1 / 16

Security

Security. WeeSan Lee weesan@cs.ucr.edu. Roadmap. Security Risks Preventions References. Security Risks. Computer Virus Worm Trojan Horse Adware Spyware Browser Hijacker Web Bug Email Hoaxes & Chain Letters Phishing. Security Risks - Computer Virus.

henryneal
Download Presentation

Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security WeeSan Lee weesan@cs.ucr.edu

  2. Roadmap • Security Risks • Preventions • References

  3. Security Risks • Computer Virus • Worm • Trojan Horse • Adware • Spyware • Browser Hijacker • Web Bug • Email Hoaxes & Chain Letters • Phishing

  4. Security Risks - Computer Virus • A small computer program that infects your computer without permission or knowledge of the user • Infects others via a host media • Floppy disk • Email • … http://www.healthinitiative.org/IMAGES/virus_big.jpg

  5. Security Risks - Worm • A self-replicating program, spreads across the Internet • May contain viruses • 1st worm was created by Robert T. Morris, a graduate student at Cornell U. in 1988 • Computer Emergency Response Team (CERT) was created as a result http://tbn0.google.com/images?q=tbn:FuQHZgw5DccTfM:http://co.marion.or.us/NR/rdonlyres/481BF728-146C-49E6-8C61-3D79ADD691F2/5465/worm.JPG

  6. A program that disguises itself to be something useful or harmless Eg. screensaver In fact, a backdoor program which allows unauthorized access remotely Security Risks - Trojan Horse http://en.wikipedia.org/wiki/Image:Trojan_horse_%C3%87anakkale.jpg

  7. Security Risks - Adware • An advertising-supported software

  8. Security Risks - Spyware • Adware + collecting user’s information without the user’s consent

  9. Security Risks - Browser Hijacker • A program that changes the settings on the web browser • Change the homepage to other website

  10. Security Risks - Web Bug • Originally, use 1x1 image embedded in web pages or HTML emails to keep track of users • AKA web beacon, tracking bug, … • To avoid that: • Turn off image loading on email clients • Use text-based email such as pine  http://www.prospexis.net/images/beatle2.gif

  11. Security Risks - Hoaxes and Chain Letters • Hoaxes are fake warnings, instructing you to delete files, playing on your sympathy, etc • Chain letters implore you to pass the message to as many people as possible • For examples • “This is not a hoax.” • “Forward this email to 10 people you know for good luck …” • “VIRUS! DELETE NTFS.SYS”

  12. Security Risks - Phishing

  13. Security Risks - Phishing

  14. Preventions • Use anti-virus/firewall software • For examples • AVG (http://free.grisoft.com/) • Nod32 (http://www.eset.com/) • Norton Antivirus (http://www.symantec.com/) • Schedule auto-update

  15. Preventions (cont) • Backup • Use 2 HDs • Burn CDs/DVDs and give them to your mom • Use online backup services • http://www.carbonite.com/ • Be educated • Don’t “fool” around

  16. References • Internet Effectively • Ch 1 • Ch 4 • Wikipedia • http://www.wikipedia.com/

More Related