SlideShare a Scribd company logo
1 of 9
Download to read offline
11/17/2008




                                                  Big IT Firm Gets It!


                ITMA         Fall 2008 K.Ng




                                                                    From www.engadget.com

17-Nov-08        ITAM K.Ng                    1   17-Nov-08             ITAM K.Ng              2




In the News…                                      In the News…




            明報14Oct2008
                                                  都市日報 4 Nov 2008
17-Nov-08        ITAM K.Ng                    3   17-Nov-08             ITAM K.Ng              4




                                                  And remember this?

Even President
gets it…




17-Nov-08        ITAM K.Ng                    5   17-Nov-08             ITAM K.Ng              6




                                                                                                    1
11/17/2008




What you will learn?                           What is computer security?
     Types of threats                              Protection of computing systems and
     Guidelines on protecting yourself              the data that they store or access.




17-Nov-08                 ITAM K.Ng       7    17-Nov-08                  ITAM K.Ng                      8




                                               What could happen if your computer is
Why is it important?                           compromised?
 Enable you to carry out your duties          1.      Could be used to hide programs that launch
                                                       attacks on other computers.
 Protect personal and sensitive info.
                                               2.      Could be generating large volumes of unwanted
                                                       traffic, slowing down the entire system.
                                               3.      Someone could be distributing illegal software
                                                       from your computer.
                                               4.      Someone could access personal info. From your
                                                       computer.
                                               5.      Someone could record all of your keystrokes and
                                                       get your passwords.

17-Nov-08                 ITAM K.Ng       9    17-Nov-08                  ITAM K.Ng                  10




Answer?                                        It is NOT just an IT problem
     All of the above!                         10% of security safeguards are
                                                 technical.
                                                90% of security safeguards rely on the
                                                 computer user to observe good
                                                 practices.

                                                   IT Security is everyone’s responsibility!!!



17-Nov-08                 ITAM K.Ng       11   17-Nov-08                  ITAM K.Ng                  12




                                                                                                             2
11/17/2008




Social Engineering                                                                                                              Three common examples
     The practice of obtaining confidential info. by                                                                           1.       Spam scams: deceptive emails to get people
      manipulation of legitimate users.
                                                                                                                                         to reveal info.
     Users are the weakest link in security.
     “They” will use the telephone, Internet, email to                                                                         2.       Impersonation: pose as someone in authority
      trick people into revealing sensitive info. or get                                                                                 or IT personnel to obtain info. or access to
      them to do something against the policy.                                                                                           systems.
     For more info:
       http://hk.youtube.com/watch?v=xn9hH1BckPE                                                                               3.       Dumpster diving: go thro’ trash to obtain
       “The Art of Deception”, Kelvin Mitnick, 2003.                                                                                    valuable info.
       Movie (2000) & book (1996) “Takedown”




17-Nov-08                                                ITAM K.Ng                                                         13   17-Nov-08                           ITAM K.Ng                       14




Case (1)                                                                                                                        Safely destroy files on HD?
     Mr Chapman found important                                                                                                        This?
      personal data on a computer
                                                                                                                                     •      http://hk.youtube.com/watch?v=dMjLRBooSD0
      he bought on ebay.
     Affected a million bank                                                                                                           Or this?
      customers from RBS,                                                                                                            •      http://hk.youtube.com/watch?v=8M9fNu3X1K4
      NatWest, AmEx.                                                                                                                    Or this?
     Under investigation by the Info
                                                                                                                                     •      http://hk.youtube.com/watch?v=jGXh6RVTuq0
      Commissioner

                                                                                     £35 from eBay!

             From Daily Mail UK, 27Aug08
http://www.dailymail.co.uk/news/article-1049121/Government-probe-launched-details-million-bank-customers-sold-eBay.html#

17-Nov-08                                                ITAM K.Ng                                                         15   17-Nov-08                           ITAM K.Ng                       16




Cheaper solutions…                                                                                                              Spam scams
     http://www.fileshredder.org/                                                                                                      Phishing
                                                                                                                                          Email asks you to go to a website to update your
     http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml                                                                                  personal info.
                                                                                                                                          Phishing scam archive
                                                                                                                                           ○ http://millersmiles.co.uk/
                                                                                                                                        Phony security alert
                                                                                                                                          Emails or pop-up windows warn that your computer is
                                                                                                                                            at risk of being infected or hacked and contain an
                                                                                                                                            attachment or link to a patch to fix the problem.
                                                                                                                                        Nigerian bank account scam
                                                                                                                                          Collect your money and bank account info.


17-Nov-08                                                ITAM K.Ng                                                         17   17-Nov-08                           ITAM K.Ng                       18




                                                                                                                                                                                                         3
11/17/2008




Examples of phone prank                                 Sarah Palin called by Nicolas!
 A very popular radio program in the late 80s.
 軟硬天師 整蠱電話
 e.g. http://hk.youtube.com/watch?v=HuAzLgutOME




                                                        http://hk.youtube.com/watch?v=k4aHL12vtEM

17-Nov-08             ITAM K.Ng                    19   17-Nov-08                        ITAM K.Ng                    20




Avoid social engineering                                Computer Viruses
 DO NOT give sensitive personal info. to
  anyone you don’t know or who doesn’t
  have a legitimate need for it.
 Destroy or securely erase sensitive info.
  before recycling or throwing it away.
 Delete unsolicited emails immediately.
 Sounds too good to be true? It is!
 Report to the authority.


17-Nov-08             ITAM K.Ng                    21   17-Nov-08                        ITAM K.Ng                    22




What is it?                                             Types of viruses (i)
 A self-replicating program that spreads                    Macro Viruses
  by inserting copies of itself onto other                     Use command (macros) embedded in other
  executable code or documents.                                     software to infect and spread to other files
                                                                    viewed by that software, e.g. Word/Excel.
 It will perform a function, e.g. delete
  certain files.




17-Nov-08             ITAM K.Ng                    23   17-Nov-08                        ITAM K.Ng                    24




                                                                                                                           4
11/17/2008




Macro Protection in Word 2007                               Types of viruses (ii)
                                                                 Worms
                                                                   Duplicate themselves and use
                                                                        communications such as emails to spread.
                                                                        They can look at your email address book
                                                                        and send themselves to users in your
                                                                        address book.




17-Nov-08                       ITAM K.Ng              25   17-Nov-08                         ITAM K.Ng                        26




Worms examples                                              Type of viruses (iii)
     Spyworm.Win32                                              File viruses
                                                                   Attach themselves to other software. When
                                                                        the software is run, the virus first loads itself
                                                                        into memory so that it can further infect
                                                                        other files or begin damaging the computer.
                                                                 Trojan
                                                                   Programs that claim to perform a particular
                                                                        function but in fact do something different



17-Nov-08                       ITAM K.Ng              27   17-Nov-08                         ITAM K.Ng                        28




Type of viruses (iv)                                        Example
     Backdoor Trojans                                           “I Love You” and “Bagle” worms
       Programs that allow other computer users to                They spread themselves via email
            remotely control your computer via                          attachments.
            networks.                                              It sends an email with itself as an
     Boot Sector Viruses                                           attachment to everyone in that computer’s
       Infect a computer’s startup program so that
                                                                    email address books.
            the virus would become active as soon as               Worms are also often designed to use up
            the computer started up.                                resources on that computer, such as,
                                                                    memory and processing power.



17-Nov-08                       ITAM K.Ng              29   17-Nov-08                         ITAM K.Ng                        30




                                                                                                                                    5
11/17/2008




Virus Scanners                                               Malware
     Online scanner                                              A general term for software that is
       http://housecall65.trendmicro.com                          installed on your computer without your
                                                                   knowledge and often your consent to
                                                                   perform various tasks.
     Free (non-commercial use)
       http://free.avg.com Grisoft’s AVG
       http://www.free-av.com Avira AntiVir Personal
       http://www.avast.com Avast! Home Ed.



17-Nov-08                       ITAM K.Ng               31   17-Nov-08                         ITAM K.Ng               32




Types of Malware                                             Malware scanners
     Adware                                                      Lavasoft Ad-Aware 2008 Free
       Annoying pop-ups, install IT menu bars,                     www.lavasoft.com/products/ad_aware_free.php
            targeted ads. according to your online                Spybot Search and Destroy
            shopping habits or surfing habits.
                                                                    www.safer-networking.org/en/download/index.html
     Spyware
                                                                  Microsoft Windows Defender (with Vista)
       Collects user details, such as, passwords,
                                                                    www.microsoft.com/windows/products/winfamily/de
        credit card info.
                                                                         fender/default.mspx
       Pop-up windows with active-x control.




17-Nov-08                       ITAM K.Ng               33   17-Nov-08                         ITAM K.Ng               34




Good Password                                                Good password
     At least 8 characters containing 3 of the                   Or a passphrase at least 10 characters
      following 4 categories:                                       A memorable phrase, e.g. song or book title,
       Lower case letters (a-z)                                         line of poetry…etc.
       Upper case letters (A-Z)                                    A phrase that has personal meaning but
       Numbers (0-9)                                                    might not appear widely.
       Special characters (! # ? /)                                e.g. a random line from your favorite movie.
                                                                    Combining phrases is better.




17-Nov-08                       ITAM K.Ng               35   17-Nov-08                         ITAM K.Ng               36




                                                                                                                            6
11/17/2008




                                                 Bad password
                                                      A word found in dictionary, whether spelled
                                                       forwards or backwards, or a word preceded
                                                       or followed by a digit (e.g. secret1, 1terces)
     Demo:                                            Include user name or login name
                                                      Include personal info: family names,
     A phrase into a password                          places, pets, birthdays, address, hobbies,
                                                       phone nos. …etc.
                                                      Slang, dialect, jargon…etc.
                                                      Keyboard sequences, e.g. qwerty, asdfg,
                                                       abc123…etc.

17-Nov-08            ITAM K.Ng              37   17-Nov-08                        ITAM K.Ng                38




Password security guidelines                     More on password
 Never share your password with anyone               How to create passwords
  else for any reason.                                  http://www.microsoft.com/protect/yourself/pa
 Passwords should not be written down,                      ssword/create.mspx
  stored electronically (e.g. browser) or
  published.                                          Test your password strength
 Use different passwords for different                 http://www.microsoft.com/protect/yourself/pa
  accounts.                                                  ssword/checker.mspx

 Change password regularly.



17-Nov-08            ITAM K.Ng              39   17-Nov-08                        ITAM K.Ng                40




Firewall                                         What is it?


                                                      It inspects network traffic passing through it,
                                                       and denies or permits passage based on a
                                                       set of rules.




17-Nov-08            ITAM K.Ng              41   17-Nov-08                        ITAM K.Ng                42




                                                                                                                7
11/17/2008




Types of firewall
     Packet filter                                               Stateful packet inspection (SPI)
       Pass/drop individual packets according to a                 Examine packets in groups rather than
        set of rules                                                     individually.
       Inspect source and destination IP and port                  Avoid attacks like SYN Floods, DoS
            Port   Description                                    Application layer
            21     FTP File Transfer Protocol                       Filter traffics on the application level
            23     Telnet
            25     SMTP Simple Mail Transfer Protocol
            80     HTTP
            110    Post Office Protocol (POP3)
            443    HTTPS

17-Nov-08                          ITAM K.Ng            43   17-Nov-08                       ITAM K.Ng                      44




Network address translation
                                                             Managing firewalls = A Profession
(NAT)
     Translate address to private range                          Enterprise-class firewalls
       10.0.0.0 – 10.255.255.255                                   CheckPoint
       172.16.0.0 – 172.31.255.255                                 Juniper (Netscreen)
       192.168.0.0 – 192.168.255.255                                ○ http://www.juniper.net/products/models/srx5800/
                                                                       index.html
                                                                  Security Certifications
                                                                    e.g. CISSP from (ISC)2 , CISA




17-Nov-08                          ITAM K.Ng            45   17-Nov-08                       ITAM K.Ng                      46




                                                             Sending info. Over the internet
Wireless security (Access Point)
                                                             securely
 Change your AP’s admin. login/Pwd                               Watch this
 Change your default SSID                                          http://onguardonline.gov/tools/recognize-
                                                                         secure-site-using-ssl.aspx
 Disable SSID Broadcast
 Encryption: WPA-PSK, avoid old WEP
                                                                  Demo – online shopping
 Media Access Control (MAC) Authentication
                                                                    www.landsend.com
 Disable DHCP




17-Nov-08                          ITAM K.Ng            47   17-Nov-08                       ITAM K.Ng                      48




                                                                                                                                 8
11/17/2008




Encryption (1)                                                        Encryption (2)
     Private Key Encryption                                               Public Key Encryption
       Encrypt a message http://www.encodor.com                             Bob sends a secret message to Alice
       Encrypt a file http://file-encryptor.com/


     Problems with private key?




                                                                                               Diagrams from wikipedia
17-Nov-08                                     ITAM K.Ng          49   17-Nov-08                        ITAM K.Ng              50




12 Good IT Practices                                                  Cont’ (1)
1.      Choose good passwords and protect                             6.      Shut down, lock, log off before leaving it
        them                                                                  unattended, and make sure it requires a
2.      Cautious when using internet                                          password to start-up.
3.      Safe emailing                                                 7.      Make sure your computer is protected
4.      Secure your area before leaving it                                    with anti-virus, security patches,
        unattended                                                            updates…etc.
5.      Secure your portable computer at all                          8.      Don’t keep sensitive info. on portable
        times                                                                 devices.


17-Nov-08                                     ITAM K.Ng          51   17-Nov-08                        ITAM K.Ng              52




Cont’ (2)                                                             Conclusion
9.  Don’t install or download unknown or                               This is only a very short introduction
    unsolicited programs to your computer                              Remember to protect yourself at all times.
10. Avoid using P2P programs, e.g.                                     … and Internet is like           , not safe.
    FOXY…etc.
11. Don’t use illegal software.
                                                                           References:
12. Make backup copies of files or date you                                  http://www.staysafeonline.org
    are not willing to lose --- and store the                                http://onguardonline.gov/
    copies very securely.
modified from http://its.ucsc.edu/security_awareness/top10.php




17-Nov-08                                     ITAM K.Ng          53   17-Nov-08                        ITAM K.Ng              54




                                                                                                                                   9

More Related Content

Viewers also liked

NatWest: Redesigning the Service
NatWest: Redesigning the ServiceNatWest: Redesigning the Service
NatWest: Redesigning the Servicejj36790
 
Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)bety ruiz
 
004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템Namun Cho
 
Surat ul jinn presentation
Surat ul jinn presentationSurat ul jinn presentation
Surat ul jinn presentationFaryal2000
 
Importance Of Banks In An Economy
Importance Of Banks In An EconomyImportance Of Banks In An Economy
Importance Of Banks In An EconomyRudo Chengeta
 
Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick Maidoh
 
Types of banks
Types of banksTypes of banks
Types of banks17somya
 
72 Surah Al Jinn (The Jinn)
72   Surah Al Jinn (The Jinn)72   Surah Al Jinn (The Jinn)
72 Surah Al Jinn (The Jinn)AVICENNE
 
Greg Images to Choose From #1
Greg Images to Choose From #1Greg Images to Choose From #1
Greg Images to Choose From #1Taylor Walsh
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies JungHyuk Kwon
 
Jinns and angels
Jinns and angelsJinns and angels
Jinns and angelsHelmon Chan
 

Viewers also liked (20)

NatWest: Redesigning the Service
NatWest: Redesigning the ServiceNatWest: Redesigning the Service
NatWest: Redesigning the Service
 
Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)
 
004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템
 
Who are the jinn
Who are the jinnWho are the jinn
Who are the jinn
 
Topic 006
Topic 006Topic 006
Topic 006
 
Surat ul jinn presentation
Surat ul jinn presentationSurat ul jinn presentation
Surat ul jinn presentation
 
Jinn in Islam
Jinn in IslamJinn in Islam
Jinn in Islam
 
World of Jinn
World of JinnWorld of Jinn
World of Jinn
 
Importance Of Banks In An Economy
Importance Of Banks In An EconomyImportance Of Banks In An Economy
Importance Of Banks In An Economy
 
Jinn in Islam
Jinn in IslamJinn in Islam
Jinn in Islam
 
Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.
 
Types of banks
Types of banksTypes of banks
Types of banks
 
Top 1m
Top 1mTop 1m
Top 1m
 
72 Surah Al Jinn (The Jinn)
72   Surah Al Jinn (The Jinn)72   Surah Al Jinn (The Jinn)
72 Surah Al Jinn (The Jinn)
 
Greg slides01
Greg slides01Greg slides01
Greg slides01
 
Greg Images to Choose From #1
Greg Images to Choose From #1Greg Images to Choose From #1
Greg Images to Choose From #1
 
Yellow1
Yellow1Yellow1
Yellow1
 
Tumble books2
Tumble books2Tumble books2
Tumble books2
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies
 
Jinns and angels
Jinns and angelsJinns and angels
Jinns and angels
 

More from kratesng

BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)kratesng
 
ITDD Present to TWGHs SS
ITDD Present to TWGHs SSITDD Present to TWGHs SS
ITDD Present to TWGHs SSkratesng
 
社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議kratesng
 
PD73002 History Of Product Design
PD73002 History Of Product DesignPD73002 History Of Product Design
PD73002 History Of Product Designkratesng
 
PD73002 Concept Generation
PD73002 Concept GenerationPD73002 Concept Generation
PD73002 Concept Generationkratesng
 
PD73002 Customer Needs
PD73002 Customer NeedsPD73002 Customer Needs
PD73002 Customer Needskratesng
 
PD73002 Product Development
PD73002 Product DevelopmentPD73002 Product Development
PD73002 Product Developmentkratesng
 
ITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital VideoITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital Videokratesng
 
ITMA11 Introduction To Video
ITMA11 Introduction To VideoITMA11 Introduction To Video
ITMA11 Introduction To Videokratesng
 
ITMA10 Multimedia Applications
ITMA10 Multimedia ApplicationsITMA10 Multimedia Applications
ITMA10 Multimedia Applicationskratesng
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIkratesng
 
ITMA07 Web 2.0
ITMA07 Web 2.0ITMA07 Web 2.0
ITMA07 Web 2.0kratesng
 
ITMA06 Introduction to Animation
ITMA06 Introduction to AnimationITMA06 Introduction to Animation
ITMA06 Introduction to Animationkratesng
 
ITMA04 Digital Imaging
ITMA04 Digital ImagingITMA04 Digital Imaging
ITMA04 Digital Imagingkratesng
 
ITMA02 Inside Computer
ITMA02 Inside ComputerITMA02 Inside Computer
ITMA02 Inside Computerkratesng
 
ITMA03 Internet And Communications
ITMA03 Internet And CommunicationsITMA03 Internet And Communications
ITMA03 Internet And Communicationskratesng
 

More from kratesng (16)

BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)
 
ITDD Present to TWGHs SS
ITDD Present to TWGHs SSITDD Present to TWGHs SS
ITDD Present to TWGHs SS
 
社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議
 
PD73002 History Of Product Design
PD73002 History Of Product DesignPD73002 History Of Product Design
PD73002 History Of Product Design
 
PD73002 Concept Generation
PD73002 Concept GenerationPD73002 Concept Generation
PD73002 Concept Generation
 
PD73002 Customer Needs
PD73002 Customer NeedsPD73002 Customer Needs
PD73002 Customer Needs
 
PD73002 Product Development
PD73002 Product DevelopmentPD73002 Product Development
PD73002 Product Development
 
ITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital VideoITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital Video
 
ITMA11 Introduction To Video
ITMA11 Introduction To VideoITMA11 Introduction To Video
ITMA11 Introduction To Video
 
ITMA10 Multimedia Applications
ITMA10 Multimedia ApplicationsITMA10 Multimedia Applications
ITMA10 Multimedia Applications
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio II
 
ITMA07 Web 2.0
ITMA07 Web 2.0ITMA07 Web 2.0
ITMA07 Web 2.0
 
ITMA06 Introduction to Animation
ITMA06 Introduction to AnimationITMA06 Introduction to Animation
ITMA06 Introduction to Animation
 
ITMA04 Digital Imaging
ITMA04 Digital ImagingITMA04 Digital Imaging
ITMA04 Digital Imaging
 
ITMA02 Inside Computer
ITMA02 Inside ComputerITMA02 Inside Computer
ITMA02 Inside Computer
 
ITMA03 Internet And Communications
ITMA03 Internet And CommunicationsITMA03 Internet And Communications
ITMA03 Internet And Communications
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

ITMA05 Computer Security

  • 1. 11/17/2008 Big IT Firm Gets It! ITMA Fall 2008 K.Ng From www.engadget.com 17-Nov-08 ITAM K.Ng 1 17-Nov-08 ITAM K.Ng 2 In the News… In the News… 明報14Oct2008 都市日報 4 Nov 2008 17-Nov-08 ITAM K.Ng 3 17-Nov-08 ITAM K.Ng 4 And remember this? Even President gets it… 17-Nov-08 ITAM K.Ng 5 17-Nov-08 ITAM K.Ng 6 1
  • 2. 11/17/2008 What you will learn? What is computer security?  Types of threats  Protection of computing systems and  Guidelines on protecting yourself the data that they store or access. 17-Nov-08 ITAM K.Ng 7 17-Nov-08 ITAM K.Ng 8 What could happen if your computer is Why is it important? compromised?  Enable you to carry out your duties 1. Could be used to hide programs that launch attacks on other computers.  Protect personal and sensitive info. 2. Could be generating large volumes of unwanted traffic, slowing down the entire system. 3. Someone could be distributing illegal software from your computer. 4. Someone could access personal info. From your computer. 5. Someone could record all of your keystrokes and get your passwords. 17-Nov-08 ITAM K.Ng 9 17-Nov-08 ITAM K.Ng 10 Answer? It is NOT just an IT problem  All of the above!  10% of security safeguards are technical.  90% of security safeguards rely on the computer user to observe good practices. IT Security is everyone’s responsibility!!! 17-Nov-08 ITAM K.Ng 11 17-Nov-08 ITAM K.Ng 12 2
  • 3. 11/17/2008 Social Engineering Three common examples  The practice of obtaining confidential info. by 1. Spam scams: deceptive emails to get people manipulation of legitimate users. to reveal info.  Users are the weakest link in security.  “They” will use the telephone, Internet, email to 2. Impersonation: pose as someone in authority trick people into revealing sensitive info. or get or IT personnel to obtain info. or access to them to do something against the policy. systems.  For more info:  http://hk.youtube.com/watch?v=xn9hH1BckPE 3. Dumpster diving: go thro’ trash to obtain  “The Art of Deception”, Kelvin Mitnick, 2003. valuable info.  Movie (2000) & book (1996) “Takedown” 17-Nov-08 ITAM K.Ng 13 17-Nov-08 ITAM K.Ng 14 Case (1) Safely destroy files on HD?  Mr Chapman found important  This? personal data on a computer • http://hk.youtube.com/watch?v=dMjLRBooSD0 he bought on ebay.  Affected a million bank  Or this? customers from RBS, • http://hk.youtube.com/watch?v=8M9fNu3X1K4 NatWest, AmEx.  Or this?  Under investigation by the Info • http://hk.youtube.com/watch?v=jGXh6RVTuq0 Commissioner £35 from eBay! From Daily Mail UK, 27Aug08 http://www.dailymail.co.uk/news/article-1049121/Government-probe-launched-details-million-bank-customers-sold-eBay.html# 17-Nov-08 ITAM K.Ng 15 17-Nov-08 ITAM K.Ng 16 Cheaper solutions… Spam scams  http://www.fileshredder.org/  Phishing  Email asks you to go to a website to update your  http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml personal info.  Phishing scam archive ○ http://millersmiles.co.uk/  Phony security alert  Emails or pop-up windows warn that your computer is at risk of being infected or hacked and contain an attachment or link to a patch to fix the problem.  Nigerian bank account scam  Collect your money and bank account info. 17-Nov-08 ITAM K.Ng 17 17-Nov-08 ITAM K.Ng 18 3
  • 4. 11/17/2008 Examples of phone prank Sarah Palin called by Nicolas!  A very popular radio program in the late 80s.  軟硬天師 整蠱電話  e.g. http://hk.youtube.com/watch?v=HuAzLgutOME http://hk.youtube.com/watch?v=k4aHL12vtEM 17-Nov-08 ITAM K.Ng 19 17-Nov-08 ITAM K.Ng 20 Avoid social engineering Computer Viruses  DO NOT give sensitive personal info. to anyone you don’t know or who doesn’t have a legitimate need for it.  Destroy or securely erase sensitive info. before recycling or throwing it away.  Delete unsolicited emails immediately.  Sounds too good to be true? It is!  Report to the authority. 17-Nov-08 ITAM K.Ng 21 17-Nov-08 ITAM K.Ng 22 What is it? Types of viruses (i)  A self-replicating program that spreads  Macro Viruses by inserting copies of itself onto other  Use command (macros) embedded in other executable code or documents. software to infect and spread to other files viewed by that software, e.g. Word/Excel.  It will perform a function, e.g. delete certain files. 17-Nov-08 ITAM K.Ng 23 17-Nov-08 ITAM K.Ng 24 4
  • 5. 11/17/2008 Macro Protection in Word 2007 Types of viruses (ii)  Worms  Duplicate themselves and use communications such as emails to spread. They can look at your email address book and send themselves to users in your address book. 17-Nov-08 ITAM K.Ng 25 17-Nov-08 ITAM K.Ng 26 Worms examples Type of viruses (iii)  Spyworm.Win32  File viruses  Attach themselves to other software. When the software is run, the virus first loads itself into memory so that it can further infect other files or begin damaging the computer.  Trojan  Programs that claim to perform a particular function but in fact do something different 17-Nov-08 ITAM K.Ng 27 17-Nov-08 ITAM K.Ng 28 Type of viruses (iv) Example  Backdoor Trojans  “I Love You” and “Bagle” worms  Programs that allow other computer users to  They spread themselves via email remotely control your computer via attachments. networks.  It sends an email with itself as an  Boot Sector Viruses attachment to everyone in that computer’s  Infect a computer’s startup program so that email address books. the virus would become active as soon as  Worms are also often designed to use up the computer started up. resources on that computer, such as, memory and processing power. 17-Nov-08 ITAM K.Ng 29 17-Nov-08 ITAM K.Ng 30 5
  • 6. 11/17/2008 Virus Scanners Malware  Online scanner  A general term for software that is  http://housecall65.trendmicro.com installed on your computer without your knowledge and often your consent to perform various tasks.  Free (non-commercial use)  http://free.avg.com Grisoft’s AVG  http://www.free-av.com Avira AntiVir Personal  http://www.avast.com Avast! Home Ed. 17-Nov-08 ITAM K.Ng 31 17-Nov-08 ITAM K.Ng 32 Types of Malware Malware scanners  Adware  Lavasoft Ad-Aware 2008 Free  Annoying pop-ups, install IT menu bars,  www.lavasoft.com/products/ad_aware_free.php targeted ads. according to your online  Spybot Search and Destroy shopping habits or surfing habits.  www.safer-networking.org/en/download/index.html  Spyware  Microsoft Windows Defender (with Vista)  Collects user details, such as, passwords,  www.microsoft.com/windows/products/winfamily/de credit card info. fender/default.mspx  Pop-up windows with active-x control. 17-Nov-08 ITAM K.Ng 33 17-Nov-08 ITAM K.Ng 34 Good Password Good password  At least 8 characters containing 3 of the  Or a passphrase at least 10 characters following 4 categories:  A memorable phrase, e.g. song or book title,  Lower case letters (a-z) line of poetry…etc.  Upper case letters (A-Z)  A phrase that has personal meaning but  Numbers (0-9) might not appear widely.  Special characters (! # ? /)  e.g. a random line from your favorite movie.  Combining phrases is better. 17-Nov-08 ITAM K.Ng 35 17-Nov-08 ITAM K.Ng 36 6
  • 7. 11/17/2008 Bad password  A word found in dictionary, whether spelled forwards or backwards, or a word preceded or followed by a digit (e.g. secret1, 1terces) Demo:  Include user name or login name  Include personal info: family names, A phrase into a password places, pets, birthdays, address, hobbies, phone nos. …etc.  Slang, dialect, jargon…etc.  Keyboard sequences, e.g. qwerty, asdfg, abc123…etc. 17-Nov-08 ITAM K.Ng 37 17-Nov-08 ITAM K.Ng 38 Password security guidelines More on password  Never share your password with anyone  How to create passwords else for any reason.  http://www.microsoft.com/protect/yourself/pa  Passwords should not be written down, ssword/create.mspx stored electronically (e.g. browser) or published.  Test your password strength  Use different passwords for different  http://www.microsoft.com/protect/yourself/pa accounts. ssword/checker.mspx  Change password regularly. 17-Nov-08 ITAM K.Ng 39 17-Nov-08 ITAM K.Ng 40 Firewall What is it?  It inspects network traffic passing through it, and denies or permits passage based on a set of rules. 17-Nov-08 ITAM K.Ng 41 17-Nov-08 ITAM K.Ng 42 7
  • 8. 11/17/2008 Types of firewall  Packet filter  Stateful packet inspection (SPI)  Pass/drop individual packets according to a  Examine packets in groups rather than set of rules individually.  Inspect source and destination IP and port  Avoid attacks like SYN Floods, DoS Port Description  Application layer 21 FTP File Transfer Protocol  Filter traffics on the application level 23 Telnet 25 SMTP Simple Mail Transfer Protocol 80 HTTP 110 Post Office Protocol (POP3) 443 HTTPS 17-Nov-08 ITAM K.Ng 43 17-Nov-08 ITAM K.Ng 44 Network address translation Managing firewalls = A Profession (NAT)  Translate address to private range  Enterprise-class firewalls  10.0.0.0 – 10.255.255.255  CheckPoint  172.16.0.0 – 172.31.255.255  Juniper (Netscreen)  192.168.0.0 – 192.168.255.255 ○ http://www.juniper.net/products/models/srx5800/ index.html  Security Certifications  e.g. CISSP from (ISC)2 , CISA 17-Nov-08 ITAM K.Ng 45 17-Nov-08 ITAM K.Ng 46 Sending info. Over the internet Wireless security (Access Point) securely  Change your AP’s admin. login/Pwd  Watch this  Change your default SSID  http://onguardonline.gov/tools/recognize- secure-site-using-ssl.aspx  Disable SSID Broadcast  Encryption: WPA-PSK, avoid old WEP  Demo – online shopping  Media Access Control (MAC) Authentication  www.landsend.com  Disable DHCP 17-Nov-08 ITAM K.Ng 47 17-Nov-08 ITAM K.Ng 48 8
  • 9. 11/17/2008 Encryption (1) Encryption (2)  Private Key Encryption  Public Key Encryption  Encrypt a message http://www.encodor.com  Bob sends a secret message to Alice  Encrypt a file http://file-encryptor.com/  Problems with private key? Diagrams from wikipedia 17-Nov-08 ITAM K.Ng 49 17-Nov-08 ITAM K.Ng 50 12 Good IT Practices Cont’ (1) 1. Choose good passwords and protect 6. Shut down, lock, log off before leaving it them unattended, and make sure it requires a 2. Cautious when using internet password to start-up. 3. Safe emailing 7. Make sure your computer is protected 4. Secure your area before leaving it with anti-virus, security patches, unattended updates…etc. 5. Secure your portable computer at all 8. Don’t keep sensitive info. on portable times devices. 17-Nov-08 ITAM K.Ng 51 17-Nov-08 ITAM K.Ng 52 Cont’ (2) Conclusion 9. Don’t install or download unknown or  This is only a very short introduction unsolicited programs to your computer  Remember to protect yourself at all times. 10. Avoid using P2P programs, e.g.  … and Internet is like , not safe. FOXY…etc. 11. Don’t use illegal software.  References: 12. Make backup copies of files or date you  http://www.staysafeonline.org are not willing to lose --- and store the  http://onguardonline.gov/ copies very securely. modified from http://its.ucsc.edu/security_awareness/top10.php 17-Nov-08 ITAM K.Ng 53 17-Nov-08 ITAM K.Ng 54 9