Post on 07-Dec-2015
description
transcript
4. lecture4. lecture
Technical informaticsTechnical informatics
Last lecture
• Operating systems– History – development, task, versions– Mobile OS
• Info-communication– Solutions– Applications
Outline
• System sw, applications, utilities• Virus/malware protection• Firewalls• Encryption and e-signs• Archivers• Office applications• LibreOffice• PDF
Software types
• System sw: operating software• Application software
– For a particular area, task
• Utility programs– Secure operation– Additional help for the user
Computer security• Before 1980
– No network– Computers operated by experts
• After 1990– Computers on networks– Not only expert users
• After 2005– Every device is connected– Wide range of users/applications
Damage• Why do they attack?
– Data– Passwords, codes (phishing)– Resource
• EU: over 22 billion €/year• Hacker – Cracker, Government
Viruses
Computer viruses are programs deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet, often slowing things down and causing other problems in the process.
Worms
A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer’s memory.
Trojans
A Trojan Horse, similar to its Greek mythological counterpart, often presents itself as one form while it is actually another.
Spywares
Spyware refers to software that performs certain tasks on the computer, typically without the user’s consent. This may include giving advertising or collecting personal information (e.g. passwords) about the user.
Malware
Other unwanted applications
• Adware (<>spyware)• Financing software• Uncareful installing
– Java and the ask toolbar– Zonealarm and the Firefox browser
Botnet - zombies
• DoS – Denial of Service, DDoS – Distributed DoS
• Infection and sending SPAMs within seconds• Difficult identification (detecting origin IP)• Unequal computer security (by government)• Mobile phone botnet
SPAM
• Unsolicited, unwanted, irrelevant or inappropriate messages, especially for commercial advertising in mass quantities („junk mail”)
• 50-90% of emails• 2005: 50+ billion USD• Protection/filtering
– By the service provider– At home
Phishing
• Acquiring sensitive information (passwords, credit card numbers etc.)
• Fake web sites (e.g. PayPal)• VoIP phishing• How to protect?
– Reporting phising– Browser settings– Cautious behaviour
How can our computer be infected?
• WEB• E-mail• Copying data
–CD-ROM, Pen-drive…
How to protect?
• Virusbuster, antispyware• Software updates (SP, patches)• Software settings (e.g. mails, browsers)• Firewall• Passwords
– Alternative methods
• Back-up!
Antivirus software• Utility program, runs in the background
– Shield
• Parameters– Virus-library, clearing rate, reaction speed,
platform dependency, heuristic search, price, trial version…
• NOD32 (ESET), VirusBuster, Norton Antivirus (Symantec), Virusscan (McAfee)
Antivirus functions I. (example)
• Integrated control panel• Virus and spyware protection• Firewall• SPAM filter• Botnet protection• Memory protecion• Exploit blocking• Social media scanner
Antivirus functions II. (example)
• Steel protection• Phising protection• Idle scanning• Energy saving mode• Cloud-based protection• Protecting external drives• Parental surveillance
Antispyware
• Recognizing and destroying spyware• Ad-Aware (Lavasoft), Spykiller
(TrustSoft), McAffee Antispyware • MS AntiSpyware
–Windows Defender (Vista)
Firewalls
• A firewall is a program or hardware device that filters the information coming through the Internet connection into private network or computer system .
• Software/hardware firewalls
Firewall
Firewall settings
Firewall messages
Windows (7) protection
Mobile security
• Viruses– Cabir – bluetooth– Smart phones
• Phising• Licenses, regulations; iPhone – jailbreak• No efficient antivirus software
Mobile platform security
• Open/closed application, platform and hardware
• Level of platform fragmentation• What is modified by Android supplier?
Blackberry
• 40% of financing service poviders use Blacberry
• Server at RIM• Data encryption on the device• Direct connection between group members• Fast messaging• Exception: governmental control (e.g.
counterterrorist activities)
Encryption
•Encryption is a mathematical process that modifies information in a way that makes it unreadable until the exact same process is reversed.
•Algorithm (cipher) + key•Encrypted data storage
– EFS (NTFS)– TrueCrypt, BitLocker
Encryption methods• Symmetric key
– Advantage: simple, fast– Shortcoming: shared secret key
• Asymmetric key– Public key, private key– Safe but slow
• Combination of symmetric and asymetric methods (pl. SSL, SSH)
SSL• Secure Socket Layer
• Safe transfer protocol • Communication between webservers and
clients• Supported by the new web-based mail
systems, in order to keep e-business safe; https://...
• Communication channel encryption, not verification
E-sign
Verification not encryption: Signing the documents/data with a digital signature assures that it comes from the sender and hasn't been altered or corrupted since it was created and signed.
Browser/mail client security settings
Compression and archiver utilities
• Reducing the number of bits for storing data
• Lossy data compression– Images, video
• Lossless data compression– Pl. text
• DOS: arj, rar…• Windows: winzip, winrar…
OFFICE
• Office applications for Windows (even for Windows Phone and 8) and Mac OS
• MS versions: standard, home, student, professional etc.
Office desktop applications
• Word, Excel, PowerPoint, Outlook, Access• Microsoft Access — database manager• Microsoft InfoPath — an application to design rich XML-based forms• Microsoft OneNote — note-taking software for use with both tablet and conventional PCs• Microsoft Project — project management software to keep track of events and to create
network charts and Gantt charts (not bundled in any Office suite)• Microsoft Publisher — desktop publishing software mostly used for designing brochures,
labels, calendars, greeting cards, business cards, newsletters, and postcards.• Microsoft SharePoint Workspace (formerly known as Groove) — a proprietary peer-to-peer
collaboration software leveled at businesses• Microsoft Visio — diagram and flowcharting software (not bundled in any Office suite)• Microsoft Office InterConnect — business-relationship database available only in Japan• Microsoft Office Picture Manager — basic photo management software (similar to Google's
Picasa or Adobe's Photoshop Elements), replaced Microsoft Photo Editor
Office environment
Office 2010
• Environment• 32/64 bit versions (add-ons!)• Web Apps
– Multiuser mode: multiple users working on the same documents
– www.live.com
• Multimedia support in powerpoint, links from web
Office365
• Monthly subscription, continuous network connection• All MS Office applications, always updated• 5 computers (Windows and Mac) + 5 (Windows OS)
tablet/smart phone• Storage on OneDrive, synchronized devices• Win 7 and Mac OS X 10.6 and newer versions• Premium version
– 1TB storage space/user– 60 international Skype minutes
Google docs, spreadsheet…
• Drive (2012 April), 15GB (100GB/$5), HTML, PDF, TXT etc.
LibreOfficewww.libreoffice.org: LibreOffice is the power-packed free, libre and open source personal productivity suite for Windows, Macintosh and GNU/Linux, that gives you six feature-rich applications for all your document production and data processing needs: Writer, Calc, Impress, Draw, Math and Base. Support and documentation is free from our large, dedicated community of users, contributors and developers.
LibreOffice applications
• Writer• Calc• Impress• Draw• Math• Base
Advantages - shortcomings
• Free, multiplatform, multilingual • Reliable
– OpenOffice– LibreOffice v4.4.1
• Standardized software package–Environment, databases
• Market penetration
LibreOffice environment
PDF (Portable Document Format)• AdobeAdobe
Recent version: Adobe Acrobat Recent version: Adobe Acrobat XIXI Acrobat for Acrobat for mobile platformsmobile platforms Different solutions (standard/pro)Different solutions (standard/pro)
Adobe Creative CloudAdobe Creative Cloud Main featuresMain features
Convert PDFs to other formatsConvert PDFs to other formats Edit PDF documentsEdit PDF documents Create and analyze formsCreate and analyze forms Create PDF filesCreate PDF files Merge and combine filesMerge and combine files Simplify reviews and approvalsSimplify reviews and approvals Protect PDF filesProtect PDF files Prepare files consistentlyPrepare files consistently Work with new cloud servicesWork with new cloud services
PDF, fonts, application fields
• StandardStandard• MMultiplatformultiplatform• Vector + raster, saves format, search in pdf Vector + raster, saves format, search in pdf
documentsdocuments• Compression, authorizationCompression, authorization• Even fonts can be stored in PDFEven fonts can be stored in PDF• Application fieldsApplication fields
• Printing, publishingPrinting, publishing• InternetInternet
Control questions
• What is a computer virus/worm/trojan?• How can we protect computers against viruses?• How can we use firewalls?• What kind of archivers do you know?• What encryption methods do you know?• What does an Office suite contain?• What’s the difference between MS Office and
LibreOffice?• What are the main advantages of using PDF?
References• http://www.microsoft.com/hun/athome/security/viruses/virus101.mspx• http://www.microsoft.com/hun/biztonsag/7fogas1.mspx• http://www.microsoft.com/hun/security/protect/spyware.mspx• http://www.microsoft.com/hun/security/protect/firewall.mspx• http://ecdlweb.uw.hu/m7-15.html• http://facesreklam.hu/help/grafikai_formatumok.htm• http://www.hvgpress.hu/index.php?option=com_generic_editor&Itemid=185• http://www.iesz.hu/index.php?word_id=97• http://www.cert.hu/ismert/11felhasznalo/hcs_hun.html?a=mod#intro• http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp• http://www.libreoffice.org/• http://www.x2net.com/webcompiler/authenticode.htm• http://www.adobe.com
Thanks for your attention!