16
Security WeeSan Lee [email protected]

Security WeeSan Lee [email protected]@cs.ucr.edu

Embed Size (px)

Citation preview

Security

WeeSan Lee [email protected]

Roadmap

Security Risks Preventions References

Security Risks

Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing

Security Risks - Computer Virus A small computer program that infects your

computer without permission or knowledge of the user

Infects others via a host media Floppy disk Email …

http://www.healthinitiative.org/IMAGES/virus_big.jpg

Security Risks - Worm

A self-replicating program, spreads across the Internet

May contain viruses 1st worm was created by Robert T. Morris, a

graduate student at Cornell U. in 1988 Computer Emergency Response Team

(CERT) was created as a result

http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG

Security Risks - Trojan Horse

A program that disguises itself to be something useful or harmless Eg. screensaver

In fact, a backdoor program which allows unauthorized access remotely

http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg

Security Risks - Adware

An advertising-supported software

Security Risks - Spyware

Adware + collecting user’s information without the user’s consent

Security Risks - Browser Hijacker A program that changes the settings on the

web browser Change the homepage to other website

Security Risks - Web Bug

Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users

AKA web beacon, tracking bug, … To avoid that:

Turn off image loading on email clients Use text-based email such as pine

http://www.prospexis.net/images/beatle2.gif

Security Risks - Hoaxes and Chain Letters Hoaxes are fake warnings, instructing you to

delete files, playing on your sympathy, etc Chain letters implore you to pass the

message to as many people as possible For examples

“This is not a hoax.” “Forward this email to 10 people you know for

good luck …” “VIRUS! DELETE NTFS.SYS”

Security Risks - Phishing

Security Risks - Phishing

Preventions

Use anti-virus/firewall software For examples

AVG (http://free.grisoft.com/) Nod32 (http://www.eset.com/) Norton Antivirus (http://www.symantec.com/)

Schedule auto-update

Preventions (cont)

Backup Use 2 HDs Burn CDs/DVDs and give them to your

mom Use online backup services

http://www.carbonite.com/

Be educated Don’t “fool” around

References

Internet Effectively Ch 1 Ch 4

Wikipedia http://www.wikipedia.com/