350 likes | 1.68k Views
Safe Internet Browsing Cyber Security Awareness Month October 2006 Safe Internet Browsing What are we going to talk about? Zombies Rats Spyware Safe Ecommerce Resources Zombies What is a zombie?
E N D
Safe Internet Browsing Cyber Security Awareness Month October 2006
Safe Internet Browsing • What are we going to talk about? • Zombies • Rats • Spyware • Safe Ecommerce • Resources
Zombies • What is a zombie? • Zombie: A computer that has been implanted with a daemon that puts it under the control of a malicious hacker without the knowledge of the computer owner. • Zombie computers are combined to create “botnets” • Botnets can include as many as 100,000 individual ‘zombie’ computers
Zombies • Is your computer a Zombie? • You may never know! • Zombie symptoms • Slow Slow Slow • Re-directed web sites • The FBI knocking on your door • Weird ports open
216.229.161.198 66.102.7.147 Weird Ports – Weird Science • Start • Run • CMD • Netstat -a • SamSpade.org • DNSSTUFF.org
Zombies con’t • Your computer must be online and on the Internet in order for it to be used as a Zombie • How do I get infected? • Inadvertently from malicious websites • Joke email – photos, games, attachments • Instant messaging • File sharing – music, video, games
RAT • Remote Access Trojans (RATs) are malicious software programs that enable criminals to control your computer through your Internet connection
Zombies and RATs, con’t • How does your computer become a Zombie or RAT? • Code is downloaded from a source: • Email • Instant messaging • Web browsing • File sharing • Doing nothing at all?!?!
Zombies and RATs con’t • What can Zombies and RATs do? • Attack other computers • Expose you to scams • Find your files and view, copy, alter, or delete them • Steal your credit account numbers, bank account number, identity • Key loggers - Record your typing and send that info to another computer
Spyware • What is it? • Collection of technologies that help external parties in gathering information about a person or organization without their knowledge • Types • Adware • Hijackers • Keyloggers • Plug-ins • Phishers
Spyware con’t • How do you get infected? • Infected freeware • Peer to peer file sharing (to share music and videos) • Instant messaging • Surfing the web • Symptoms of infection – Visible • Redirected searches • Pop up ads • Erratic email behavior • Slow internet connection speeds • New and strange sites on your favorites or bookmarks
Spyware, Symptoms con’t • Symptoms – Hidden • Gathering of personal information • Credit card info • Passwords • Financial information • Browsing habits • Read and disclose the contents of files on your hard drive
Spyware, Symptoms con’t • I’m infected! What do I do? • Use utilities to clean up malicious software • Lavasoft Adaware • Spybot Search and Destroy • SpoofStick • Manual removal • Step by step instructions • www.2-spyware.com
Spyware, What to do con’t • Prevention • There is no ‘silver bullet’ to stop or prevent spyware • Overall awareness • Understand the warning signs and symptoms • Routine maintenance • Run spyware removal tools • Keep system updated
Spyware, Prevention con’t • Use a firewall • Some anti-virus programs now provide spyware protection • DO NOT put personal information on public computers such as labs or library machines
Spyware con’t • What’s GU doing about this? • Layered defense • Campus firewall – prevents spyware infected machines from transmitting information to 3rd parties • Spam filter appliance – stops some spyware from being distributed via email • Enterprise antivirus software – investigates email at a higher level than the appliance
Spyware, What’s GU doing con’t • Desktop antivirus client – prevents spyware infections to a degree (not foolproof because users tend to OK the installation of the spyware) • Desktop firewall – prevents infected machines from transmitting and receiving data on non-standard ports • User awareness – understand the symptoms of spyware infections and how spyware gets installed in the first place
Safe Ecommerce • Keep your transactions secure • Look for the bank or on-line store privacy and security practices, or contact the company directly • Look for the lock and HTTPS: • This indicates that the website is encrypted • Passwords or PINs should be used • General security • Keep your virus protection up to date • Use a debit card with a separate account for online transaction
Infection Symptoms • How to tell if your infected • Your computer runs more slowly than normal • Your computer stops responding or locks up often • Your computer crashes and restarts every few minutes • Your computer restarts on its own and then fails to run normally
Infection Symptoms con’t • Applications on your computer don’t work correctly • Disks or disk drives are inaccessible • You can’t print correctly • You see unusual error messages • You see distorted menus and dialog boxes
Internet Browsing Guidelines • Guidelines Web users should know • If there is sensitive data on your computer, don’t browse the Web • Store personal info on an encrypted drive or folder • Install security patches and updates • Ensure that browsers are up to date • Disable plug-ins and configure security settings not to run Java applets, JavaScript and VBScript, ActiveX controls, etc. without prompting you first • Consider using more then 1 Web browser
Safe Internet Browsing Resources • Resources • Check for open ports Netstat –a • Free Open Port Scan – Gonzaga • http://toxocara.gonzaga.edu • To see if a website is legitimate go to www.SamSpade.org or www.DNSstuff.com • Free PC SAFETY Scan – Microsoft • http://safety.live.com/site/en-US/default.htm?s_cid=sah
Contact Information • Help Desk – • Extension 5550 • Jim Jones – IT Asset Manager • jonesj@its.gonzaga.edu • Extension 5926 • Http://cybersecurity.gonzaga.edu