Foundation MIS - Guide to Computer Security

695
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
695
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
29
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Foundation MIS - Guide to Computer Security

  1. 1. Cal Poly Pomona Foundation Security Awareness Brown Bag Series Sponsored by Foundation MIS Beginners Guide to Computer Security
  2. 2. Beginners Guide to Computer Security Threats and Countermeasures
  3. 3. Objectives <ul><li>Provide an overview of the most </li></ul><ul><li>common threats and how to build </li></ul><ul><li>layered protection. </li></ul>Spam Security Tools Anti-Virus Software Security Policies Passwords Firewalls Encryption Summary Importance Of Security Threats to Data Viruses Trojan Horse Programs Vandals Attacks Data Interception Scams
  4. 4. Good News – Bad News <ul><li>Internet transforms and greatly improves our lives </li></ul><ul><li>Opened the door to an increasing number of security threats from which individuals, families and business must protect themselves </li></ul><ul><li>Consequences of attacks can range from the mildly inconvenient to the completely debilitating </li></ul><ul><ul><li>Important data can be lost </li></ul></ul><ul><ul><li>Privacy can be violated </li></ul></ul><ul><ul><li>Computer can even used by an outside attacker to attack other computers on </li></ul></ul><ul><ul><li>the Internet. </li></ul></ul>
  5. 5. Threats to Data <ul><li>Come from a very small minority </li></ul><ul><li>A car thief can steal only one car at a time </li></ul><ul><li>Single hacker working from a single computer can generate damage to a large number of computer networks </li></ul><ul><li>A general knowledge of security threats and how to protect yourself is essential </li></ul>
  6. 6. Viruses <ul><li>Most widely known security threat due to extensive press coverage. </li></ul><ul><li>What is a virus? </li></ul><ul><ul><li>Computer programs that are written by devious programmers and are designed to replicate themselves and infect computers when triggered by a specific event. </li></ul></ul><ul><ul><ul><li>Example - Macro viruses attach themselves to files that contain macro instructions (routines that can be repeated automatically, such as sending email) and are then activated every time the macro runs. </li></ul></ul></ul>
  7. 7. Effects <ul><li>Benign - cause annoying interruptions such as displaying a comical message when striking a certain letter on the keyboard </li></ul><ul><li>More destructive - cause such problems as deleting files from a hard drive or slowing down </li></ul><ul><li>a system </li></ul>
  8. 8. How to “catch” it <ul><li>A computer can be infected with a virus only if the virus enters through an outside source </li></ul><ul><ul><li>an attachment to an email </li></ul></ul><ul><ul><li>a file downloaded from the Internet. </li></ul></ul><ul><ul><li>When one computer on a network becomes infected, the other computers on the network – or for that matter other computers on the Internet – are highly susceptible to contracting the virus. </li></ul></ul>
  9. 9. Trojan Horse Programs <ul><li>Delivery vehicles for destructive computer code </li></ul><ul><li>Appear to be harmless or useful software programs, such as computer games, but are actually enemies in disguise </li></ul>
  10. 10. Trojan Horse Programs <ul><li>Can delete data, mail copies of themselves to e-mail address lists and open up computers to additional attacks </li></ul><ul><li>Can be contracted only by </li></ul><ul><ul><li>copying the Trojan horse program to a computer </li></ul></ul><ul><ul><li>downloading from the internet or </li></ul></ul><ul><ul><li>opening an email attachment </li></ul></ul>
  11. 11. Vandals <ul><li>Web sites have come alive through the development of such software applications as ActiveX and Java Applets </li></ul><ul><ul><li>enable animation and other special effects to run, making web sites more attractive and interactive </li></ul></ul>
  12. 12. Caution <ul><li>However, the ease with which these applications can be downloaded and run has provided a new vehicle for inflicting damage </li></ul><ul><li>Vandals can take on the form of a software application or applet that causes destruction of various degrees </li></ul><ul><li>A vandal can destroy a single file or a major portion of a computer system </li></ul>
  13. 13. Attacks <ul><li>Innumerable types of network attacks have been documented, and they are commonly classified in three general categories: </li></ul><ul><ul><li>reconnaissance attacks </li></ul></ul><ul><ul><li>access attacks, and </li></ul></ul><ul><ul><li>denial of service (DoS) attacks. </li></ul></ul>
  14. 14. Reconnaissance Attacks <ul><li>Reconnaissance - information gathering activities by which hackers collect data that is used to later compromise networks </li></ul><ul><li>Software tools, such as sniffers and scanners, are used to map out and exploit potential weaknesses in home computers, web servers and applications </li></ul><ul><ul><li>Example – password cracking software </li></ul></ul>
  15. 15. Access Attacks <ul><li>Access attacks are conducted to gain entry to e-mail accounts, databases and other confidential information </li></ul>
  16. 16. Dos Attacks <ul><li>DoS attacks prevent access to all or part of a computer system. </li></ul><ul><li>Usually achieved by sending large amounts of jumbled or other unmanageable data to a machine that is connected to the Internet, blocking legitimate traffic from getting through. </li></ul><ul><li>Even more malicious is a Distributed Denial of Service attack (DdoS) in which the attacker compromises multiple machines or hosts. </li></ul>
  17. 17. Data Interception <ul><li>The intercepting perpetrators might eavesdrop on communications or even alter the data packets being transmitted </li></ul><ul><li>Various methods to intercept data </li></ul><ul><ul><li>IP spoofing, for example, entails posing as an unauthorized party in the data transmission by using the internet protocol (IP) address of one of the data recipients </li></ul></ul>
  18. 18. Scams <ul><li>Stakes are higher as they've got easy access to millions of people on the internet </li></ul><ul><li>Email </li></ul><ul><ul><li>May contain a hyperlink to a web site that asks you for personal information, including your password </li></ul></ul><ul><ul><li>May contain a solicitation for your credit card information in the guise of a billing request </li></ul></ul>
  19. 19. Protect Yourself <ul><li>Never give out your password, billing information or other personal information to strangers online </li></ul><ul><li>Be mindful of who you're talking with before you give out personal information </li></ul>
  20. 20. Protect Yourself <ul><li>Don't click on hyperlinks or download attachments from people/web sites you don't know </li></ul><ul><li>Be skeptical of any company that doesn't clearly state its name, physical address and telephone numbe </li></ul><ul><li>Great Home Computer Security Webpage </li></ul><ul><li>http://www.cert.org/homeusers/HomeComputerSecurity/ </li></ul>
  21. 22. Spam <ul><li>Unsolicited e-mail or the action of broadcasting unsolicited advertising messages via e-mail </li></ul><ul><li>Takes up time and storage space on their computer </li></ul><ul><li>Report it to ISP. Check your ISP help areas to find out how to report spam </li></ul>
  22. 23. Security Tools <ul><li>First, understand the threats </li></ul><ul><li>Second, put proper safeguards in place </li></ul><ul><li>Extensive choice of technologies </li></ul><ul><ul><li>Anti-virus software packages </li></ul></ul><ul><ul><li>Firewalls for providing protection </li></ul></ul><ul><ul><li>Implement proper computer security without compromising the need for quick and easy access to information </li></ul></ul>
  23. 24. Anti-virus Software <ul><li>Relies on early warnings of new viruses, so that antidotes can be developed and distributed quickly </li></ul><ul><li>1,000’s of new viruses being generated every month </li></ul><ul><ul><li>Essential virus database be kept up to date </li></ul></ul><ul><ul><li>Record held by the anti-virus package that helps identify known viruses when they attempt to strike </li></ul></ul><ul><ul><li>Can prompt users to periodically collect new data </li></ul></ul>
  24. 25. Security Policies <ul><li>Rules and written or verbal regulations by which all staff, students and faculty operate </li></ul><ul><li>Often preempt security breaches </li></ul><ul><li>Customers or suppliers with access to certain parts of the network need to be adequately regulated </li></ul>
  25. 26. Passwords <ul><li>Simplest and most common way to ensure that only those that have permission can enter your computer or certain parts of your computer network </li></ul><ul><li>Virtually ineffective if people do not protect their passwords. </li></ul><ul><li>The golden rules, or policies for passwords are: </li></ul><ul><ul><li>Make passwords as meaningless as possible </li></ul></ul><ul><ul><li>Change passwords regularly </li></ul></ul><ul><ul><li>Never divulge passwords to anyone </li></ul></ul>
  26. 27. Firewalls <ul><li>A hardware or software solution to enforce security policies </li></ul><ul><li>Built-in filters that can disallow unauthorized or potentially dangerous material from entering the system </li></ul><ul><li>Logs attempted intrusions </li></ul>
  27. 28. Firewall Basics What They Do and How They Work
  28. 29. What Does a Firewall Do? <ul><li>In general, firewalls try to keep people from remotely accessing your computer in bad ways when you are connected to the internet </li></ul>
  29. 30. How Do Firewalls Work? <ul><li>Most firewalls are designed to allow or block specific types of data going to and from your computer to the internet </li></ul><ul><li>Allow &quot;good&quot; data traffic and block all &quot;bad&quot; data traffic </li></ul>
  30. 31. How Do Firewalls Work? <ul><li>&quot;Good&quot; traffic is the kind you need to do things like: surf the web, download files, chat, share files, etc </li></ul><ul><li>&quot;Bad&quot; traffic is what hackers might do like: steal files on your computer, use a Trojan to control your computer, disrupt your connection or network, etc </li></ul>
  31. 32. <ul><li>Doors (ports) are points where a person (hacker) can get in </li></ul><ul><li>Think of a firewall as a security guard who is watching each door and who is going in and out of the doors </li></ul>Computer – a House With Many Doors
  32. 33. <ul><li>The firewall makes sure only the right doors get opened and that only the right people (data) have access to your house </li></ul><ul><li>Some firewalls can also hide your house (computer) so casual hackers can't see it (also called &quot;stealth mode“) </li></ul>Computer – a House With Many Doors
  33. 34. What Traffic Is Good/What's Bad? <ul><li>Experience </li></ul><ul><li>Reading </li></ul><ul><li>Learning </li></ul><ul><li>The easiest way is to start with a simple firewall program, see how it works and then graduate to more sophisticated solutions as you gain knowledge </li></ul>
  34. 35. Do Firewalls Prevent Viruses and Trojans? <ul><li>NO!! A firewall can only prevent a virus or Trojan from accessing the internet while on your machine </li></ul><ul><li>95% of all viruses and trojans are received via e-mail, through file sharing (like Kazaa or Gnucleus) or through direct download of a malicious program </li></ul><ul><li>Firewalls can't prevent this -- only a good anti-virus software program can </li></ul>
  35. 36. <ul><li>However, once installed on your PC, many viruses and trojans &quot;call home&quot; using the internet to the hacker that designed it </li></ul><ul><li>This lets the hacker activate the trojan and he/she can now use your PC for his/her own purposes </li></ul><ul><li>A firewall can block the call home and can alert you if there is suspicious behavior taking place on your system </li></ul>Do Firewalls Prevent Viruses and Trojans?
  36. 37. What Is &quot;Stealth&quot; Mode? <ul><li>In theory, stealth mode hides all the ports on your computer from being visible to others on the internet. </li></ul><ul><ul><li>Some think this makes them less vulnerable to a malicious attack and consider it the &quot;holy grail&quot; of firewall configurations. </li></ul></ul><ul><li>While true that your ports are &quot;invisible&quot;, a &quot;stealthed&quot; computer really looks like a black hole to a hacker. </li></ul><ul><ul><li>Data goes in but it never comes out. </li></ul></ul>
  37. 38. Stealth Mode <ul><li>A good hacker can spot this behavior - may actually consider it a challenge to try to break in as he/she wonders what's there </li></ul><ul><ul><li>Sometimes, staying in plain sight makes you less attractive as a target </li></ul></ul><ul><li>Achieving &quot;stealth&quot; mode with some network configurations (such as Microsoft internet connection sharing or ICS) can be very difficult </li></ul><ul><li>Stealth mode can make it difficult for the networked computers to &quot;see&quot; and interact with the gateway computer </li></ul>
  38. 39. <ul><li>Computers don't stay &quot;stealthed&quot;. The moment you do something that accesses the internet from your end, you're &quot;unstealthed&quot; because data is coming out </li></ul><ul><li>Any hacker with a packet sniffer who knows where to look can tell that something's there </li></ul>
  39. 40. Encryption <ul><li>Ensures that messages cannot be intercepted/read by anyone other than the authorized recipient </li></ul><ul><li>Deployed to protect data transported over a public network (internet) </li></ul><ul><li>Uses advance mathematical algorithms to ‘scramble’ messages and their attachments </li></ul>
  40. 41. Encryption <ul><li>Provides the security necessary to sustain the increasingly popular virtual private network (VPN) technology </li></ul><ul><ul><li>VPNs are private connections, or tunnels, over public networks </li></ul></ul><ul><ul><li>Deployed to protect telecommuters, mobile workers, branch offices and business partners to corporate networks or each other </li></ul></ul>
  41. 42. Summary <ul><li>Common sense, some simple rules and a few pieces of technology can help protect your computer systems from unauthorized use </li></ul><ul><li>Important to remember that by protecting your own computer system, you're also doing your part to protect computers throughout the university </li></ul>
  42. 43. Resources at Cal Poly Pomona University <ul><li>Foundation MIS </li></ul><ul><li>http://www.foundation.csupomona.edu/financial </li></ul><ul><li>Policies, procedures and guidelines </li></ul><ul><li>http://foundation.csupomona.edu/hr/hrpolicies.aspx </li></ul><ul><li>University I&IT </li></ul><ul><li>http:// www.csupomona.edu/~ehelp </li></ul>

×