52
Personal Security Security Tips for Home Internet Users

Personal Security Security Tips for Home Internet Users

Embed Size (px)

Citation preview

Page 1: Personal Security Security Tips for Home Internet Users

Personal Security

Security Tips for Home Internet Users

Page 2: Personal Security Security Tips for Home Internet Users

Securing your home computer

• Accessing the Internet from home– Convenient– Abundance of information– Exposes your computer– Can be costly or damaging

Page 3: Personal Security Security Tips for Home Internet Users

Overview• Internet access

• Why Should I be concerned with Security

• What are the most common vulnerabilities

• What security tools are available

• Where can I find more information

Page 4: Personal Security Security Tips for Home Internet Users

Internet• Complex system of attached networks

• Designed to distribute data geographically at high speeds in a short period of time

• Data is distributed in a variety of formats– Examples: PDF, JPEG, MOV, MP3, Text

• Information is stored or viewed locally on your computer

Page 5: Personal Security Security Tips for Home Internet Users

Broadband• High speed access to the home user

• Types– DSL– Cable Modem

Page 6: Personal Security Security Tips for Home Internet Users

DSL• Digital Subscriber Line• Typically ADSL

– Asymmetric Digital Subscriber Line

• Offers dedicated bandwidth• Speed

– 384 kbps downstream– 128 kbps upstream– Up to 1.5 Mbps down 800 kbps up– Varies depending on service level and distance from CO

(Central Office)– Maximum distance varies 14000 – 17500 ft

Page 7: Personal Security Security Tips for Home Internet Users

DSL Configuration

• DSL Modem

• DSL Splitter and Filters

• DSLAM– Digital Subscriber Line

Access Multiplexer

• ISP– Internet Service Provider

Page 8: Personal Security Security Tips for Home Internet Users

Cable Modem

• Shared bandwidth• Speed per channel

– 27 Mbps shared download– 10 Mbps Upload

• Connects to CMTS (Cable Modem Transmission System) at cable company– Provides packet filtering,

and traffic shaping

Page 9: Personal Security Security Tips for Home Internet Users

What about security?• Why should I be concerned?

• What are the vulnerabilities?

• What can I do to protect myself?

• How do I recover from an attack?

Page 10: Personal Security Security Tips for Home Internet Users

Why should I be Concerned

• You lose crucial data

• You spend time and money on recovery

• You feel violated, helpless and foolish

• You risk propagating the attack to your peers and others

• Your peers and others know how foolish you are

Page 11: Personal Security Security Tips for Home Internet Users

Vulnerabilities• Viruses

• Hacks

• Data Capturing

• Lack of contingency planning

Page 12: Personal Security Security Tips for Home Internet Users

Virus• 60,000 Variations in circulation

• Types of Viruses

• Antivirus Software

• Best Practices

Page 13: Personal Security Security Tips for Home Internet Users

Types of Viruses• Viruses are Segments of code or complete

programs that can damage your system or degrade system performance.– Trojan Horse– Worm– Hoax

Page 14: Personal Security Security Tips for Home Internet Users

Trojan Horses• A program disguised as having a desired purpose

while subversively performing an unwanted action on your system.

• Often open backdoor access to your system• Notorious Trojan Horses

– Simpson's– Backdoor– Sub7– BackOrafice– NetBus

Page 15: Personal Security Security Tips for Home Internet Users

Worm• Self Propagating independent program that

adversely affects your computer performance or damages your computer

• Hall of fame– Melissa– Nimda– LoveLetter– Anna Kournikova– CodeRed– SirCam

Page 16: Personal Security Security Tips for Home Internet Users

Hoax• An unsubstantiated virus alert intended to cause

panic• Typically warning of the most damaging or

dangerous virus• Examples

– BudweiserFrogs– A virtual card for you– !0000 – Stop mass mailings– Wobbler– Win a holiday

Page 17: Personal Security Security Tips for Home Internet Users

Best Practice: Virus prevention

• Always verify your antivirus software is running and Update your antivirus software

Page 18: Personal Security Security Tips for Home Internet Users

Best Practice: Virus prevention 2

• When receiving email do not open attachments unless you are expecting them

• Take virus alerts seriously

• Sources of alerts– Institutional Notification– News Media alerts– Word of mouth

Page 19: Personal Security Security Tips for Home Internet Users

Virus recovery• Use antivirus software and tools to clean

system– http://www.mcafee.com– http://www.symantec.com

• Find manual steps for virus removal

• Reinstall your system from scratch

Page 20: Personal Security Security Tips for Home Internet Users

Hacks• Hacking

– What is hacking– How does hacking happen

• Types of attacks

• Prevention methods

Page 21: Personal Security Security Tips for Home Internet Users

Hacking• Gaining unauthorized access to computer

systems for malicious purposes

Page 22: Personal Security Security Tips for Home Internet Users

How Hacking Happens• System information is collected

– Footprinting– Scanning– Probing– Enumeration

• Software vulnerabilities are exploited• System passwords are guessed or not

employed

Page 23: Personal Security Security Tips for Home Internet Users

Types of Attacks• Interference

• Interception

• Impersonation

Page 24: Personal Security Security Tips for Home Internet Users

Interference• Attacks that render objects or services

unusable– Denial of service– Distributed Denial of service– System alteration

Page 25: Personal Security Security Tips for Home Internet Users

Interception• Captures Data through monitoring or

redirection– Monitoring

• Wire taps

• Network Monitoring

– Redirection• Alteration of DNS servers

• Man in the middle

Page 26: Personal Security Security Tips for Home Internet Users

Impersonation• When the attacker assumes the identity of a

trusted source– Spoof attacks

• Using the IP source address of a trusted source computer

– Password attacks• Password enumeration

Page 27: Personal Security Security Tips for Home Internet Users

Prevention Methods• Know your system

• Tools to help protect your system

• Watch for and apply security patches

• Contingency planning

Page 28: Personal Security Security Tips for Home Internet Users

Know your system• Inventory your system

• Baseline system and network performance

• Identify vulnerabilities

Page 29: Personal Security Security Tips for Home Internet Users

Inventory your system• Software Inventory

– Running Software– File and printer sharing– Startup Software– Installed Software– Software Keys– Software Licensing

• Hardware– Installed components– Vendor specific device drivers

Page 30: Personal Security Security Tips for Home Internet Users

Inventory Tools

• Microsoft– System Information 98– Manage Computer System summary– Windows NT Diagnostics

Page 31: Personal Security Security Tips for Home Internet Users

Inventory Tools 2

• Belarc Advisor

Page 32: Personal Security Security Tips for Home Internet Users

System Baseline• Task manager

– Memory Utilization

– Process Utilization

• Performance monitor– Log low use system state

– Log high use system state

Page 33: Personal Security Security Tips for Home Internet Users

Network Baseline• Check Internet

Bandwidth speed– McAfee

Speedometer• http://promos.mcafee

.com/speedometer/test_0150.asp

– Ftp Large Files• Hash

• Download Statistics

Page 34: Personal Security Security Tips for Home Internet Users

Network Baseline 2

• Use traceroute– Check TTL stats

• Use performance monitor to check utilization– Network

Utilization

Page 35: Personal Security Security Tips for Home Internet Users

Identify Vulnerablilities

• Filesharing– Opens access to your files remotely– Should be turned off if not used– Protected with security device and used with complex

passwords

• Web Browsing– Personal information is accessible via cookie files– ActiveX components can launch Visual Basic

Application components included in Microsoft Office– Disable ActiveX components unless necessary

Page 36: Personal Security Security Tips for Home Internet Users

Security Boundries

• Personal Computer

• Local Network Security

• Internet Security

Page 37: Personal Security Security Tips for Home Internet Users

Internet Protocol (IP)• Address your computer on the network and where

your computer can be reached• 32 Bit numeric device address.• Dotted Decimal Notation

– Ex: 192.168.99.32

• Consists of network and host address.• Determined by subnet mask

– 255.255.255.0– Network 192.168.99.0– Host 0.0.0.32

Page 38: Personal Security Security Tips for Home Internet Users

Network Security• Dynamic Addressing

– IP address changes over scheduled time

• Private Addressing– Reserved address range by IANA– 10.0.0.0– 192.168.0.0 – 172.16.0.0

• Encryption

Page 39: Personal Security Security Tips for Home Internet Users

Encryption• Method of repackaging data into cyphertext in order to keep

observers from viewing data and preserve data integrity• SSL – Secure Sockets Layer

– Encrypts Communication between web browsers and web servers over the internet

– Uses Public and private key exchange

• VPN – Virtual Private Networking– Secure Tunnel– Key Encryption

• Symmetric• Asymmetric

– Encryption Algorithms• SHA – Secure Hashing Algorithm• DES – Data Encryption Standard

Page 40: Personal Security Security Tips for Home Internet Users

What your ISP does for you

• Private addressing

• Dynamic addressing

• Email virus scanning

[email protected]

Page 41: Personal Security Security Tips for Home Internet Users

Security Tools• Routers

• Proxy Servers

• Firewalls– Application– Circuit Switching

• Scanners

Page 42: Personal Security Security Tips for Home Internet Users

Routers• ACL Filter packets

– Deny or Allow– Destination or Source

• Separate Networks– Gateway– Private Network

Page 43: Personal Security Security Tips for Home Internet Users

Proxy Server• Resides between web sites and web browser

• Takes Request from client

• Issues request to web server

• Caches web content locally– Improves network performance

Page 44: Personal Security Security Tips for Home Internet Users

Firewalls• Separates untrusted external network with

trusted internal network.

• Types of Firewalling

• Personal Firewall

• Network Firewall

Page 45: Personal Security Security Tips for Home Internet Users

Types of Firewalling• ACL – Access Control Lists

– Filters Packets

• Application Firewalling– Verifies command legitimacy– Can be performance intensive

• Proxying• Circuit Switching

– Allows data sessions by request

Page 46: Personal Security Security Tips for Home Internet Users

Personal Firewall• Installed on local Computer• Rules Based• Alerts to system intrusion• Accounting Logs events for network forensics• Risky can affect stability of your computer

– Personal firewalls replace operating system kernel components and can conflict with other applications

• Vendors– Sygate Personal Firewall – http://www.sygate.com– Black Ice Defender – http://www.networkice.com– McAfee Personal Firewall – http://www.mcafee.com– Norton Personal Firewall – http://www.symantec.com– Zone Alarm – http://www.zonelabs.com

Page 47: Personal Security Security Tips for Home Internet Users

Network Firewalls• DSL Cable Routers

– Filter Packets– Separates Network

• Uses Private Addressing

• Vendors• Linksys DSL/Cable Router

– http://www.linksys.com

• Dlink Home Gateway Internet Sharing and Firewall– http://www.dlink.com

• Proxim – Netline Gateway– http://www.proxim.com

• SMC Barricade– http://www.smc.com

Page 48: Personal Security Security Tips for Home Internet Users

Port Scanners• Scans IP Port numbers for

available services

• Gibson Research Center– http://www.grc.com

Page 49: Personal Security Security Tips for Home Internet Users

Contingency• Backup your data

• Often

• Use Rotation schedule

• Store software, license and key information in a safe convenient place.

• Software includes device drivers, application software, and operating system

Page 50: Personal Security Security Tips for Home Internet Users

Who can I turn to?• [email protected]• System Administration Networking Security

– http://www.sans.org

• Carnegie Mellon - Computer Emergency Response Center– http://www.cert.org

• FBI – Internet Fraud Complaint Center– http://www.fbi.gov/interagency/ifcc/

filingcomplaint.htm

Page 51: Personal Security Security Tips for Home Internet Users

Links• Broadband

– http://www.cable-modem.net/gc/questions.html– http://www.dslreports.com/

• Antivirus– http://www.mcafeeb2b.com/naicommon/avert/avert-research-center/defau

lt.asp– http://www.symantec.com/avcenter/index.html

• System Inventory– http://www.belarc.comPersonal Firewalls– http://www.zonelabs.com– http://www.symantec.com– http://www.mcafee.com– http://www.networkice.com– http://www.sygate.com

Page 52: Personal Security Security Tips for Home Internet Users

Links 2• Network Firewalls/Routers

– http://www.linksys.com– http://www.dlink.com– http://www.proxim.com– http://www.smc.com

• System and Port Scanners– http://www.grc.com– http://security1.norton.com/us/home.asp– http://www.mcafee.com/support/system_req/browser_test.asp– http://www.microsoft.com/technet/mpsa/start.asp

• Agencies– http://www.ciac.org/ciac/– http://www.sans.org– http://www.fbi.gov/interagency/ifcc/filingcomplaint.htm– Report abuse to any ISP. Ex [email protected]

• This Presentation– http://homepage.smc.edu/rojas_dan