1 / 32

Management Information Systems

CLARK UNIVERSITY College of Professional and Continuing Education (COPACE). Management Information Systems. Lection 07 Information security. Information security.

yates
Download Presentation

Management Information Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CLARK UNIVERSITY College of Professional and Continuing Education (COPACE) Management Information Systems Lection 07 Information security

  2. Information security • Information securityis the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.

  3. Viruses • One of the main types of leverage to the computer networks and systems is the computer virus. • A computer virus is a program that can infect other programs by means of inclusion in them its body or elements, perhaps a modified copy, the latter preserves the ability to further multiplication.

  4. Computer viruses • In addition to infection, the virus just like any other program can perform other unauthorized activities, from quite harmless to extremely destructive.

  5. Signs of infection • the slowdown of the computer; • the inability to boot the operating system; • frequent «hangs» and failures of computer; • termination of operation or malfunction of the previously successfully functioning programs; • increasing the number of files on the disk; • changing sizes of the files; • periodic occurrence on the screen inappropriate system messages; • reduction of free RAM; • a marked increase while accessing to the hard drive; • changing the date and time of file creation; • the destruction of the file system (disappearance of files, distortion of catalogues, etc.); • hard drive bulb blinks, when no program applies it.

  6. Sources of the spread of computer viruses • Internet • Intranet • E-mail • Removable storage devices

  7. Internet • Hackers place viruses and other malicious programs on the web resources, mask them as useful and free software. In addition, scripts that run automatically when you open a web page can perform malicious actions on your computer, including changes in the system registry, stealing personal data and the installation of malicious software. • By using network technologies, attackers implement attacks on the remote private computers and servers of companies. The result of such attacks may be the withdrawal of resources from the system or gaining full access to those resources.

  8. Intranet • Intranet is an internal network, specially designed for management of information systems within a company or a private home network. • Intranet is a unified space for storage, exchange and access to information for all the computers on the network. • So, if any of those computers in the network are infected, the other computers has a great risk of infection also. To avoid such situations it is necessary to protect not only the perimeter of the network, but each individual computer.

  9. E-mail • The user of the infected computer, unwittingly, sends emails to recipients who in turn send more infected emails and etc. • There are cases, when the infected file falls into the mailing lists of commercial information of any large company. In this case, hundreds or even thousands of subscribers of such mailings suffer and then will send the infected files to tens of thousands of their customers. • In addition to the threat of malicious programs there is a problem with an external junk mail advertising (spam). Although it is not a direct threat, spam increases the load of mail servers, creates additional traffic, pollutes the user mailbox, leads to a loss of working time and thereby causes significant financial damage.

  10. Removable storage devices • Removable storage devices are floppy disks, CD/DVD disks, flash cards, they are widely used for storing and transmitting information. • When you open a file that contains malicious code from a removable device you can corrupt the data stored on your computer, as well as spread the virus to other drives of a computer or computer network.

  11. Impact degree • Infection method Classifications of computer viruses • Environment • Algorithmic nature • Resident • Nonresident • Not dangerous (jokes) • Dangerous • Replicators (worms) • Invisible (stelth) • Parasitic • Boot viruses • File viruses • Mutants • Trojan • Very dangerous • File-boot viruses • Network viruses

  12. Environment • Network viruses are spread by various computer networks. • File viruses infect mainly in executable files (BAT, COM and EXE). Sometimes they can be introduced in other files too, but if it is so, they will never receive control and lose the ability to reproduce. • Boot viruses infect the boot sector of a disk or the sector, containing the program loading of the system disk (Master Boot Record). • File-boot viruses infect both files and boot sectors.

  13. Infection method • Resident virus retains its resident part in RAM, which then intercepts the appeal of the operating system to the objects of the intrusion (files, boot sectors, etc.) and implements there. They are in RAM and active until shutdown or restarting the computer. • Non-resident viruses do not infect the computer's memory and are active for a limited time.

  14. Impact degree • Not dangerous viruses don’t disturb the work of the computer, but reduce the amount of free RAM and disk space, manifest themselves in any graphic or sound effects. • Dangerous viruses can lead to a range of violations in the work of the computer. • Very dangerous viruses can lead to loss of programs, destruction of data, deleting information in the system areas of the disk.

  15. Algorithmic nature • «Worms» are redistributed in computer networks, penetrate into the PC memory from the computer network, compute the addresses of the other computers and send them their copies. Sometimes they leave temporary files on the PC, sometimes they don’t affect the resources of the computer except the RAM and CPU. • Satellites break EXE-files by creating a COM copy. when you start the program firstly the COM file with the virus starts, which will start the EXE file. With this method of intrusion infected programs don’t change. • "Parasitic" viruses modify the contents of files or sectors on the disk.

  16. Algorithmic nature • "Polymorphic“ viruses are self-encrypting viruses or “ghosts”. It is enough difficult to find them because they don’t have a signature, i.e., they do not contain any permanent section of code. In most cases, two samples of the same polymorphic virus will have no one match. This is achieved by encrypting the main body of the virus. • Macro-viruses use the possibilities of macro-language, built-in different integrated software (text editors, spreadsheets, etc.). Currently, the most common macro viruses infect text files created in Microsoft Word.

  17. Algorithmic nature • "Stealth” viruses represent perfect programs, which intercept treatment to the affected files or sectors of disks and “place” instead of them clean information. In addition, these viruses when accessing files, use enough original algorithms, allowing to deceive resident anti-virus monitors. • Trojansare not able to seft-replicate, but they are very dangerous (destroy the boot sector and file system drive), spreading like useful software.

  18. Spyware Spyware is a software that collects information about a particular user or organization without their knowledge. You can not guess even about the presence of such programs on your computer.The goals of spyware are: • To trace user actions on a computer; • To collect information about the contents of hard disks; more often only some folders and the system registry are scanned (in order to compile a list of installed software on your PC); • To collect information on the quality of network communication, the way of connection, etc.

  19. Adware • It is the code included in software without the user's knowledgeto display advertisements. • Adware are embedded in the software distributed free. These programs often collect and send back to their developer personal information about the user, change browser settings (start page and search pages, security levels, etc.), as well as create the uncontrolled user traffic. All these activities lead to the disruption of information security and financial losses.

  20. Jokes • It is the software that does not cause direct harm, but display a message that the damage is already done, or will be caused under any conditions. • These programs often warn the user of a non-existent dangers, for example, display a message about disk formatting (although no formatting is not actually happens), detects viruses in uninfected files, etc.

  21. Rootkits • They represent utilities used to conceal malicious activities. • They mask malicious programs to avoid their detection by antivirus programs. • Rootkits modify the OS on the computer and replace its main features to hide their own presence and actions of the attacker.

  22. Antivirus • “Detectors” can detect the files infected with one of the few known viruses. • “Doctors” (phages) «treat» the infected programs or disks, “biting” the virus body from the infected programs, restoring the program in the condition it was in before infection.

  23. Antivirus • “Auditors” at first remember the information about the state of applications and system areas of the hard disk, and then compare their current state with the previous. If there are some inconsistencies it is reported to the user. • “Doctors” are hybrids of auditors and doctors, they detect changes in files and system areas and automatically return them to their original state.

  24. Antivirus • Filters are resident in RAM, they intercept the viruses attempts to reproduce and make a damage, and report to the user. • “Vaccines” modify programs and disks in such a way that it is not reflected on the programs, but the virus considers these programs or disks are already infected. These programs are highly inefficient.

  25. Prevention of infection • Back-up information • Differentiation of access • Check the arriving information

  26. Actions in case of infection • Don't hurry and make hasty decisions. • All actions to detect the type of infection and the treatment of the computer should only be done when you boot your computer from protected from the recording disk. It should only use the programs (executable files) stored on that disk. • If you are using the resident antivirus monitor, the presence of the virus in a program can be detected at a very early stage, when the virus had not even managed to infect other programs and spoil any of the files. In this case, you should restart the computer with the recovery disk and delete the infected program. • Then start auditor and verify the changes in the files.

  27. History of computer virology 1945 • The birth of the term “debugging” 1949 • J. Neumann has developed a mathematical theory of the creation of self-reproducing programs

  28. History of computer virology 1960-s • First viruses (copied themselves while the free space finished) • PervadingAnimal (Univax1108) 1975 • First network virus “TheCreeper” (and antivirus “The Reeper”

  29. History of computer virology 1979 • First worm (by XEROX) • PervadingAnimal (Univax1108) 1981 • ElkCloner (for Apple, through games) 1983 • The birth of the term “computer virus”

  30. History of computer virology 1986 • First virus for IBM “The Brain” (Pakistan) 1988 • Worm for APRANET 1989 • First trojan AIDS 1993 • “SatanBag” (Washington)

  31. History of computer virology 1999 • “Melissa” 2000 • “I love you” 2003 • “Slammer”

  32. Viral trends in 2013 • The antivirus is not enough • Social engineering • Sales of fake anti-virus programs • Applications in social networks • The infected sites hides behind proxy servers • The number of viruses for Mac and smartphones will increase • More spam

More Related