massachusetts Lowell

91.113 Exploring the Internet

Some slides courtesy of Michael Krolak and Patrick Krolak

Page 2: Lecture  10.  Personal Safety Online

Meet “Little Fatty”, an Internet celebrity in China2

Page 3: Lecture  10.  Personal Safety Online

3

Page 4: Lecture  10.  Personal Safety Online

•While you may feel secure in the privacy of your own home, each time you connect to the Internet you enter a public place

•Your conduct is visible to many different people•You have both rights and responsibilities•The Internet has its own code of conduct•You need to minimize your personal risk as you

work and play online•Actions that you take have consequences

Taking Charge

4

Page 5: Lecture  10.  Personal Safety Online

•All computer accounts and some public servers are subject to an Acceptable Use Policy (AUP)

•An AUP is a policy that outlines appropriate use of the Internet and is enforced by system administrators

•Violating the AUP can result of the withdrawal of your Internet access privileges

Acceptable Use Policies

5

Page 6: Lecture  10.  Personal Safety Online

Comcast AUP: http://www.comcast.com/policies/

Page 7: Lecture  10.  Personal Safety Online

• The restrictions that pertain to an ISP account are called the terms of service

• When you sign up for an account, you also agree to the terms of service or AUP

• You should locate and periodically check your account’s AUP, as you are expected to know the AUP

• Common university AUPs include the prohibition of the use of university resources for:▫Commercial activity▫Academic dishonesty▫Harassment

• Some universities also prohibit the use of specific Internet services, such as some music sharing sites

Acceptable Use Policies

7

Page 8: Lecture  10.  Personal Safety Online

8

Page 9: Lecture  10.  Personal Safety Online

•Your password is the first line of defense•While you may think that your account has

nothing to offer, someone can use it as a starting point to access other accounts

•System administrators have resources to maintain accounts and the system

•No system administrator will need to ask you for your password

Password Security

9

Page 10: Lecture  10.  Personal Safety Online

•Do not be tricked by an email, no matter how official looking, asking you for your password

•Hackers try tactics like this•Do not share your password with anyone, as

this is a security hole

Password Security

10

Page 11: Lecture  10.  Personal Safety Online

•Choose a good password•Here are some tips to help you choose a good

password:▫Do not use a word from the dictionary▫Do not use a proper name▫Do not use the same password on more than one

site▫A good password has at least one number, has at

least 6 characters, and has uppercase and lowercase letters

Password Security

11

Page 12: Lecture  10.  Personal Safety Online

12

Page 13: Lecture  10.  Personal Safety Online

Hoaxes and Legends• The Internet contains both valuable information and

misinformation• Many hoaxes and urban legends persist• A popular hoax is an email message that says not to

read an email with a subject such as “Good times”, then pass it on

• You cannot get a virus through a plain text message• Chain letters and scams are also common• Don’t forward these messages

13

http://xkcd.com/250/

Page 14: Lecture  10.  Personal Safety Online

Hoaxes and Legends•The Onion: http://www.theonion.com/ •Urban myths: http://www.urbanmyths.com/

•FactCheck.org: Annenberg Political Fact Check

•snopes.com: Urban Legends Reference Pages

•PolitiFact.com: Sorting out the truth in politics

14

Page 15: Lecture  10.  Personal Safety Online

•Phishing is a form of online fraud characterized by unsolicited e-mail messages seeking personal information for fraudulent purposes.

•Phish often appears to originate from reputable sources that maintain accounts for the recipient.

•Spear phishing is a large scale phishing effort directed at all employees of a company intended to capture an account name and password.

Phishing

15

Page 16: Lecture  10.  Personal Safety Online

Phishing Example16

From: UML NEW EMAIL <[email protected]>Date: Wed, Jul 7, 2010 at 2:28 AMSubject: Re UNIVERSITY I.T.S UPDATETo: [email protected]

Welcome to the university of Massachusetts Lowell New webmail system.

Many of you have given us suggestions about how to make the Umass Lowell webmail better and we have listened.This is our continuing effort to provide you with the best email services and prevent the rate of spam messages received in your inbox folder daily .Consequently all in-active old email accounts will be deleted during the upgrade.

To prevent your account from deletion and or being suspended we recommends all email accounts owner users to upgrade to the new email. Fill in your data in the blank space provided;(Email:_______), (User I.D_______), (password_______) (Retypepassword____________).The University I.T.Swww.uml.edu Checked by AVG - Version: 8.5.437 / Virus Database: 271.1.1/2840 - Release

Page 17: Lecture  10.  Personal Safety Online

17

Source: http://www.utsa.edu/oit/security/sec_phising_explained.html

Page 18: Lecture  10.  Personal Safety Online

•Here are some tips to help you identify phishing expeditions:▫References to accounts that you do not have.▫A general salutation (Dear Valued Customer) rather

than one by name.▫Grammar and spelling errors.▫Mismatch in the URL of embedded links with that of

the apparent source (URLs of links display in the status bar at the bottom of the web page when the cursor hovers over them).

▫Contact the apparent source directly using other trusted means first.

Phishing

18

Page 19: Lecture  10.  Personal Safety Online

•How to recognize phishing e-mails or links (Microsoft Online Safety):▫ http://www.microsoft.com/protect/fraud/phishing/symptoms.aspx

Phishing

19

Page 20: Lecture  10.  Personal Safety Online

•Occurs when stolen personal information is used to open accounts used to make fraudulent purchases.

• In many cases, information is stolen from third party business records.

•Not limited to internet activity•Warning signs:

▫Late or missing bills.▫Receipt of credit cards or other lines of credit not

requested.▫Requests for payment from debt collectors.

Identity Theft

20

Page 21: Lecture  10.  Personal Safety Online

• If your identity is stolen:▫Notify any of three major credit bueaus: Equifax,

Experian, or TransUnion▫Close compromised accounts.▫File report with local law enforcement office.▫File a complaint with the FTC.▫Contact relevant government agencies to

cancel/replace stolen licenses or IDs. And flag your account appropriately.

▫Consult your financial institution about bank and other accounts.

Identity Theft

21

Page 22: Lecture  10.  Personal Safety Online

•Some software is a security risk•The mainstream news calls all such software

“viruses”, but there are three different classes of such software

•A virus is a computer program that can replicate itself through files to move from computer to computer▫Some viruses are benign▫Others are very destructive

Viruses, Trojan Horses, and Worms

22

Page 23: Lecture  10.  Personal Safety Online

• A Trojan horse is a program that slips into a computer under the guise of another program▫Someone could e-mail a

game to you that contains a Trojan horse. If you run the game you also run the Trojan horse

▫The Trojan horse could record your keystrokes or allow someone to access your computer

Viruses, Trojan Horses, and Worms

23

Beast, a Windows-based backdoor Trojan horsehttp://en.wikipedia.org/wiki/Trojan_horse_%28computing%29

Page 24: Lecture  10.  Personal Safety Online

•A worm is a program that is similar to a virus, but spreads through a network

•Software can be exploited by worms•Some worms run over several computers•Others communicate among themselves over

the network•A worm may be malicious or may take up

system resources, causing a slowdown in performance

Viruses, Trojan Horses, and Worms

24

Page 25: Lecture  10.  Personal Safety Online

Viruses, Trojan Horses, and Worms

•You can take control and secure your computer•Use antivirus software and keep it updated

▫Antivirus software can scan files moving from the computer onto disks and CDs

▫Your email and downloaded files can also be scanned

▫Since new viruses are created every day, the data files needed to detect these viruses needs to be kept up-to-date

25

Page 26: Lecture  10.  Personal Safety Online

Viruses, Trojan Horses, and Worms•Keep bootable disks out of your drive unless

you are actively working with the files on the disk▫Some viruses can hide on the boot sector on

a disk▫These are triggered when the computer

starts up and accesses the disk• If you need to work without a virus scanner

running in the background, you should manually scan each file before opening or executing it

26

Page 27: Lecture  10.  Personal Safety Online

Viruses, Trojan Horses, and Worms

• Install a firewall on your home computer (especially if you use a broadband connection)

•Do not download files offered to you in chat rooms or personal Web pages

•For maximum safety, encrypt all files that contain sensitive information or store them offline on removable media

•Do not leave your computer connected to the Internet any longer than necessary

27

Page 28: Lecture  10.  Personal Safety Online

• E-mail is the number one source of computer viruses

• Attachments are the most common culprit • Some attachments contain scripts• A script is a small program written in a scripting

language (e.g. Visual Basic)• You can take precautions

▫ Configure your mailer to not open attachments automatically

▫ Save attachments and scan them first

E-Mail Viruses

28

Page 29: Lecture  10.  Personal Safety Online

•Microsoft Word documents are a popular source of viruses

•Someone can spread a virus unknowingly•Precautions include:

▫Keeping your antivirus software up-to-date▫Saving an attachment and make sure that it is

scanned before you open it▫Not opening a document that contains a macro

E-Mail Viruses

29

Page 30: Lecture  10.  Personal Safety Online

• Mailers that render messages into Web-like displays are susceptible to script attacks▫Some messages contain scripts▫ If the script is automatically executed, it can cause harm

• Some threats can contain a blend of different types of attacks▫Nimda▫Love Letter

E-Mail Viruses30

Page 31: Lecture  10.  Personal Safety Online

Internet Scams

•Scams are nothing new, but the Internet makes it easier for them to reach you

•Examples include:▫Get rich quick offers▫Miracle health cures▫Guaranteed loans or credit▫Your credit report repaired for a fee

• If it sounds to good to be true, then it probably is

31

Page 32: Lecture  10.  Personal Safety Online

•Hacker intrusions are less likely than viruses, but are more devastating

•Many companies monitor their computers, so home computers are easier targets

• It doesn’t take much effort to break into a computer that is not protected▫Tools exist to make breaking into a computer as easy

as point-and-click▫The existence of such tools doesn’t mean that it is

okay

Hacker Attacks and Intrusions

32

Page 33: Lecture  10.  Personal Safety Online

•The results can range from:▫A hacker changing your wallpaper to▫Adding, changing, or deleting files

•You can take precautions to protect your computer▫The precautions are similar to those discussed

earlier in regard to viruses▫Install a firewall, a software program that acts as a

boundary between your computer and the outside world

Hacker Attacks and Intrusions

33

Page 34: Lecture  10.  Personal Safety Online

•A firewall is software that ▫monitors all attempts to move bytes over the

Internet in either direction and▫ notifies you when such movement is attempted.

•Firewalls previously were only used by large organizations but now home users can install them on their computers.

•They can prevent a Trojan horse from stealing your files or spyware from “phoning home.”

Firewalls

34

Page 35: Lecture  10.  Personal Safety Online

•Both the Macintosh and PC have firewalls•Examples include:

▫Zone Alarm▫Symantec Internet Security

•The software can be configured or used with default settings.

•Read software reviews to help you choose what firewall to buy.

Firewalls

35

Page 36: Lecture  10.  Personal Safety Online

Spam

• Spam is electronic junk mail that clogs our internet like the fatty canned meat of the same name clogs our arteries.

▫ Communication lines back up at an alarming rate, ▫ Storage is gobbled up, ▫ Servers and processors thrash, and ▫ Users are irritated at best – incapacitated at worst.

• Spam costs the ISPs and others a fortune to prevent and/or to remove.

• At its worst spam is used by scammers, hackers, and others to market and prey on literally millions of users at a very low cost.

Source: http://www.unt.edu/benchmarks/archives/2005/february05/spamandcookiescolor.gif

Page 37: Lecture  10.  Personal Safety Online

Spam• What is Spam?

Junk email – unwanted, resource robbing, and often contains viruses, worms, and scams.

• Why is it an increasing problem?Spam is the fastest growing component of messages on the Internet that

consumes bandwidth, storage, and angers the user. ISPs and some consumer groups are attempting to shut down the worst offenders.

Spam as harassment.Spam as DoS (Denial of Service) attack.Spam as Phishing (attempt to obtain a person’s ID, password, etc, by

pretending to be a legitimate request.)• What can be done about it? (Discussion questions)

▫ Closing down ISPs that permit email relaying (Is this too draconian?).▫ Apply filters and tools to remove it (Can they be by-passed?). ▫ Lobby for federal legislation to create civil and criminal penalties for those

who send Spam. (Does this interfere with free speech?)▫ A recently passed law to prosecute commercial spammers. (When is Internet

advertising legitimate and when is it Spam?)

37

Page 38: Lecture  10.  Personal Safety Online

Protecting Your Privacy

•To protect your privacy:▫Do not provide personal information unless it is

needed for a credit card transaction▫Do not provide your Social Security Number or

other sensitive information•When you do provide personal information, read

the site’s Privacy Policy•Some companies sell your information, but you

can opt-out of this

38

Page 39: Lecture  10.  Personal Safety Online

Laptops and Wireless Networks

•When joining a wireless network, keep these safety tips in mind:▫Use encryption for communication, via a WPA or

WEP encryption scheme (WPA is better) - an access key is required for these networks

▫Keep your antivirus and antispyware software up-to-date

▫Make sure your firewall is on

39

Page 40: Lecture  10.  Personal Safety Online

Laptops and Wireless Networks

•Safety tips continued:▫Use a virtual private network (VPN) when

connecting to your institution’s network (ask the IT staff for help)

▫Disable File and Printer Sharing▫Keep your folders/directories private▫Password protect your sensitive files

40

Page 41: Lecture  10.  Personal Safety Online

41

Friends and enemies: Alice, Bob, Trudy• well-known in network security world• Bob, Alice (lovers!) want to communicate “securely”• Trudy (intruder) may intercept, delete, add messages

securesender

securereceiver

channel data, control messages

data data

Alice Bob

Trudy

Page 42: Lecture  10.  Personal Safety Online

Who might Bob, Alice be?•… well, real-life Bobs and Alices!•Web browser/server for electronic

transactions (e.g., on-line purchases)•on-line banking client/server•DNS servers• routers exchanging routing table updates•other examples?

42

Page 43: Lecture  10.  Personal Safety Online

There are bad guys (and girls) out there!Q: What can a “bad guy” do?A: A lot!

▫eavesdrop: intercept messages▫actively insert messages into connection▫ impersonation: can fake (spoof) source

address in packet (or any field in packet)▫hijacking: “take over” ongoing connection by

removing sender or receiver, inserting himself in place

▫denial of service: prevent service from being used by others (e.g., by overloading resources)

43

Page 44: Lecture  10.  Personal Safety Online

What are Denial of Service (DOS) Attacks?DoS attack Short for denial-of-service attack, a type of attack

on a network that is designed to bring the network to its knees by flooding it with useless traffic. Many DoS attacks, such as the Ping of Death and Teardrop attacks, exploit limitations in the TCP/IP protocols. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. But, like viruses, new DoS attacks are constantly being dreamed up by hackers.

Source: http://www.webopedia.com/TERM/D/DoS_attack.html

Page 45: Lecture  10.  Personal Safety Online

45

Denial of service attacks• attackers make resources (server, bandwidth)

unavailable to legitimate traffic by overwhelming resource with bogus traffic

1. select target

2. break into hosts around the network (see malware)

3. send packets toward target from compromised hosts

target

Page 46: Lecture  10.  Personal Safety Online

1-46

Sniff, modify, delete your packetsPacket sniffing:

▫broadcast media (shared Ethernet, wireless)▫promiscuous network interface reads/records all

packets (e.g., including passwords!) passing by

A

B

C

src:B dest:A payload

Ethereal software used for end-of-chapter labs is a (free) packet-sniffer

more on modification, deletion later

Page 47: Lecture  10.  Personal Safety Online

Masquerade as you1-47

• IP spoofing: send packet with false source address

A

B

C

src:B dest:A payload

Page 48: Lecture  10.  Personal Safety Online

1-48

Masquerade as you• IP spoofing: send packet with false source address• record-and-playback: sniff sensitive info (e.g.,

password), and use later▫password holder is that user from system point of

view

A

B

C

src:B dest:A user: B; password: foo

Page 49: Lecture  10.  Personal Safety Online

1-49

Masquerade as you• IP spoofing: send packet with false source address• record-and-playback: sniff sensitive info (e.g.,

password), and use later▫password holder is that user from system point of

view

A

B

later ….. C

src:B dest:A user: B; password: foo

Page 50: Lecture  10.  Personal Safety Online

DNS Spoofing• Substitutes a fake IP address for the real one in the DNS

table

50

Page 51: Lecture  10.  Personal Safety Online

A Few High Profile CasesWe examine cases that illustrate particularly egregious examples of cyber bullying and cyber crime.

Page 52: Lecture  10.  Personal Safety Online

Megan Meier • St. Louis, Missouri, teenager Megan Meier

committed suicide after a girl down the street disguised herself as a teenage boy on MySpace and taunted the 13-year-old about her weight and sexuality. Megan was three days away from her 14th birthday in October of 2006

• The Missouri officials and Federal officials could not find a crime Finally a charge of computer fraud was filed in California for misrepresentation of the child’s age to use Myspace against the mother.

• The following video discusses the legal issues. Note the jury found Laurie Drew not guilty on but one charge which was also dropped by the judge.

Page 53: Lecture  10.  Personal Safety Online

Phoebe Prince

Phoebe Prince was an Irish immigrant to Massachusetts when she took her own life in January of 2010. Phoebe was a victim of cyberbullying at South Hadley High School in western Massachusetts.

Her parents, who brought Phoebe to America from their small Irish village, said that she had trouble adjusting to life in America. Even though she had just accepted a date to the school dance, Phoebe committed suicide after receiving several taunting comments on her Facebook page.

Charges were brought against the mean girls and the older boys who slept with her.

Page 54: Lecture  10.  Personal Safety Online

Taylor Behl • On August 17, 2005, Taylor Behl left home for college at Virginia Commonwealth University.

• On September 5, 2005, a 38 year-old amateur photographer, Benjamin Fawley, killed Taylor Behl and dumped her unburied body in a shallow ravine near his ex-girlfriend’s farm.

• Behl met Fawley as a prospective student. She kept in contact with him through LiveJournal and Myspace.

Page 55: Lecture  10.  Personal Safety Online

Why you should avoid sharing certain things on the Internet •Burglars Said to Have Picked Houses Based on

Facebook Updates (Sept. 2010): http://bits.blogs.nytimes.com/2010/09/12/burglars-picked-houses-based-on-facebook-updates/

•Diamond Ring Ad on Craigslist Leads to Murder (happened Spring 2010): http://www.aolnews.com/crime/article/diamond-ring-ad-on-craigslist-leads-to-murder/19469483

Page 56: Lecture  10.  Personal Safety Online

Twitter Got Me Fired!!!

Sometimes the voice of youth is compelling caution to other youths.Source: http://www.youtube.com/watch?v=_TJ-V8wI7Sk

Page 57: Lecture  10.  Personal Safety Online

Video: Think Before You Post•http://youtu.be/4w4_Hrwh2XI

57

Page 58: Lecture  10.  Personal Safety Online

Further Reading• The Dark Side of the Internet (Recommended):

▫ http://goo.gl/B9pRD• http://en.wikipedia.org/wiki/Internet_privacy • CDT’s Guide to Online Privacy:

▫ http://www.cdt.org/privacy/guide/start/• Why You Need a Firewall:

▫ http://tinyurl.com/4zxxn• Internet / Web Hoaxes:

▫ http://tinyurl.com/2p3cr2• An Internet Victim

▫ http://www.youtube.com/watch?v=twXwgXgDrs0

58