Internet Annoyances

702 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
702
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
13
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • As the Internet has grown, so have the annoying things on it. Some of these are dangerous and some merely annoying. Like heavy traffic on the roads, air pollution, gossip, or any number of annoyances in life, the Internet reflects the public who uses it, with its share of things to add stress to a user’s life. The next few slides will discuss each of these annoyances in more details
  • Spam is a particularly difficult problem because there is little that can be done to control the people who send it. All one needs is a list and a message. Lists with millions of e-mail addresses can be purchased. There have been laws passed to make sending spam illegal, but they are difficult to enforce. One way to avoid spam in your primary account is to create a special e-mail address that you use when you fill out forms on the Web. A spam filter is an option you can select in your e-mail account that places known spam messages into a folder other than your inbox . 95% of spam can be filtered, never reaching your inbox. You should are careful by reading privacy practices carefully before registering your name on Web sites, by not replying to spam, and reporting spam to agencies that filter and fight spam.
  • Cookies are a necessary annoyance because they enhance the web experience and speed up web page loading. When you go to a web page for the first time the web document drops a small text file in a folder. This text file saves information about the user and assigns an identification code so that when the user returns, the same preferences are loaded and the web site may be more geared to the user. This is critical on sites where the content is somewhat chosen to meet the user’s wishes, like in My Yahoo or other personalized sites. Although cookies are generally not privacy risks, there have been cases where the information has been collected and sold to advertisers.
  • Pop-up windows are the billboards of the Internet. Some sites use pop-ups to increase the functionality of their site (your account balance may pop up at your bank’s Web site, for example). There are ways to reduce or eliminate pop-ups. Firefox and Safari have built-in pop-up blockers. Windows XP (Service Pack 2) includes a Pop-up Manager to Internet Explorer that allows you to selectively block pop-ups. If you feel you need more protection, you can install anti-pop-up software such as Pop-Up Stopper and Pop-Up Defender.
  • Dumpster diving, credit card skimming
  • Set it to update automatically every time you use your computer Scan the whole disk regularly
  • Starts up many process that consume system resources Program is executing in main memory, so need to shut down host And disconnect from network
  • At UofC, first noticed at 7:30 am By 11:30 am had been identified and fixes available All IT labs affected Servers had to be reloaded to correct all damaged files and add security patches 16.5 people weeks Labs down from 1-3 days
  • NDP voting for leader
  • Internet Annoyances

    1. 1. Online Annoyances <ul><li>Spam – electronic junk mail </li></ul><ul><li>Pop-ups – intrusive advertising </li></ul><ul><li>Cookies – tracking user’s browsing habits </li></ul><ul><li>Phishing and Hoaxes – Ruses to fool and maybe steal from users. </li></ul><ul><li>Spyware – Programs that collect data from a user’s computer </li></ul>
    2. 2. Spam <ul><li>Junk E-Mail </li></ul><ul><li>Spam filters </li></ul><ul><li>Anti-spam practices </li></ul>
    3. 3. Cookies <ul><li>Text files stored on client computers when visiting Web sites </li></ul><ul><li>Used on return visits to Web sites </li></ul><ul><li>Unique ID number </li></ul><ul><li>Personal information remembered </li></ul>
    4. 4. Pop-ups <ul><li>Usually advertising </li></ul><ul><li>Pop-up automatically </li></ul><ul><li>Browser can block </li></ul>Buy Now!
    5. 5. Identity Theft <ul><li>Thieves collect personal information </li></ul><ul><ul><li>Credit card </li></ul></ul><ul><ul><li>Drivers license </li></ul></ul><ul><ul><li>SIN, Passport </li></ul></ul><ul><li>Then use to </li></ul><ul><ul><li>Access government services </li></ul></ul><ul><ul><li>Buy things </li></ul></ul>
    6. 6. Identity Theft <ul><li>Don’t need a computer </li></ul><ul><ul><li>Dumpster diving </li></ul></ul><ul><ul><li>Credit card skimming </li></ul></ul><ul><ul><li>ATM front-end </li></ul></ul><ul><ul><li>People give away information </li></ul></ul>
    7. 7. Phishing <ul><li>Phishing is a phony communication </li></ul><ul><li>Attempts to scam someone into sending vital information </li></ul><ul><li>Email message impersonates </li></ul><ul><ul><li>Banks </li></ul></ul><ul><ul><li>Accounts: eBay, PayPal, … </li></ul></ul>
    8. 8. Phishing
    9. 9. <ul><li>Don’t respond to these emails </li></ul>
    10. 10. Spyware <ul><li>(Adware) </li></ul><ul><ul><li>Secretly sends data about our web surfing to a spy </li></ul></ul><ul><ul><li>Spy sells data to advertisers </li></ul></ul>
    11. 11. Spyware Threats <ul><li>Software is unknowingly downloaded with free software, music (Kazaa), screen savers, games, … </li></ul><ul><li>Sponsered results on search engines </li></ul>
    12. 12. New Twist
    13. 13. SONY Source: Calgary Herald
    14. 14. Protection from Spyware <ul><li>Don’t </li></ul><ul><ul><li>download free stuff </li></ul></ul><ul><ul><li>enter online contests </li></ul></ul><ul><li>Do </li></ul><ul><ul><li>use antispyware software </li></ul></ul><ul><ul><li>UofC IT Antispyware Page </li></ul></ul>
    15. 15. Spyware <ul><li>Consumer Reports Ratings </li></ul><ul><ul><li>Webroot (US$25) </li></ul></ul><ul><ul><li>PC Tools (US$30) </li></ul></ul><ul><ul><li>Spybot (free) </li></ul></ul>
    16. 16. Canadian Response <ul><li>Spam, Phishing and Spyware </li></ul><ul><ul><li>Stop Spam Here </li></ul></ul><ul><li>The Digital Economy in Canada </li></ul><ul><li>Anti-Fraud </li></ul><ul><ul><li>Phonebusters (Canadian Anti-Fraud Call Centre) </li></ul></ul>
    17. 18. Software Sabotage <ul><li>Risks </li></ul><ul><ul><li>Virus </li></ul></ul><ul><ul><li>Worm </li></ul></ul><ul><ul><li>Trojan horse </li></ul></ul><ul><ul><li>Spyware </li></ul></ul><ul><ul><li>DOS Attacks </li></ul></ul><ul><li>Protection </li></ul>
    18. 19. Virus <ul><li>Program code that attaches itself to a program </li></ul><ul><ul><li>Operating system or application program </li></ul></ul><ul><li>When program executes the virus code copies itself to other programs </li></ul><ul><li>Can destroy data </li></ul>
    19. 21. Virus <ul><li>Macro virus </li></ul><ul><ul><li>Attach to documents </li></ul></ul><ul><li>Email virus </li></ul><ul><ul><li>Attachments </li></ul></ul>
    20. 22. Vaccines <ul><li>Antivirus software </li></ul><ul><ul><li>Search for known viruses </li></ul></ul><ul><ul><li>Identify them </li></ul></ul><ul><ul><li>Remove them </li></ul></ul>
    21. 23. Use Anti-virus Software <ul><ul><li>Install and update anti-virus software </li></ul></ul><ul><ul><ul><li>UofC IT anti-virus web page </li></ul></ul></ul><ul><ul><ul><li>Free software: McAffee </li></ul></ul></ul><ul><ul><li>ISP might provide free </li></ul></ul><ul><ul><li>Otherwise buy it (McAffee, Norton, …) </li></ul></ul>
    22. 24. Email Virus Detection <ul><li>ISP mail server (UofC IT and CPSC) </li></ul><ul><ul><li>Scans incoming and outgoing messages, notifies user if finds virus (strips attachments), and quarantines the message </li></ul></ul><ul><ul><li>User can recover message from quarantine </li></ul></ul><ul><li>If you suspect: don’t open the attachment </li></ul><ul><ul><li>Delete the message </li></ul></ul><ul><ul><li>Scan in email program, or save to disk and then scan with virus detection software </li></ul></ul>
    23. 25. Sober Source: Calgary Herald
    24. 26. Email Virus Detection From: [email_address] Subject: WARNING - VIRUS (Worm.Sober.U) IN MAIL TO YOU Date: November 25, 2005 10:20:55 AM MST (CA) My email
    25. 27. *** VIRUS ALERT *** Dear user, This is an automatically generated message from the University of Calgary, Department of Computer Science (CPSC). The CPSC email system has detected a piece of email with a virus called: Worm.Sober.U in an email addressed to you from: <postman@hotmail.com> The Subject of this email was: Mail delivery failed Delivery of the original email has been stopped. A copy of the message has been placed under quarantine. Please visit the CPSC Maia Mailguard system located: http://imgw1.cpsc.ucalgary.ca/mail to view your quarantined messages. You will be required to log into this system using your CPSC Email address and your CPSC Login Password. For your reference, here are some selected headers from the email: ------------------------------------------------------------------ Date: Fri, 25 Nov 2005 10:20:55 -0700 (MST) From: ?@S010600112f1f983b.cg.shawcable.net (Empty if virus is known to forge sender address) To: Subject: Mail delivery failed Received: dpwtlcd.com (S010600112f1f983b.cg.shawcable.net [68.147.104.66])
    26. 28. Worm <ul><li>Program that travels independently over computer networks, seeking uninfected sites </li></ul><ul><li>Replicates and starts up thousands of processes </li></ul><ul><li>Overloads a system </li></ul>
    27. 29. The Cost of Worms <ul><li>Nimba, Sept. 18, 2001 </li></ul><ul><li>In 24 h infected 2.2 million computers </li></ul><ul><li>Microsoft Windows </li></ul><ul><li>Huge traffic disabled web and email servers </li></ul><ul><li>Damaged system files </li></ul>
    28. 30. Trojan Horse <ul><li>Program that performs a useful task while also being secretly destructive </li></ul><ul><li>A logic bomb responds to a particular event </li></ul><ul><li>Cannot replicate </li></ul><ul><li>E.G. Logon Trojan horse </li></ul>
    29. 31. Denial of Service Attacks <ul><li>Web servers are sent millions of bogus requests </li></ul><ul><li>Overloads the system </li></ul><ul><li>Consequently they shut down </li></ul><ul><li>Service is denied legitimate users </li></ul>
    30. 32. Protection from Viruses and Security Risks <ul><li>Use anti-virus software </li></ul><ul><ul><li>Update frequently </li></ul></ul><ul><li>Use anti-spyware software </li></ul><ul><li>Update your operating system </li></ul><ul><ul><li>Automatic updates and security patches </li></ul></ul><ul><ul><li>Microsoft </li></ul></ul><ul><ul><li>Macintosh </li></ul></ul>

    ×