SlideShare a Scribd company logo
Maze & Associates - www.MazeAssociates.com
Internet DangersInternet Dangers
The dangers of being on the InternetThe dangers of being on the Internet
Maze & Associates - www.MazeAssociates.com
The Internet
• If you have been on the
Internet for awhile you are
aware there are a lot of
dangers.
• The Internet really isn’t a
safe place.
Maze & Associates - www.MazeAssociates.com
Here are some of the threats out there:
• Fraud
• SPAM
• Spyware
• Viruses / Worms
• Hackers / Crackers
• Phishing Sites
• Scams
• Cyber-stalkers
• Child predators
• Incorrect information
• Performance robbers
• Unwanted pop-ups
• Virus Hoaxes
• Identity Theft
• Illegal software – music
• Adult Content Sites
Maze & Associates - www.MazeAssociates.com
Results
• Downtime
• Lost productivity
• Poor system performance
• Legal liability
• Identity Theft
• Monetary Losses
• Increased annoyances
• Physical harm
Maze & Associates - www.MazeAssociates.com
Part I: Malicious Code
• Viruses & Worms
• Spyware & Adware
Maze & Associates - www.MazeAssociates.com
Part I: Viruses & Worms
• Define Virus and Worm
• UC Berkeley Study on multi-platform code
• Low impact on performance Viruses
• New worms such as Cabir – Use bluetooth to
spread via cell phone.
Maze & Associates - www.MazeAssociates.com
Part I: Spyware & Adware
• There is a new threat out there, and we thought computer
viruses were all we had to worry about. Think again.
There is a new type of malicious software out there that at
best wants to track our browsing on the Internet so that
they can target SPAM and popup ads to the types of
pages we view. Spyware can also slow our computers
down to the point that they will not respond. Worst case
scenario Spyware can record every keystroke you make
and even steal your identity. All you have to do to get
this Spyware is browse a website, download free software
or install file sharing software.
Maze & Associates - www.MazeAssociates.com
Spyware Scanner Example
Maze & Associates - www.MazeAssociates.com
Results of Spyware
• Browser Hijacking
• Trojan Horses
• Tracking Cookies
• Pop-up installers
• Identity Theft
• Poor system performance
• More SPAM
• Keystroke loggers
Maze & Associates - www.MazeAssociates.com
Statistics
• 25 Computers Scanned
• 5 computer had no spyware
• 2157 Spyware signatures (20 Computers)
• Those with the most spyware were the slowest
• Higher the staff level the more spyware
• 106 unsupported & hazardous applications *
• 2 Really bad programs – A Trojan and File
Sharing
Maze & Associates - www.MazeAssociates.com
What can be done about Spyware?
• Don’t install it!
• Free programs often install Spyware
• Kazaa – Hotbar – Gator – WebShots – Screen Savers
• Call your IT department
• Scan computer regularly
• File a Complaint
• https://rn.ftc.gov/pls/dod/wsolcq$.startup?Z_ORG_CODE=PU01
Maze & Associates - www.MazeAssociates.com
Anti-Spyware Software
• Pest Patrol
• http://www.pestpatrol.com/
• Ad-aware
• http://www.lavasoftusa.com/
• Spybot Search & Destroy
• http://www.safer-networking.org/microsoft.en.html
• Panda Internet Security (Includes Anti-Virus, Firewall, Anti-SPAM, Web
content filtering)
• http://www.pandasoftware.com/home/default.asp
• WinPatrol
• http://www.winpatrol.com
• Aluria Software
• http://www.aluriasoftware.com/
• McAfee antispyware
• http://us.mcafee.com/root/package.asp?pkgid=182&cid=9904
Maze & Associates - www.MazeAssociates.com
Spyware Articles
• Microsoft Article: Spyware and Deceptive
Software
• http://www.microsoft.com/mscorp/twc/privacy/spyware.mspx
• infromIT Article: Spyware Explained
• http://www.informit.com/articles/article.asp?p=174140
Maze & Associates - www.MazeAssociates.com
Part II: SPAM
• Unsolicited Commercial Email
• Fills your inbox
• Losses Include
• Time / Productivity
• Systems Resources
• Bandwidth
• Legitimate e-mail suffers
• Downtime
Maze & Associates - www.MazeAssociates.com
How do “they” get my email address?
• Your email is posted on a public website
• Spyware collects your email address
• Free Internet services
• Email chain letters
• Opening SPAM
• Posting or visiting adult content websites
• Not opting out
• Guessing Email addresses
Maze & Associates - www.MazeAssociates.com
Email Forward
Maze & Associates - www.MazeAssociates.com
Picture in front of text
• After clicking on the preview all you see is a picture
• Usually selling something
Maze & Associates - www.MazeAssociates.com
SPAM Sources
Maze & Associates - www.MazeAssociates.com
What can be done about SPAM?
• SPAM Filters
• Avoid posting your email on public websites
• Use multiple email addresses
• Don’t open SPAM
• Don’t forward email jokes and chain letters
• Opt out
• Clean your system of spyware
• Don’t install suspect programs
• Forward to UCE@FTC.GOV
Maze & Associates - www.MazeAssociates.com
Part III: Phishing
• Fake sites that are setup to commit fraud or steal
your identity.
• Some are poorly done and others are hard to
notice.
• You have to look out for them
• If you are not sure – check with the company
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Examples
Phishing Site Example
• SSL dialog box – Phishing Site
• SSL dialog box – Normal Site (Yahoo.com)
• Status Bar Right Click – Phishing Site
• Certificate – Phishing Site
• Certificate – Normal Site (Yahoo.com)
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Maze & Associates - www.MazeAssociates.com
Anti-Phishing Work Group
• APWG
• http://www.antphishing.org
Maze & Associates - www.MazeAssociates.com
That is just the tip of the iceberg

More Related Content

What's hot

Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The Web
Donald McArthur
 
Email
EmailEmail
Email
cat509
 
Internet security
Internet securityInternet security
Internet security
Nishant Pahad
 
How to Revoke Google's Manual Penalty
How to Revoke Google's Manual PenaltyHow to Revoke Google's Manual Penalty
How to Revoke Google's Manual Penalty
ezmarketingtech
 
FULL MEANING OF HACKING
FULL MEANING OF HACKING FULL MEANING OF HACKING
FULL MEANING OF HACKING
HARSH SHAH
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
Computer Explorers
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
diwakar sharma
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
Norfolk Naval Shipyard
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
ebooker97
 

What's hot (9)

Threat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The WebThreat Detection: Recognizing Risks In Email And On The Web
Threat Detection: Recognizing Risks In Email And On The Web
 
Email
EmailEmail
Email
 
Internet security
Internet securityInternet security
Internet security
 
How to Revoke Google's Manual Penalty
How to Revoke Google's Manual PenaltyHow to Revoke Google's Manual Penalty
How to Revoke Google's Manual Penalty
 
FULL MEANING OF HACKING
FULL MEANING OF HACKING FULL MEANING OF HACKING
FULL MEANING OF HACKING
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 
Internet security.spyware
Internet security.spywareInternet security.spyware
Internet security.spyware
 
DoD Social Media Guide
DoD Social Media GuideDoD Social Media Guide
DoD Social Media Guide
 
Activity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer InformationActivity Website Marketing Statement © , Net , Computer Information
Activity Website Marketing Statement © , Net , Computer Information
 

Similar to Internet Dangers 2004

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
Brian Pichman
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
Brian Pichman
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayanehaz
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Brian Pichman
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
Marian Merritt
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
Rayane Hazimeh
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
Digital Transformation EXPO Event Series
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
Brian Pichman
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
sharmaakash1881
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
Jason Trost
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
Joel May
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
Stephen Cobb
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
Barry Caplin
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
Brian Pichman
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
Mujeeb Riaz
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
Adam W. Warner
 
Compromised Website Report 2012
Compromised Website Report 2012Compromised Website Report 2012
Compromised Website Report 2012
Cyren, Inc
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Manish Mudhliyar
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
San Diego Continuing Education
 

Similar to Internet Dangers 2004 (20)

CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024CyberSecurity - Computers In Libraries 2024
CyberSecurity - Computers In Libraries 2024
 
Personal Internet Security Practice
Personal Internet Security PracticePersonal Internet Security Practice
Personal Internet Security Practice
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter StyleCybersecurity - Defense Against The Dark Arts Harry Potter Style
Cybersecurity - Defense Against The Dark Arts Harry Potter Style
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Building Trust in the Digital Age
Building Trust in the Digital AgeBuilding Trust in the Digital Age
Building Trust in the Digital Age
 
Rayane hazimeh building trust in the digital age teenagers and students
Rayane hazimeh  building trust in the digital age teenagers and studentsRayane hazimeh  building trust in the digital age teenagers and students
Rayane hazimeh building trust in the digital age teenagers and students
 
Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?Data Breach Detection: Are you ready for GDPR?
Data Breach Detection: Are you ready for GDPR?
 
Securing and Safeguarding Your Library Setup
Securing and Safeguarding Your Library SetupSecuring and Safeguarding Your Library Setup
Securing and Safeguarding Your Library Setup
 
Web security ppt sniper corporation
Web security ppt   sniper corporationWeb security ppt   sniper corporation
Web security ppt sniper corporation
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
Enjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber CriminalsEnjoy Safer Technology and Defeat Cyber Criminals
Enjoy Safer Technology and Defeat Cyber Criminals
 
Online Self Defense
Online Self DefenseOnline Self Defense
Online Self Defense
 
Securing & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptxSecuring & Safeguarding Your Library Setup.pptx
Securing & Safeguarding Your Library Setup.pptx
 
Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?Cyber Crime and how to prevent it?
Cyber Crime and how to prevent it?
 
The Personal and Website Security Mindset
The Personal and Website Security MindsetThe Personal and Website Security Mindset
The Personal and Website Security Mindset
 
Compromised Website Report 2012
Compromised Website Report 2012Compromised Website Report 2012
Compromised Website Report 2012
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Lesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internetLesson 5 protecting yourself on the internet
Lesson 5 protecting yourself on the internet
 

More from Donald E. Hester

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
Donald E. Hester
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
Donald E. Hester
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
Donald E. Hester
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
Donald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
Donald E. Hester
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
Donald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
Donald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
Donald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
Donald E. Hester
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
Donald E. Hester
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
Donald E. Hester
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Donald E. Hester
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Donald E. Hester
 

More from Donald E. Hester (20)

Cybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOGCybersecurity for Local Gov for SAMFOG
Cybersecurity for Local Gov for SAMFOG
 
2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov2017 IT Control Environment for Local Gov
2017 IT Control Environment for Local Gov
 
What you Need To Know About Ransomware
What you Need To Know About RansomwareWhat you Need To Know About Ransomware
What you Need To Know About Ransomware
 
CNT 54 Administering Windows Client
CNT 54 Administering Windows ClientCNT 54 Administering Windows Client
CNT 54 Administering Windows Client
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
Cyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOGCyber Security for Local Gov SAMFOG
Cyber Security for Local Gov SAMFOG
 
Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices Annual Maze Live Event 2016 – GASB Updates & Best Practices
Annual Maze Live Event 2016 – GASB Updates & Best Practices
 
Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016Payment Card Cashiering for Local Governments 2016
Payment Card Cashiering for Local Governments 2016
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 14: Security ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
Understanding the Risk Management Framework & (ISC)2 CAP Module 12: Cloud Com...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 

Recently uploaded

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Internet Dangers 2004

  • 1. Maze & Associates - www.MazeAssociates.com Internet DangersInternet Dangers The dangers of being on the InternetThe dangers of being on the Internet
  • 2. Maze & Associates - www.MazeAssociates.com The Internet • If you have been on the Internet for awhile you are aware there are a lot of dangers. • The Internet really isn’t a safe place.
  • 3. Maze & Associates - www.MazeAssociates.com Here are some of the threats out there: • Fraud • SPAM • Spyware • Viruses / Worms • Hackers / Crackers • Phishing Sites • Scams • Cyber-stalkers • Child predators • Incorrect information • Performance robbers • Unwanted pop-ups • Virus Hoaxes • Identity Theft • Illegal software – music • Adult Content Sites
  • 4. Maze & Associates - www.MazeAssociates.com Results • Downtime • Lost productivity • Poor system performance • Legal liability • Identity Theft • Monetary Losses • Increased annoyances • Physical harm
  • 5. Maze & Associates - www.MazeAssociates.com Part I: Malicious Code • Viruses & Worms • Spyware & Adware
  • 6. Maze & Associates - www.MazeAssociates.com Part I: Viruses & Worms • Define Virus and Worm • UC Berkeley Study on multi-platform code • Low impact on performance Viruses • New worms such as Cabir – Use bluetooth to spread via cell phone.
  • 7. Maze & Associates - www.MazeAssociates.com Part I: Spyware & Adware • There is a new threat out there, and we thought computer viruses were all we had to worry about. Think again. There is a new type of malicious software out there that at best wants to track our browsing on the Internet so that they can target SPAM and popup ads to the types of pages we view. Spyware can also slow our computers down to the point that they will not respond. Worst case scenario Spyware can record every keystroke you make and even steal your identity. All you have to do to get this Spyware is browse a website, download free software or install file sharing software.
  • 8. Maze & Associates - www.MazeAssociates.com Spyware Scanner Example
  • 9. Maze & Associates - www.MazeAssociates.com Results of Spyware • Browser Hijacking • Trojan Horses • Tracking Cookies • Pop-up installers • Identity Theft • Poor system performance • More SPAM • Keystroke loggers
  • 10. Maze & Associates - www.MazeAssociates.com Statistics • 25 Computers Scanned • 5 computer had no spyware • 2157 Spyware signatures (20 Computers) • Those with the most spyware were the slowest • Higher the staff level the more spyware • 106 unsupported & hazardous applications * • 2 Really bad programs – A Trojan and File Sharing
  • 11. Maze & Associates - www.MazeAssociates.com What can be done about Spyware? • Don’t install it! • Free programs often install Spyware • Kazaa – Hotbar – Gator – WebShots – Screen Savers • Call your IT department • Scan computer regularly • File a Complaint • https://rn.ftc.gov/pls/dod/wsolcq$.startup?Z_ORG_CODE=PU01
  • 12. Maze & Associates - www.MazeAssociates.com Anti-Spyware Software • Pest Patrol • http://www.pestpatrol.com/ • Ad-aware • http://www.lavasoftusa.com/ • Spybot Search & Destroy • http://www.safer-networking.org/microsoft.en.html • Panda Internet Security (Includes Anti-Virus, Firewall, Anti-SPAM, Web content filtering) • http://www.pandasoftware.com/home/default.asp • WinPatrol • http://www.winpatrol.com • Aluria Software • http://www.aluriasoftware.com/ • McAfee antispyware • http://us.mcafee.com/root/package.asp?pkgid=182&cid=9904
  • 13. Maze & Associates - www.MazeAssociates.com Spyware Articles • Microsoft Article: Spyware and Deceptive Software • http://www.microsoft.com/mscorp/twc/privacy/spyware.mspx • infromIT Article: Spyware Explained • http://www.informit.com/articles/article.asp?p=174140
  • 14. Maze & Associates - www.MazeAssociates.com Part II: SPAM • Unsolicited Commercial Email • Fills your inbox • Losses Include • Time / Productivity • Systems Resources • Bandwidth • Legitimate e-mail suffers • Downtime
  • 15. Maze & Associates - www.MazeAssociates.com How do “they” get my email address? • Your email is posted on a public website • Spyware collects your email address • Free Internet services • Email chain letters • Opening SPAM • Posting or visiting adult content websites • Not opting out • Guessing Email addresses
  • 16. Maze & Associates - www.MazeAssociates.com Email Forward
  • 17. Maze & Associates - www.MazeAssociates.com Picture in front of text • After clicking on the preview all you see is a picture • Usually selling something
  • 18. Maze & Associates - www.MazeAssociates.com SPAM Sources
  • 19. Maze & Associates - www.MazeAssociates.com What can be done about SPAM? • SPAM Filters • Avoid posting your email on public websites • Use multiple email addresses • Don’t open SPAM • Don’t forward email jokes and chain letters • Opt out • Clean your system of spyware • Don’t install suspect programs • Forward to UCE@FTC.GOV
  • 20. Maze & Associates - www.MazeAssociates.com Part III: Phishing • Fake sites that are setup to commit fraud or steal your identity. • Some are poorly done and others are hard to notice. • You have to look out for them • If you are not sure – check with the company
  • 21. Maze & Associates - www.MazeAssociates.com
  • 22. Maze & Associates - www.MazeAssociates.com
  • 23. Maze & Associates - www.MazeAssociates.com
  • 24. Maze & Associates - www.MazeAssociates.com
  • 25. Maze & Associates - www.MazeAssociates.com Examples Phishing Site Example • SSL dialog box – Phishing Site • SSL dialog box – Normal Site (Yahoo.com) • Status Bar Right Click – Phishing Site • Certificate – Phishing Site • Certificate – Normal Site (Yahoo.com)
  • 26. Maze & Associates - www.MazeAssociates.com
  • 27. Maze & Associates - www.MazeAssociates.com
  • 28. Maze & Associates - www.MazeAssociates.com
  • 29. Maze & Associates - www.MazeAssociates.com
  • 30. Maze & Associates - www.MazeAssociates.com
  • 31. Maze & Associates - www.MazeAssociates.com Anti-Phishing Work Group • APWG • http://www.antphishing.org
  • 32. Maze & Associates - www.MazeAssociates.com That is just the tip of the iceberg