22
INFORMATION TECHNOLOGY A PRESENTATION ON IT - ETIQUETTES PRESENTATION BY ANAY MISHRA ATUL MAINDOLA NAVDEEP MALVIYA SMIT SONI RONAK GOYAL SUBMITTED TO PROF. BHAWANA SHARMA

Internet Etiqute

Embed Size (px)

Citation preview

INFORMATION TECHNOLOGYA

PRESENTATION ONIT - ETIQUETTES

PRESENTATION BYANAY MISHRAATUL MAINDOLANAVDEEP MALVIYASMIT SONIRONAK GOYALISHITA LUTHARA

SUBMITTED TO

PROF. BHAWANA SHARMA

AGENDA• INTRODUCTION• BASICS• INTERNET ETIQUETTES• ASPECTS• SPYWARE & TROJANS• SYMPTOMS OF SPYWARE & TROJAN

ATTACK• SUMMARY OF EFFECT• SIMILARITIES & DIFFERENCES• INSTALLATION• EFFECTS• EXAMPLE OF SPYWARE• EXAMPLES OF TROJAN HORSE• VULNERABLE SYSTEMS• CONCLUSIONS

INTRODUCTION

Rapid Info

processing

• Efficient and cost-effective solution• Digitized information• Automation - Computer

Digital

Information

• Information privacy• Information reliability• Information availability

Information

security

• confidentiality• Authenticy,Integrity&Availability

Challenges

What is Information Technology ?? Computer !!!!!!!!!!!! ??????

BASICS

INFORMATION ARCHITECTURE• DATA

LIFECYCLE• DATA FLOW• DATA

STORAGE

INFORMATION CLASSIFICATION• PRIVATE• PUBLIC• CONFIDENTIA

L

INFORMATION ASSETS• PEOPLE• PROCESS• TECHNOLOGY

INTERNET ETIQUETTES

Etiquette in technology governs what conduct is socially acceptable in an online or digital situation. While etiquette is ingrained into culture, etiquette in technology is a fairly recent concept. The rules of etiquette that apply when communicating over the Internet or social networks or devices are different from those applying when communicating in person or by audio (such as telephone) or videophone (such as Skype video). It is a social code of network communication.Communicating with others via the Internet without misunderstandings in the heat of the moment can be challenging, mainly because facial expressions and body language cannot be interpreted on cyberspace. Therefore, several recommendations to attempt to safeguard against these misunderstandings have been proposed.

ASPECTSPRIVACY

INTEGRITY

SAFETY – PHYSICAL SECURITY

AVAILABILITY

AUTHENTICITY

CONFIDENTIALITY

SPYWARE & TROJANS

A general term for a program that surreptitiously monitors your actions. While they are sometimes sinister, like a remote control program used by a hacker, software

companies have been known to use Spyware to gather data about customers. The practice is generally frowned upon.

An apparently useful and innocent program containing additional hidden code

which allows the unauthorized collection, exploitation, falsification, or

destruction of data.

SYMPTOMS OF SPYWARE & TROJAN ATTACK

• Targeted Pop-

ups

• Slow

Connection

• Targeted E-

Mail (Spam)

• Unauthorized

Access

• Spam

Relaying

• System Crash

• Program

Customisatio

n

SUMMARY OF EFFECT

• Collection of data from your computer without consent

• Execution of code without consent

• Assignment of a unique code to identify you

• Collection of data pertaining to your habitual use

• Installation on your computer without your consent

• Inability to remove the software

• Performing other undesirable tasks without consent

SIMILARITIES / DIFFERENCESSpyware Trojan Horses

Commercially Motivated Malicious

Internet connection required Any network connection required

Initiates remote connection Receives incoming connection

Purpose: To monitor activity Purpose: To control activity

Collects data and displays pop-ups Unauthorized access and control

Legal Illegal

Not Detectable with Virus Checker Detectable with Virus Checker

Age: Relatively New (< 5 Years) Age: Relatively Old ( > 20 Years)

Memory Resident Processes

Surreptitiously installed without user’s consent or understanding

Creates a security vulnerability

TROJAN HORSE & ITS INSTALLATION• Secretly installed when an infected executable is run

• Much like a virus

• Executables typically come from P2P networks or unscrupulous websites

• ActiveX controls on websites

• ActiveX allows automatic installation of software from websites

• Users probably does not know what they are running

• Misleading descriptions often given

• Not sandboxed!

• Digital signatures used, signing not necessary

INSTALLATION• Certificate Authority

• Misleading Certificate Description

• Who is trusted?

EFFECTS

• Allows remote access

– To spy

– To disrupt

– To relay a malicious connection, so as to disguise the

attacker’s location (spam, hacking)

– To access resources (i.e. bandwidth, files)

– To launch a DDoS attack

EXAMPLE: BACK ORIFICE (SPYWARE )

• Produced by the “Cult of the Dead Cow”

• Win95/98 is vulnerable

• Similar operation to NetBus

• Name similar to MS Product of the time

TROJAN HORSE EXAMPLES

• Integrates with the NT kernel

• Very dangerous

• Virtually undetectable once installed

• Hides from administrator as well as user

• Private TCP/IP stack (LAN only)

{M$ ROOTKIT}

TROJAN HORSE EXAMPLES

• Commercial

• Web-based client

• Assassin Trojan

• Custom builds may be purchased

• These are not found by virus scanners

• Firewall circumvention technology

{I-SPYNOW}

VULNERABLE SYSTEMS

DANGEROUS

Number of Trojans in common use…

RELATIVELY SAFE Lin

ux/

Unix

Win

9

x

MacO

S Win

NT

MacO

S

X

WinNT refers to Windows NT 4, 2000, XP and Server 2003. Win9x refers to Windows 95, 95SE, 98 and ME.Information Source: McAfee Security - http://us.mcafee.com/

CONCLUSIONS

SECURITY IMPLICATIONS

Divulge personal data

Backdoors into system

System corruption

Disruption / Irritation

Aids identity theft

Easy virus distribution

Increased spam

Mass data collection

Consequences unknown

Web becomes unusable

Web cons outweigh pros

Cost of preventions

More development work

More IP addresses (IPv6)

LONG TERM

SHORT TERM

FIREWALLS

3 Types…• Packet Filtering – Examines attributes of packet.

• Application Layer – Hides the network by impersonating the server

(proxy).

• Statefull Inspection – Examines both the state and context of the

packets.

• Regardless of type; must be configured to work properly.

• Access rules must be defined and entered into firewall.

THANK YOU

QUESTIONNAIRE

Q. What Is a Trojan ?

Q. What Is Spyware ?

Q. What Is The Differences Between Spyware & Trojan ?

Q. What Are The Ways For Prevention ?

Q. What Is Firewall ?