760 likes | 928 Views
Recap of Project Management . Alternative Matrix . Phishing, Sniffing, Spoofing, Oh My! . Class 19: IT Security and Networking August 3 rd , 2011. Administration . Extra credit o pportunity (20 points) Assignment due tomorrow before class. Learning Objectives.
E N D
Recap of Project Management • Alternative Matrix
Phishing, Sniffing, Spoofing, Oh My! Class 19: IT Security and Networking August 3rd, 2011
Administration • Extra credit opportunity (20 points) • Assignment due tomorrow before class
Learning Objectives • List a few current events in information systems news • List situations when your privacy may be at risk • Explain techniques for protecting your privacy *I loosely define hacker as someone how knowingly seeks information or resources not intended for him or her, whether for good or for bad.
I am not responsible for what you may learn, or what I may do to your computer! • But Seriously: Some of the stuff I show here can land you some jail time. Be Responsible
Terminology • If I say something like “spam filter”, and if you do not know what this is….RAISE YOUR HAND!!!
Why do hackers hack? • Pleasure • To learn • Trade secrets • ID theft • Credit card theft • Access to resources (e.g., email) • Espionage • Malice • Protect information? • Our right to know?
If there’s anything I can get you to walk away with from this, it’s that you should care more about watching out for yourself • Because there are a lot of people looking to get you… • The Government • Your personal enemies • Your employers • People on a mission • The Various Underground Scenes • ^ These guys are probably the most dangerous
Because people engage in a lot of criminal activity… • Downloading music • Downloading movies • Downloading games • Internet Gambling • Looking at illegal material (e.g., porn…) • Or maybe you were just surfing the net as usual…
Jeff Jenkins Don’t learn to hack, hack to learn
Bryan W. Do you want to do what I just did? Google: Wireshark
Sniffing • To inhale a short, audible breath through the nose, as in smelling something. • To sniffle. • To use the sense of smell, as in savoring or investigating: sniffed at the jar to see what it held. • To regard something in a contemptuous or dismissive manner: The critics sniffed at the adaptation of the novel to film. • Informal To pry; snoop:
Sniffing • intercept and log traffic passing over a digital network or part of a network • In other words, a program that lets other people see what traffic is passing on the internet
Wireshark Example • http://www.wireshark.org/ • Good uses too!
Solutions • Don’t use an unsecure network (e.g., UAPublic, someone else’s wireless network) • Encryption! • Don’t host an open wireless network (for many other reasons too)!!!!!! !!!!!! !!!!!!
Grandma B. • Prevention Technique: • Be careful opening up weird looking attachments Do you want to do what I just did? Google: Email Spoofing
Spoofing • Pretending to be someone you’re not
When do people do this? • Caller ID spoofing • Email spoofing • Web site spoofing • URL spoofing
Caller ID Spoofing • http://www.telespoof.com/
Email and SMS Spoofing • iamafathacker@gmail.com • www.hoaxmail.co.uk
Preventions • Anti-spyware; anti-virus protection • Spam filters • Certificate authorities: • Email: http://www.thawte.com/resources/personal-email-certificates/index.html • Web site: http://www.thawte.com/r
Nik Y. Do you want to do what I just did? Google: Hosts File
Prevention • Virus protection • Don’t give out passwords • Spam Filters
Julia L. Do you want to do what I am going to do? Google: BackTrack
Physical Security • If I can get to your computer…. I can access stuff!!!!! Password or not!
Prevention Technique: • Keep your computer in a safe place • Locks? • Encrypt Data
Why does Windows update so often? • A security patch is a change applied to an asset to correct the weakness described by a vulnerability. This corrective action will prevent successful exploitation and remove or mitigate a threat’s capability to exploit a specific vulnerability in an asset.
What can someone do if they get into your system through an unpatched security vulnerability? • Everything
Prevention • Install those updates and patches • Be careful which Web sites you visit • Be care which attachments you open up
Weak Password • http://www.lockdown.co.uk/?pg=combi
Prevention • Passphrases • Memorize
Protecting Information • Access Controls: Authentication • Something the User Is • Biometrics • Something the User Has • ID Cards • Something the User Does • Voice/Signature Recognitions • Something the User Knows • Passwords
They Click on Stuff and Install Stuff Virus Trojan horse Worm
Virus • A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
Trojan Horse • A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
Worm • A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.