39
Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

Computer Security

Spyware and Viruses and Theft, Oh My…

Chapter 11 –Discovering Computers 2009

Page 2: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a computer security risk?Any event or action that causes loss of or damage to a computer system

Computer crime - Any illegal act involving a computertheft of hardware Software theft or piracy unauthorized access and useinformation theftCybercrime - Online or Internet-based illegal acts

System Failurepower surgeundervoltage (brownout or blackout)noise (unwanted signal)natural disasters (fires, floods, tornados)aging hardware

Page 3: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

Preventing Hardware Theft and Vandalism

Restrict physical accesslock doors and windows

use alarm systems

use cables that lock equipment to desk

use passwords, possessed object and biometric devices – don’t prevent actual theft, but renders computer useless if stolen

Page 4: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How can you make your password more secure?

Longer passwords provide greater security

Mix words with numbers

Avoid obvious passwords, such as your birthdate

Page 5: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is software theft?

When you purchase

software, you do not own the

software; instead, you

become a licensed user

Software theft - Stealing media that contains software

Software piracy is unauthorized and illegal duplication of copyrighted software

Page 6: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is unauthorized access?

CrackerSomeone who tries

to access a computer or

network illegally

Use of computer or network without permission

HackerOnce used as a

complimentary word for a computer enthusiast

Now another wordfor cracker

Page 7: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a personal firewall?

Software program that detects and protects personal computer and its data from unauthorized intrusions

Constantly monitors all transmissions to and from computer

Informs you of any attempted intrusions

Page 8: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is filtering software?

Can restrict access to specified Web sites

Some filter sites use specific words

Others filter e-mail messages and chat rooms

Page 9: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is an audit trail?

Records in a file both successful and unsuccessful access attempts to access a computer

Companies should document and explain to

employees policies regarding use of

computers by employees for personal

reasons

Page 10: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a computer virus?

Potentially damaging program that affects computer negatively by altering way computer works

Segment of program code from some outside source that implants itself in computer

Page 11: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is the source of a virus?

Written by programmers

Some write viruses as challenge

Others write viruses to cause destruction or to slow Internet

Page 12: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What are the ways viruses can be activated?

Opening infected file

Running infected program

Booting computer with infected floppy disk in disk drive

opening an email attachment that is infected

Page 13: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What are signs of a virus infection?

Page 14: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What are the three main types of virus?

Boot sector virusResides in boot sector of floppy disk or master boot record of hard disk

File virusAttaches itself to program files

Macro virusWhen you open document that contains infected macro, virus loads into memory

Page 15: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How can you protect your system from a macro virus?

Set macro’s security level in all applications that allow you to write macros

At medium security level, warning displays when you attempt to open document that contains macro

Page 16: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

Worms and Trojan Horses

A worm is a program that copies itself repeatedly

A Trojan Horse looks like a legitimate or hides within another program

Viruses, worms and Trojan Horses use computer resources and can damage files and software

Page 17: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What does an anti-virus program do?

Detects and identifies viruses

Inoculates existing program files

Removes or quarantines viruses

Creates rescue disk

These programs need to be updated to keep up with the new viruses being written.

Page 18: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How does an anti-virus program scan for a virus?

Scans forPrograms that attempt to modify boot program, operating system, and other programs that normally read from but not modified

Files you download from the Web

E-mail attachments

Files you open

All removable media, such as a floppy

Looks for known virus signatures

Page 19: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How does an anti-virus program inoculate a program file?

Antivirus program recordsfile size and creation dateand uses this information to detect if a virus tamperswith inoculated program file

Page 20: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What two types of virus are more difficult to detect?

Polymorphic virus

Modifies its own code each time it attaches itself to another program or file

Cannot be detected by its virus signature because

code pattern in virus never looks the same

Stealth virus

Infects a program file, but still reports size and creation date of original, uninfected

program

Cannot be detected by inoculation file

Page 21: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What does an anti-virus program do once it detects a virus?

Removes virus if possible

Quarantines infected file in folder on hard disk

Page 22: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What should you do if a virus infects your system?

Remove virus

If you share data with other users, then immediately inform them of virus infection

Page 23: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How can you stay informed about viruses?

Several Web sites publish list of virus alerts and virus hoaxes

Virus hoaxE-mail message

that warns you of non-existent virus

Page 24: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is Spyware?

Program placed on computer without user's knowledge

Secretly collects information about user

Can enter computer as virus or as a result of installing new program

Page 25: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a cookie?

Track user preferences

Small file that Web server stores on your computer

Typically contains data about you

Web site can read data only from its own cookie file

Some Web sites sell or trade information stored in your cookie to advertisers

Set browser to accept cookies automatically, or prompt you if you wish to accept cookie, or disable cookie use

Many Web sites do not allow you to access features if you disable cookie use

a cookie manager is a Software program that selectively blocks cookies

Track how regularly you visit site and

Web pages you visit when at

site

Used to send SPAM

Page 26: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is an electronic profile?

Merchants sell contents of their

databases to national marketing firms and Internet advertising firms

Data is collected every time you fill out form or click advertisement on

Web

Data combined with information

from public sources

Marketing firms sell your

electronic profile to any company that requests it

Page 27: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

Spam – unsolicited email message

Phishing – scam using an official-looking email message to get personal and financial information

Spoofing – make network believe that an IP address appear legitimate to gain access

Back door – a means of accessing a program without going through security controls

Zombie – using someone else’s computer to attack other computers

Page 28: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How do Web browsers provide secure data transmission?

Many Web browsers use encryption

Web site that uses encryption techniques to secure its data is known as secure sitesecure site

Use digital certificates with security protocol

Digital certificate

Notice that guarantees user or

Web site is legitimate

Also called public-key certificate

Page 29: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a digital signature?

Encrypted code that person, Web site, or company attaches to electronic message to verify identity of message sender

Code usually consists of user's name and hash of all or part of message

Page 30: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is encryption?

PlaintextUnencrypted, readable data

Process of converting readable data into unreadable characters to prevent

unauthorized access

Used to transmit files over Internet

encryption software

CiphertextThe encrypted (scrambled) data

encryption key

PlaintextUnencrypted, readable data

Page 31: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009
Page 32: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a secure server?Prevents access to system by unauthorized users

Used for transactions involving credit card information

Page 33: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is Secure Sockets Layer (SSL)?

https indicates secure connection

Provides private-key encryption of all data that passes betweenclient and server

Page 34: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is Pretty Good Privacy (PGP)?

One of most popular e-mail digital encryption programs

Freeware for personal, non-commercial users

Uses public-key encryption scheme

Page 35: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a surge protector?

Smoothes out minor noise, provides stable current flow, and keeps over-voltage from reaching computer

Amount of protection proportional to its cost

Also calledsurge suppressor

Uninterruptible power supply (UPS)-Surge protector and battery that can provide power during temporary loss of power

Page 36: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

What is a rescue disk?

Removable disk that contains uninfected copy of key operating system commands and startup information

Upon startup, rescue disk finds and removes boot sector virus

Page 37: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

How do the types of backup compare?

Page 38: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009

(continued)

Page 39: Spyware and Viruses and Theft, Oh My… · Computer Security Spyware and Viruses and Theft, Oh My… Chapter 11 – Discovering Computers 2009