120 likes | 193 Views
Learn about the ongoing threats to computers, including daily reported attacks like Code Red and Nimda. Discover the tactics used by attackers, targets they aim for, and potential consequences. Understand the risks posed by access to information, abuse of resources, attacking others, and targeting you directly. Explore real-world examples and find out how to defend against common threats through crime prevention, secure configurations, and vigilant monitoring.
E N D
Threats to computers Andrew Cormack UKERNA
Daily reported attacks Code Red (>850) Nimda (1936)
Door rattling? • These numbers are from just one MAN • And many probes scan thousands of hosts • Millions of JANET hosts attacked every day • Automated scan/compromise programs • If you’re vulnerable you will be compromised • Security by obscurity is no longer tenable
What are the targets? • Random • Scripts pick random IP address ranges • Resources • Intruders like our bandwidth, disk space, CPU power • Reputation • Intruders gain kudos for compromising high-profile sites • Revenge • Has your institution upset anyone recently? • Retaliation • Has one of your (ab)users upset anyone?
What can attackers do? • Read, delete, modify your data • Misuse your resources • So they aren’t available for your users • Attack others • Leaving you to take the blame • Attack you
Real examples • All from JANET sites • Mostly from automated, dumb, programs • Because they can be examined • Because they (usually) only do one thing • How much more are intelligent people doing?
Threats: access to information • Reading private information • Viruses actively seek out passwords and credit cards • Deleting vital information • Department lost all files for six months • Vandalism, or just removing traces? • Modifying information • Are there vulnerabilities in finance, exams, MLEs… ?
Threats: abuse of resources • Software piracy • Departmental FTP server used for distribution • Pornography • University systems used to store personal collection • Site proxy used by group to access illegal material
Threats: attacking others • Compromising systems • Worms attempt break-ins to anything running HTTP • Denial of Service (DoS) • Compromised machines join flooding networks • Viruses now carry these tools • Real-world crimes • Stolen credit card numbers used for purchases • Blackmail, defamation, incitement, stalking, …
Threats: attacking you • DoS attacks take sites off network • Attacker with control of system is “inside” • Attack other systems • Read traffic on networks • Disrupt service • Firewall protection failed • Social engineering attacks
Some good news • Attacking is not rocket science • Nor is defending • Most successful attacks are preventable • Well-publicised vulnerabilities • Software fixes freely available • Simple toolkit • Network configuration • Patches
What can you do? • Crime prevention • Reduce open windows • Limit direct access from the Internet • Fit locks • Secure hosts that are exposed or critical • Guidelines and tools exist • Use them and make sure others do