2. Protection
• How to protect your data/communication?
– Know your enemy
– Familiarity with security threats
3. Who is responsible?.
• Computer Criminals (Attackers)
• Elite hackers (“black hat”)
• Malicious software (i.e., viruses) writers and releasers
• Script kiddies: Use of pre-written attack scripts - kiddie scripts)
• Criminals are growing rapidly (Ransom, Credit card/identity theft, stealing
trade secrets, Intellectual Property)
• Cyberterrorism and Cyberwar (Infrastructure destruction – seaports, airports
etc.)
4. Which are the popular Threats?
• Malicious Software: Worm
• Sophisticated program such as a virus
• Replicate automatically and send themselves to other computers by first
taking control of certain software programs on your PC, such as email.
Email List:
Alice@gmail.com
Bob@yahoo.com
Nick@city.ac.uk
5. Which are the popular Threats?
• Malicious Software: Trojan Horse
• Malware logic executes upon certain conditions. Program is often used for
legitimate reasons.
• Software which malfunctions, if maintenance fee is not paid
6. Which are the popular Threats?
• Malicious Software: Logic Bomb
• Masquerades as beneficial program while quietly destroying data or
damaging your system.
• Download a game: Might be fun but has hidden part that emails your password file
without you knowing.
7. Which are the popular Threats?
• Malicious Software: Loggers (Key, Mouse)
– Software or hardware which monitors your computer keys and/or mouse actions (i.e. Flame)
• How does it work?
– You visit a web site
– You accept to install a malware without realizing it, i.e., pressing OK to a pop-up window
– It stays resident in memory and
monitors your keyboard and mouse
movements
– Takes snapshots and send them to
the attacker
8. How to Recover and Prevent Leading Threats?
• In order to recover/prevent virus/attacks
• Avoid potentially unreliable websites/emails
• Be suspicious when you receive an email with attachment
• Double check emails with the sender
• System Restore
• Re-install operating system
• Use of Anti-virus / anti-malware software
• Avast,
• Norton,
• Mcafee
• etc