1 / 36

The Internet Security Dilemma Systems Vulnerabilities Cyber Attacks

The Internet Security Dilemma Systems Vulnerabilities Cyber Attacks. Kayla Spurlock David Wyatt.

collice
Download Presentation

The Internet Security Dilemma Systems Vulnerabilities Cyber Attacks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Internet Security Dilemma Systems VulnerabilitiesCyber Attacks Kayla Spurlock David Wyatt

  2. As the world and business become more dependent on the computer related communications, the security dilemma of the Internet will have to be addressed to protect businesses and personal information from identity theft.

  3. The Internet Security Dilemma Systems Vulnerabilities & Cyber Attacks Malware is malicious software of any unwanted code or program that invades your computer. • Malware is the generic term for all computer inflictions caused miscreants and thieves. 4 percent of websites are infected with some type of malware. • Virus, Worms, Spyware (adware), Browser Hijacker, Internet Dialer, Trojan Horse, Root Kit, Key Logger, Drive-By Download (DBD), Piggy Back, Combination.

  4. Viruses • Viruses are computer programs that are intended to have a negative impact on computers, computer networks, and now PDA’s and Cell phones. • They can be introduced via the Internet website portable stowage device (Flash drives, Floppies, CD’s, DVD’s Etc) • First worldwide virus was called The Brain that originated in 1986.

  5. … Viruses Continued • According to Symantec Security Software Manufacture the month of April saw 78 new viruses. • 90 percent of all viruses are still transmitted through E-mail.

  6. The Most Famous Viruses • 1986 The Brain • 1992 Michelangelo • 2000 Love Bug • 2003 Blaster

  7. Worms Worms are the most insidious of the viruses Can travel by themselves once introduced into the Internet. • They can reproduce or copy themselves. • Rinbot attacks are worms that use zombie tactics attacking the operating systems. • Worms also exploit the vulnerabilities of security software packages.

  8. Worms • Rinbot worms opens a back door in affected network and connects to the IRC (Internet Relay Chat) server, then the attackers can send commands to Internet chatters and steal personal information.

  9. Spyware Tracks your computing habits. Tracks websites visited, track your keystrokes and can be a transport for Trojan Horses and viruses. • Spyware can have implants that can do serious harm to your computer, or enable them to steal personal information • Marketers use Spyware known as Adware to help develop advertising schemes although not illegal, but is considered unethical. So much so that there are several bills addressing the use of Spyware.

  10. Spyware(Browser Hijackers) Re-directs your browsers to an alternate website. • Artificially increases clicks on a website to increase revenue purposes. • Increases cost that a particular advertiser will have to pay, sometimes costing million of dollars in phony clicks. “Click Inflation” • Can be downloaded from E-mail attachments and other free downloads.

  11. Internet Dialer Maliciously captures the Internet Users phone number. • Abusing long distance telephone service via the captured phone numbers. • Use phone number to gain access to personal information.

  12. Trojan Horse • Trojan horses are disguised as a legitimate program that carries a destructive virus that can steal, destroy, and allow remote access to your personal files and information. (Trojan horses can not reproduce themselves.)

  13. Root Kit • Root Kit can disable “Firewalls and Anti-Virus” programs making the system vulnerable. • They can also install malicious code attacking the operating systems. • 2007 should see a rise in root kit attacks against 32 bit processors. • The Microsoft Vista patch should guard against Kernel root kit.

  14. Keylogger • Keylogger are used in the businesses to steal information for their competitors. • They can be used in conjunction with other Malware to attack Firewalls to assist in stealing business secrets. • Keylogger have been used by Law Enforcement. • Parents utilize them to monitor children Internet activity.

  15. Drive-By Download (DBD) • DBD attached themselves just from normal web surfing patterns or behavior without opening email attachments or downloading free software.

  16. Piggyback • Malware embeds itself in harmless files.

  17. Combination (Trojan Horse, Worm, and Viruses) • The most destructive of all is a combination of Trojan horse, Worm, and Virus. They can replicate themselves, and spread rapidly across the Internet, spread via portable storage devices.

  18. Scams Stock Scams (Pump and Dump) • The scammers buy a large amount of a targeted stock that is low in price that is not doing to good or bad. They then flood emails pushing the stock to drive the price up. (This pump stage)

  19. Scams Stock scams (Pump and Dump) Continued • The scammers continue to pump up the stock until it reaches their set selling price. They sell the stock immediately at their selling price. (The Dump stage) • The scammers do not send out an email stating they are dumping the stock. So the email investors are stuck with the stock that could turn out to be a significant loss.

  20. Scams Phishing: • The scammers send out an email claiming to be a reputable business or financial institution. • The email request for the victim to send personal information to the designated website or return email.

  21. Scams Phishing continued • The scammers set up a fake storefront website. • They then poison the legitimate website that redirects the victim to fake website again to steal personal information.

  22. Scams Phishing Scam Continued • The scammers set up a fake storefront website. • They then poison the legitimate website that redirects the victim to fake website to steal their personal information.

  23. Recommendations and action you can take to protect your personal information and computer. • Utilize a security program • Have a sense about what website to visit and which to avoid • Think twice before you provide personal information over the Internet • Power down your computer when not in use • Work offline when possible

  24. Recommendations continued… • Ensure passwords are change often and follow password recommendation in our book • Do not open suspicious emails • Run Virus/Spyware scans weekly • Only make online purchases from reputable websites • Ensure credit card offers security against ID theft

  25. The Business Guide to Better Security • Define a Security Perimeter • Create a List of Threats • Check the History of Security • Prioritize Assets and Vulnerabilities • Network Access Controls • Create Backups • Email Filtering • Prevent Physical Intrusions

  26. Define a Security Perimeter • Should include those assets that control the security of the company. • The more specific your are, the easier it will be to identify specific threats facing those assets.

  27. Four Basic Perimeter Approaches • Network Based System -operate at the packet level -unable able to detect at the application layer • Proxy -application server between the end-user and the server being reached -understands HTTP Protocol • List-Based Systems -acceptable use policy (AUP) enforcement classifies URLs • Signature-Based Systems -create digital fingerprint of the bit patterns that are linked to malicious code -slow reaction time (days to weeks)

  28. Create a List of Threats • Computer and Network Passwords • Physical Assets • Data Backups • Recording of Data Access • Accessibility of Client and Employee Lists • Emails • Internal Threats

  29. Checking Security History • Understanding past security threats will help you better understand a companies vulnerabilities. • Work with your competitors and exchange information about how to better protect your industry as a whole.

  30. Network Access Controls • Intrusion Prevention • Password Protection • Identity and Access Management • Limit Employee Access

  31. Prioritize Threats and Vulnerabilities • How much damage could a particular threat cause? • How much would it cost to restore the security of the company?

  32. Security continued… • Create Backups • Email Filtering • Prevent Physical Intrusions

  33. Y2K and Daylight Savings Time Issues • Unless updated, the time zone settings for your computer system’s clock will be incorrect. Not such an inconvenience for at home users, but how will this affect your business?

  34. How business and those who do business with America could be affected • Calendar and Scheduling • Date/Time Calculations • Transaction Logging • Large manufacturing companies that use ERP and MRP systems • Any type of software systems that depend on sequencing transactions

  35. What are companies such as IBM and Microsoft doing to help? • Notifying clients and vendors • Developing software that will be available to protect software systems • DST Patches were released from SunMicrosystems Inc., Linux, IBM, and Microsoft. They say cost is generally absorbed in the operating system costs.

  36. Cyber-Terrorism • Website defacement-used for propaganda • Stealing money to finance terror • Identity theft • Information theft-military and government agencies • Economic damage

More Related