Information Security Awareness. The Problem of Network Security. The Internet allows an attacker to attack from anywhere in the world from their home desk. They just need to find one vulnerability: a security analyst need to close every vulnerability.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Some scripts are useful
to protect networks…
Hacker Bulletin Board
Crazyman broke into …
Know how to
Criminals:Create & sell bots -> spam
Sell credit card numbers,…
1 M Email addresses = $8
10,000 PCs = $1000
Independent program which replicates itself and sends copies from computer to computer across network connections. Upon arrival the worm may be activated to replicate.
Trojan Horse: Malware has malicious purpose in addition to functional purpose
The link provided in the e-mail leads to a fake webpage which collects all the important information and submits it to the owner.
Bots: Host illegal movies, music, pornography,
criminal web sites, …
Forward Spam for
Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access.
ABC Bank has
This is John, the System Admin. What is your password?
I have come to repair your machine…
What ethnicity are you? Your mother’s maiden name?
and have some software patches
Man in the middle attacks occur when an attacker pretends to be your final destination on the network. As in the figure, if a person is trying to connect to a specific web server, an attacker can mislead him to his computer, pretending to be that web server. MITM also result in spoofing.
In US, HIPAA protects:
Change to your browser homepage/start page
Ending up on a strange site when conducting a search
System-based firewall is turned off automatically
Lots of network activity while not particularly active
Excessive pop-up windows
New icons, programs, favorites which you didn’t add
Frequent firewall alerts about unknown programs trying to access the Internet
Bad/slow system performance
Antivirus software often catches viruses
Unusual messages or displays on your monitor
Unusual sounds or music played at random times
Your system has less available memory than it should
A disk or volume name has been changed
Programs or files are suddenly missing
Unknown programs or files have been created
Some of your files become corrupted or suddenly don't work properly
Trojan Horse symptoms
Your computer screen flips upside down or inverts
Documents or messages print on your printer by themselves
Your screen saver settings change by themselves
Your mouse pointer disappears
Your mouse moves by itself
Your Windows Start button disappears
Your computer shuts down and powers off by itself
A firewall, as the name suggests acts as a wall between your computer/private network and the internet. Hackers may use the internet to find, use, and install applications on your computer. A firewall prevents hacker connections from entering your computer.
Border Router: Packet Filter
Proxy server firewall
Right …. Up)
There are many freeware and paid options available in the market.
Off-site & Secure?
Essentials of Corporate Fraud, T L Coenen, 2008, John Wiley & Sons
Some fraud is discovered via multiple reporting methods,
Thus results do not sum to 100%
Tips come from Employee 64%, Anonymous 18%,
Customer 11%, Vendor 7%