780 likes | 1k Views
Chapter 2. Computer Security Basics. McGraw-Hill. Learning Objectives. Describe security threats and vulnerabilities to desktop PCs and users Identify methods for protecting against security threats. Troubleshoot common security problems. Threats to Computers and Users.
E N D
Chapter 2 Computer Security Basics McGraw-Hill
Learning Objectives • Describe security threats and vulnerabilitiesto desktop PCs and users • Identify methods for protecting against security threats. • Troubleshoot common security problems
Threats to Computers and Users • Malware (Malicious Software) • Vectors: the mode of malware infection. • E-mail Vectors • Code on Web sites • Trojan horse • Searching for unprotected computers • Sneakernet–the oldest vector
Trojan horse image Image: Carol and Mike Werner/Alamy
Threats to Computers and Users • Malware (cont.) • Vectors: the mode of malware infection (cont.) • Back doors (ex, Code Red worm then Nimda worm) • Rootkits • Pop-up downloads • Drive-by downloads • War driving • https://www.youtube.com/watch?v=_dYnXpacdtA • Bluesnarfing
Threats to Computers and Users • Malware (cont.) • Stealing Passwords • Through Web sites • Using password crackers • Using keystroke loggers Hardware keystroke logger Product photo courtesy of www.keycobra.com
Threats to Computers and Users • Malware (cont.) • Virus • A program installed and activated without the knowledge or permission of the user • Mischief or damaging results
Threats to Computers and Users • Malware (cont.) • Worm • A virus that self-replicates • Travels between computer via many vectors • Netsky and MyDoom worms generated disabling amounts of network traffic
Threats to Computers and Users • Malware (cont.) • Botnets and Zombies • A botnet is a group of networked computers that Infected with programs that forward information to other computers • Bot (short for robot) program acts as an agent. Can be used for good or evil • A zombie is a computer working mindlessly as part of the botnet
Threats to Computers and Users • Malware (cont.) • Spyware • Gathers information and sends to the people who requested it. • Used to track surfing or buying patterns • Used for industrial espionage • Law enforcement uses spyware to track criminals • Governments use it to investigate terrorism
Threats to Computers and Users • Malware (cont.) • Adware • Collects information about a user to display targeted advertisements • Display ads in pop-ups or banners • Clicking inside a banner or pop-up may trigger a pop-up download that installs a virus or worm
Threats to Computers and Users • Malware (cont.) • Web Browser Hijacking • Home page points to a site the user did not select • Remedy by changing the default page in browser settings
Threats to Computers and Users • Malware (cont.) • Spam and Spim • Spam: unsolicited e-mail • May be from legitimate or illegitimate source • May involve a scam • Perpetrators are called spammers • Spim: Spam over Instant Messaging • Bots (spimbots) collect instant messaging screen names • Spim message may contain links to product Web sites • Perpetrators are called spimmers
Threats to Computers and Users • Social Engineering • Phishing • Fraudulent method of obtaining personal financial information through the use of messages that appear to be from legitimate organizations • Hoaxes • Take many forms • Example: E-mail seemingly from friend in trouble • Example: E-mail seemingly from Microsoft with a link to a fix
Hoaxes take many forms Image: HenrikKettunen/Alamy
Threats to Computers and Users • Social Engineering (cont.) • Enticements to open attachments • Fraud: The use of deceit and trickery to obtain money or other valuables
Threats to Computers and Users • Identify Theft • Personal information stolen to commit fraud • A social security number and other key personal information is enough to steal someone’s identity • Exposure to Inappropriate or Distasteful Content • Invasion of Privacy
Invasion of privacy Image: Troy Aossey/Digital Vision/Getting Images
Threats to Computers and Users • Misuse of Cookies • Cookies may contain • User preferences from visiting a site • Information entered into a form at a Web site • Browsing activity • Shopping selections on a Web site • Cookies can be a convenience • Look for privacy statement • Banner ad creators use cookies to track surfing habits
Threats to Computers and Users • Computer Hardware Theft • Keeping Track of New Threats • Federal Trade Commission (FTC) Bureau of Consumer Protection (www.ftc.gov/bcp) • The People Behind the Threats • Hackers • Crackers • Script Kiddies • Click Kiddies • Packet Monkeys
Guard against computer theft Image: Image Source/Getty Images
Computer accidents Image: R and R Images/Photographer’s Choice/Getty Images
Organized crime Image: Digital Vision/Getty Images
Hacker Image: Comstock/Getty Images
Defense Against Threats • Education • Some signs to look for are: • Strange screen messages • Sudden computer slowdown • Missing data • Inability to access the hard drive Image: artpartner-images.com/Alamyh
Defense Against Threats • Education (cont.) • Non-computer activity of concern • Unexplained charges on credit accounts • Calls from creditors about overdue payments on accounts you never opened • A turndown when applying for new credit for reasons you know are not true • A credit bureau report of existing credit accounts you never opened
Defense Against Threats • Security Policies • Define data sensitivity and data security practices • Exist in both document form and software form • Administrators configure computer security to enforce written policy • Password policy should require strong passwords and state complexity requirement that are enforced on computers
Defense Against Threats • Install Comprehensive Security Software • Firewalls • Network-based Firewalls • Technology used in firewalls • IP packet filter • Proxy service • Encrypted authentication • Virtual private network (VPN) • Personal Firewalls • Come with most OSs • Come with third-party security software
Figure 2-5 This message can simply mean that you are using a third-party firewall, and Windows Firewall is disabled
Defense Against Threats • Install Comprehensive Security Software (cont.) • Anti-Spam • Antivirus • Pop-Up Blockers • Privacy Protection/Controlling Cookies • Parental Controls
Figure 2-6 Most spam filters have extensive configuration options
Figure 2-7 The Internet Explorer Pop-up Blocker Settings page
Figure 2-8 Use the top part of the privacy page in Internet Options to control the use of cookies
Defense Against Threats • Install Comprehensive Security Software (cont.) • Content Filtering • Block or allow certain sites • May be part of multifunction package • May be included in browser • Services on Internet give ratings to Web sites • Configure filter to allow or disallow unrated sites • Content Advisor in Internet Explorer • Keep Up-to-Date with security patches
Step-by-Step 2.01 Defense Against Threats Check Out the Content Advisor in Internet Explorer
Figure 2-10 Content Advisor page displays when you click the Enable button in Internet Options
Defense Against Threats • Authentication and Authorization • Authentication • Verification of who you are • One-factor: Something you know (user name and password) • Two-factor: Something you know and something you have (token) • Three-factor authentication: Two-factor plus biometric data (retinal scan, voice print, or fingerprint)
Defense Against Threats • Authentication and Authorization (cont.) • Authorization • Determines level of access • Includes both authentication and verification of access level • Permission is an action that a security account can perform on an object • User right is a systemwide action a security account can perform on a computer • Logging on • Installing device drivers
Defense Against Threats • Passwords • Password: a string of characters entered for authentication • Don’t take for granted • Do not use same password everywhere • Defense against threats • Use long and complex passwords • Do not use common words
Defense Against Threats • Security Account Basics • Security account assigned permissions and rights • User Accounts • Assigned to single person • Contains user name, password, and often more • Built-in user accounts • Administrator (Windows) • Root (Mac OS X and Linux • Guest (disabled by default • Account Types • Standard user • Administrator
Figure 2-11 An administrator account may create accounts of either type
Defense Against Threats • Security Account Basics (cont.) • Group Accounts • Contain one or more individual accounts • May contain other groups • Some built-in (Administrators, Users, Guests) • Some created when software is installed • Some created by Administrator