180 likes | 207 Views
Security. WeeSan Lee weesan@cs.ucr.edu. Roadmap. Security Risks Preventions References. Security Risks. Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing. Security Risks - Computer Virus.
E N D
Security WeeSan Lee weesan@cs.ucr.edu
Roadmap • Security Risks • Preventions • References
Security Risks • Computer Virus • Worm • Trojan Horse • Adware • Spyware • Browser Hijacker • Web Bug • Email Hoaxes & Chain Letters • Phishing
Security Risks - Computer Virus • A small computer program that infects your computer without permission or knowledge of the user • Infects others via a host media • Floppy disk • Email • … http://www.healthinitiative.org/IMAGES/virus_big.jpg
Security Risks - Worm • A self-replicating program, spreads across the Internet • May contain viruses • 1st worm was created by Robert T. Morris, a graduate student at Cornell U. in 1988 • Computer Emergency Response Team (CERT) was created as a result http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG
A program that disguises itself to be something useful or harmless Eg. screensaver In fact, a backdoor program which allows unauthorized access remotely Security Risks - Trojan Horse http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg
Security Risks - Adware • An advertising-supported software
Security Risks - Spyware • Adware + collecting user’s information without the user’s consent
Security Risks - Browser Hijacker • A program that changes the settings on the web browser • Change the homepage to other website
Security Risks - Web Bug • Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users • AKA web beacon, tracking bug, … • To avoid that: • Turn off image loading on email clients • Use text-based email such as pine http://www.prospexis.net/images/beatle2.gif
Security Risks - Hoaxes and Chain Letters • Hoaxes are fake warnings, instructing you to delete files, playing on your sympathy, etc • Chain letters implore you to pass the message to as many people as possible • For examples • “This is not a hoax.” • “Forward this email to 10 people you know for good luck …” • “VIRUS! DELETE NTFS.SYS”
Preventions • Use anti-virus/firewall software • For examples • AVG (http://free.grisoft.com/) • Nod32 (http://www.eset.com/) • Norton Antivirus (http://www.symantec.com/) • Schedule auto-update
Preventions (cont) • Backup • Use 2 HDs • Burn CDs/DVDs and give them to your mom • Use online backup services • http://www.carbonite.com/ • Be educated • Don’t “fool” around
References • Internet Effectively • Ch 1 • Ch 4 • Wikipedia • http://www.wikipedia.com/