Internet Security Jeff Von Hendy

458 views
374 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
458
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
5
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Internet Security Jeff Von Hendy

  1. 1. Internet Security Jeff Von Hendy
  2. 2. Spyware <ul><li>Software that performs certain (annoying) behaviors such as: advertising, collecting personal data, or changing the configuration of your computer. Often these things happen without your consent. </li></ul><ul><li>How to tell you may have spyware: </li></ul><ul><ul><li>“ pop-ups” even when you are not browsing the internet </li></ul></ul><ul><ul><li>Homepage on your browser has been changed, but not by you. </li></ul></ul><ul><ul><li>There is a new toolbar in your web browser that is difficult to remove. </li></ul></ul><ul><ul><li>Computer takes longer than usual to perform normal tasks </li></ul></ul><ul><ul><li>Sudden rise in computer crashes. </li></ul></ul>
  3. 3. E-Commerce Attacks <ul><li>As of September 2004, 16% of all attacks on the internet were directed at E-commerce sites. </li></ul><ul><ul><li>The Symantec Security Response division states that E-commerce sites are among the easiest places to steal credit card information. </li></ul></ul><ul><ul><li>Prior to September ’04, banks and brokerages were the ones most targeted. </li></ul></ul><ul><li>The number of computers infected by “robot code” in the last 6 months of 2003 was about 2000. In the following 6 months that number rose to over 30,000 </li></ul><ul><li>The number of disclosed software vulnerabilities for the first half of 2004 was 1,237. </li></ul><ul><ul><li>On average it takes hackers 5.8 days from when they’re announced to figure out how to exploit software vulnerabilities. </li></ul></ul>
  4. 4. Vulnerabilities <ul><li>Google being the powerful search engine has become a vital hacker tool with it’s ability to find many things they can gain a foothold on in a server such as: </li></ul><ul><ul><li>Files containing passwords. </li></ul></ul><ul><ul><li>Online devices such as printers and webcams . </li></ul></ul><ul><ul><li>Vulnerable Files / Servers . </li></ul></ul><ul><ul><li>Online shopping information </li></ul></ul>
  5. 5. What is a Firewall? <ul><li>A “guard” between a network/computer and the internet. </li></ul><ul><li>Looks at packets of data as they enter from the internet and leave the network/computer </li></ul><ul><li>Checks data in packets against defined policy tables. </li></ul><ul><li>Can be set up to look at the source or destination of the packet, or to examine the contents of the packet. </li></ul>
  6. 6. What a firewall protects against <ul><li>Remote Login – A person may connect to your computer and control it. This may range from view/access to running programs </li></ul><ul><li>Application Backdoors – Some programs allow remote access, others may have backdoors or hidden accesses which allow some level of control over the program. </li></ul><ul><li>SMTP Hijacking – A person may send spam by redirecting e-mail through the SMTP server of an unsuspecting host. </li></ul>
  7. 7. What a firewall protects against (cont’d) <ul><li>Operating System Bugs – Some have backdoors, others have insufficient security controls. Others may have bugs that hackers may exploit. </li></ul><ul><li>Denial of Service – A computer sends a request to connect to a server. The server sends the acknowledgement back and tries to connect, but cannot find the computer. By sending hundreds or thousands of these requests, a hacker may slow down and even crash a server. These are nearly impossible to counter. </li></ul>
  8. 8. What a firewall protects against (cont’d) <ul><li>E-Mail Bombs – The same e-mail is sent hundreds of times until the e-mail system cannot accept any more messages. </li></ul><ul><li>Redirect Bombs – Hackers use ICMP to change the path information takes to a computer by sending it through a different router. This is a way that D.O.S. attacks are set up. </li></ul><ul><li>Source Routing – The packets sent out have the route they are going to take recorded inside. Hackers can falsify the information to appear that a packet is coming from a trusted source. They may even make it appear that the packet is coming from inside the network. </li></ul>
  9. 9. Firewalls for personal use <ul><li>Free Firewalls: </li></ul><ul><ul><li>Zone Alarm </li></ul></ul><ul><ul><li>Outpost </li></ul></ul><ul><ul><li>Kerio Personal Firewall </li></ul></ul><ul><ul><li>Sygate </li></ul></ul><ul><ul><li>Netveda Saftey.Net </li></ul></ul><ul><ul><li>Premedius Lite </li></ul></ul><ul><ul><li>SecurePoint </li></ul></ul><ul><ul><li>SoftPerfect </li></ul></ul><ul><li>Other Firewalls: </li></ul><ul><ul><li>Norton Personal Firewall </li></ul></ul><ul><ul><li>BlackICE </li></ul></ul><ul><ul><li>McAfee Firewall </li></ul></ul><ul><ul><li>Panda Platinum </li></ul></ul><ul><ul><li>F-Secure </li></ul></ul><ul><ul><li>PC- cillin </li></ul></ul><ul><ul><li>Terminet </li></ul></ul><ul><ul><li>Trustix </li></ul></ul>
  10. 10. Bibliography <ul><li>What is a Firewall? </li></ul><ul><li>How Firewalls Work </li></ul><ul><li>Google Hacking </li></ul><ul><li>Firewall Guide </li></ul><ul><li>E-Commerce Attacks on the Rise </li></ul>

×