promote education internet security

18
Internet Security Zoaib Mirza Promote Education www.promoteeducation.com

Upload: zoaib-mirza

Post on 11-Jun-2015

436 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Promote Education Internet Security

Internet Security

Zoaib MirzaPromote Education

www.promoteeducation.com

Page 2: Promote Education Internet Security

04/13/23 Zoaib Mirza 2

Topic of Discussions About Me What defines an incident? General Statistics General Threats Best Practices Free Tools Conclusion Q&A Game Bibliography and References

Page 3: Promote Education Internet Security

04/13/23 Zoaib Mirza 3

About Me Instructional Associate / Distance

Technology Specialist – DePaul University

Visiting Professor – DePaul University Introduction to Computer Productivity Database Design and Implementation for

Small Business Applications Internet Applications for Small Businesses Management of Information Technology

CEO and founder of www.promoteeducation.com

Page 4: Promote Education Internet Security

04/13/23 Zoaib Mirza 4

What defines an incident? A computer security incident covers a

large range of violations, including: Harassment, Denial/Interruption of Service, Malware Infection (worm, virus), Unauthorized Access, Misuse of Data or Services, Copyright Infringement, Spam

Page 5: Promote Education Internet Security

04/13/23 Zoaib Mirza 5

General Statistics

http://www.cert.org/stats/

2000-2003 

Year 2000 2001 2002 2003

Incidents 21,756 52,658 82,094 137,529

Page 6: Promote Education Internet Security

04/13/23 Zoaib Mirza 6

General Threats Virus - A computer virus is a computer program that can copy

itself and infect a computer without permission or knowledge of the user.

Example an infected file. Worm - A computer worm is a self-replicating computer

program. It uses a network to send copies of itself to other nodes (computer terminals on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms always harm the network (if only by consuming bandwidth), whereas viruses always infect or corrupt files on a targeted computer.

For example, a worm could send out copies of itself to everyone listed in your e-mail address book, and their computers would then do the same, which causes a domino effect of heavy network traffic that can slow down business networks and the Internet as a whole. When new worms are unleashed, they spread very quickly. They clog networks and possibly cause a long wait for you (and everyone else) to view Web pages on the Internet.

Page 7: Promote Education Internet Security

04/13/23 Zoaib Mirza 7

Types of Threats Trojan horse – A Trojan horse is a program that unlike

a virus contains or installs a malicious program (sometimes called the payload or 'trojan'). Trojan horses may appear to be useful or interesting programs (or at the very least harmless) to an unsuspecting user, but are actually harmful when executed.

Examples include various implementations of weather alerting programs, computer clock setting software, Software that you download for free, and peer to peer file sharing utilities.

Spam - Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are generally undesired. The most widely recognized form of spam is email spam. Spam is also called junk mail.

Example: Emails for unknown senders

Page 8: Promote Education Internet Security

04/13/23 Zoaib Mirza 8

Types of Threats Phishing - phishing is a criminal activity using

“social engineering” techniques which is manipulating people into performing actions or revealing confidential information. Phishers attempt to fraudulently acquire sensitive information, such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic communication.

eBay and PayPal are two of the most targeted companies, and online banks are also common targets.

Phishing is typically carried out using email or an instant message, and often directs users to give details at a website, although phone contact has been used as well.

Page 9: Promote Education Internet Security

04/13/23 Zoaib Mirza 9

Best Practices1. Install Operating system Updates and Patches2. Install Anti-Virus and Spyware Protection 3. Use a Host Based Firewall4. Create a strong password5. Use caution when opening email attachments 6. Never share personal information 7. Do not respond to Spam 8. Back up Files 9. Do not Share Folders10. Use a Spyware program

Page 10: Promote Education Internet Security

04/13/23 Zoaib Mirza 10

Free Tools Microsoft Baseline Security Analyzer

http://www.microsoft.com/technet/security/tools/mbsahome.mspx

Microsoft Windows Update http://update.microsoft.com/

windowsupdate/v6/default.aspx?ln=en-us

Trend Micro for virus scan http://housecall.trendmicro.com/

Page 11: Promote Education Internet Security

04/13/23 Zoaib Mirza 11

Conclusion Secure your computer like you would

secure your home. Do not respond to any emails or

messages if you do not know the sender. Always keep your computer up to date. Do now share any important information

via chatting or emails. Do not download any free software on

your computer. Make sure it is from an authentic website. E.g. http://www.download.com/

Page 12: Promote Education Internet Security

04/13/23 Zoaib Mirza 12

Questions and Answers

Page 13: Promote Education Internet Security

04/13/23 Zoaib Mirza 13

Game - Questions

You cannot stop me, I can come in your machine in many ways, can you guess the type of threat I am, and what are you doing

to do about itmuhuaaahahahahahah!

Page 14: Promote Education Internet Security

04/13/23 Zoaib Mirza 14

Game - Questions1. If I am an unknown email and showing up in

your mailbox almost everyday, who am I? 2. If I am a fake url link or while chatting you

get a link from me on your chat screen asking for personal information, who am I?

3. If I am an infected file on your computer, who am I?

4. If I am an infected file on your network computer and have clog networks, who am I?

5. If I look innocent and harmless but when executed can harm your computer, who am I?

Page 15: Promote Education Internet Security

04/13/23 Zoaib Mirza 15

Game - Answers1. If I am an unknown email and showing up in

your mailbox almost everyday, who am I?1. Answer: Spam 2. Action: Use Spam filters, users using yahoo

should set up their spam setting from low to medium or high

2. If I am a fake url link or while chatting you get a link from me on your chat screen asking for personal information, who am I?

1. Answer: Phisher2. Action: Do not click on any unknown link,

respond to any unknown user or share any personal information

Page 16: Promote Education Internet Security

04/13/23 Zoaib Mirza 16

Game - Answers

3. If I am an infected file on your computer, who am I?

1. Answer: Virus2. Action: Use an antivirus software to scan

the file4. If I am an infected file on your network

computer and have clog networks, who am I?

1. Answer: Worm2. Action: Unplug the computer from the

internet and scan the whole computer using an antivirus software

Page 17: Promote Education Internet Security

04/13/23 Zoaib Mirza 17

Game - Answers

5. If I look innocent and harmless but when executed can harm your computer, who am I?

1. Answer: Trojan2. Action: Uninstall any unknown or

free application downloaded from an unauthentic website

Page 18: Promote Education Internet Security

04/13/23 Zoaib Mirza 18

Bibliography and References

http://www.cert.org/stats/ http://is.depaul.edu/security/

information_security/software.asp http://en.wikipedia.org/wiki/Main_P

age