lect4_2015

Post on 07-Dec-2015

215 views 1 download

Tags:

description

informatic

transcript

4. lecture4. lecture

Technical informaticsTechnical informatics

Last lecture

• Operating systems– History – development, task, versions– Mobile OS

• Info-communication– Solutions– Applications

Outline

• System sw, applications, utilities• Virus/malware protection• Firewalls• Encryption and e-signs• Archivers• Office applications• LibreOffice• PDF

Software types

• System sw: operating software• Application software

– For a particular area, task

• Utility programs– Secure operation– Additional help for the user

Computer security• Before 1980

– No network– Computers operated by experts

• After 1990– Computers on networks– Not only expert users

• After 2005– Every device is connected– Wide range of users/applications

Damage• Why do they attack?

– Data– Passwords, codes (phishing)– Resource

• EU: over 22 billion €/year• Hacker – Cracker, Government

Viruses

Computer viruses are programs deliberately designed to interfere with computer operation, record, corrupt, or delete data, or spread themselves to other computers and throughout the Internet, often slowing things down and causing other problems in the process.

Worms

A worm is a specific type of virus that propagates itself across many computers, usually by creating copies of itself in each computer’s memory.

Trojans

A Trojan Horse, similar to its Greek mythological counterpart, often presents itself as one form while it is actually another.

Spywares

Spyware refers to software that performs certain tasks on the computer, typically without the user’s consent. This may include giving advertising or collecting personal information (e.g. passwords) about the user.

Malware

Other unwanted applications

• Adware (<>spyware)• Financing software• Uncareful installing

– Java and the ask toolbar– Zonealarm and the Firefox browser

Botnet - zombies

• DoS – Denial of Service, DDoS – Distributed DoS

• Infection and sending SPAMs within seconds• Difficult identification (detecting origin IP)• Unequal computer security (by government)• Mobile phone botnet

SPAM

• Unsolicited, unwanted, irrelevant or inappropriate messages, especially for commercial advertising in mass quantities („junk mail”)

• 50-90% of emails• 2005: 50+ billion USD• Protection/filtering

– By the service provider– At home

Phishing

• Acquiring sensitive information (passwords, credit card numbers etc.)

• Fake web sites (e.g. PayPal)• VoIP phishing• How to protect?

– Reporting phising– Browser settings– Cautious behaviour

How can our computer be infected?

• WEB• E-mail• Copying data

–CD-ROM, Pen-drive…

How to protect?

• Virusbuster, antispyware• Software updates (SP, patches)• Software settings (e.g. mails, browsers)• Firewall• Passwords

– Alternative methods

• Back-up!

Antivirus software• Utility program, runs in the background

– Shield

• Parameters– Virus-library, clearing rate, reaction speed,

platform dependency, heuristic search, price, trial version…

• NOD32 (ESET), VirusBuster, Norton Antivirus (Symantec), Virusscan (McAfee)

Antivirus functions I. (example)

• Integrated control panel• Virus and spyware protection• Firewall• SPAM filter• Botnet protection• Memory protecion• Exploit blocking• Social media scanner

Antivirus functions II. (example)

• Steel protection• Phising protection• Idle scanning• Energy saving mode• Cloud-based protection• Protecting external drives• Parental surveillance

Antispyware

• Recognizing and destroying spyware• Ad-Aware (Lavasoft), Spykiller

(TrustSoft), McAffee Antispyware • MS AntiSpyware

–Windows Defender (Vista)

Firewalls

• A firewall is a program or hardware device that filters the information coming through the Internet connection into private network or computer system .

• Software/hardware firewalls

Firewall

Firewall settings

Firewall messages

Windows (7) protection

Mobile security

• Viruses– Cabir – bluetooth– Smart phones

• Phising• Licenses, regulations; iPhone – jailbreak• No efficient antivirus software

Mobile platform security

• Open/closed application, platform and hardware

• Level of platform fragmentation• What is modified by Android supplier?

Blackberry

• 40% of financing service poviders use Blacberry

• Server at RIM• Data encryption on the device• Direct connection between group members• Fast messaging• Exception: governmental control (e.g.

counterterrorist activities)

Encryption

•Encryption is a mathematical process that modifies information in a way that makes it unreadable until the exact same process is reversed.

•Algorithm (cipher) + key•Encrypted data storage

– EFS (NTFS)– TrueCrypt, BitLocker

Encryption methods• Symmetric key

– Advantage: simple, fast– Shortcoming: shared secret key

• Asymmetric key– Public key, private key– Safe but slow

• Combination of symmetric and asymetric methods (pl. SSL, SSH)

SSL• Secure Socket Layer

• Safe transfer protocol • Communication between webservers and

clients• Supported by the new web-based mail

systems, in order to keep e-business safe; https://...

• Communication channel encryption, not verification

E-sign

Verification not encryption: Signing the documents/data with a digital signature assures that it comes from the sender and hasn't been altered or corrupted since it was created and signed.

Browser/mail client security settings

Compression and archiver utilities

• Reducing the number of bits for storing data

• Lossy data compression– Images, video

• Lossless data compression– Pl. text

• DOS: arj, rar…• Windows: winzip, winrar…

OFFICE

• Office applications for Windows (even for Windows Phone and 8) and Mac OS

• MS versions: standard, home, student, professional etc.

Office desktop applications

• Word, Excel, PowerPoint, Outlook, Access• Microsoft Access — database manager• Microsoft InfoPath — an application to design rich XML-based forms• Microsoft OneNote — note-taking software for use with both tablet and conventional PCs• Microsoft Project — project management software to keep track of events and to create

network charts and Gantt charts (not bundled in any Office suite)• Microsoft Publisher — desktop publishing software mostly used for designing brochures,

labels, calendars, greeting cards, business cards, newsletters, and postcards.• Microsoft SharePoint Workspace (formerly known as Groove) — a proprietary peer-to-peer

collaboration software leveled at businesses• Microsoft Visio — diagram and flowcharting software (not bundled in any Office suite)• Microsoft Office InterConnect — business-relationship database available only in Japan• Microsoft Office Picture Manager — basic photo management software (similar to Google's

Picasa or Adobe's Photoshop Elements), replaced Microsoft Photo Editor

Office environment

Office 2010

• Environment• 32/64 bit versions (add-ons!)• Web Apps

– Multiuser mode: multiple users working on the same documents

– www.live.com

• Multimedia support in powerpoint, links from web

Office365

• Monthly subscription, continuous network connection• All MS Office applications, always updated• 5 computers (Windows and Mac) + 5 (Windows OS)

tablet/smart phone• Storage on OneDrive, synchronized devices• Win 7 and Mac OS X 10.6 and newer versions• Premium version

– 1TB storage space/user– 60 international Skype minutes

Google docs, spreadsheet…

• Drive (2012 April), 15GB (100GB/$5), HTML, PDF, TXT etc.

LibreOfficewww.libreoffice.org: LibreOffice is the power-packed free, libre and open source personal productivity suite for Windows, Macintosh and GNU/Linux, that gives you six feature-rich applications for all your document production and data processing needs: Writer, Calc, Impress, Draw, Math and Base. Support and documentation is free from our large, dedicated community of users, contributors and developers.

LibreOffice applications

• Writer• Calc• Impress• Draw• Math• Base

Advantages - shortcomings

• Free, multiplatform, multilingual • Reliable

– OpenOffice– LibreOffice v4.4.1

• Standardized software package–Environment, databases

• Market penetration

LibreOffice environment

PDF (Portable Document Format)• AdobeAdobe

Recent version: Adobe Acrobat Recent version: Adobe Acrobat XIXI Acrobat for Acrobat for mobile platformsmobile platforms Different solutions (standard/pro)Different solutions (standard/pro)

Adobe Creative CloudAdobe Creative Cloud Main featuresMain features

Convert PDFs to other formatsConvert PDFs to other formats Edit PDF documentsEdit PDF documents Create and analyze formsCreate and analyze forms Create PDF filesCreate PDF files Merge and combine filesMerge and combine files Simplify reviews and approvalsSimplify reviews and approvals Protect PDF filesProtect PDF files Prepare files consistentlyPrepare files consistently Work with new cloud servicesWork with new cloud services

PDF, fonts, application fields

• StandardStandard• MMultiplatformultiplatform• Vector + raster, saves format, search in pdf Vector + raster, saves format, search in pdf

documentsdocuments• Compression, authorizationCompression, authorization• Even fonts can be stored in PDFEven fonts can be stored in PDF• Application fieldsApplication fields

• Printing, publishingPrinting, publishing• InternetInternet

Control questions

• What is a computer virus/worm/trojan?• How can we protect computers against viruses?• How can we use firewalls?• What kind of archivers do you know?• What encryption methods do you know?• What does an Office suite contain?• What’s the difference between MS Office and

LibreOffice?• What are the main advantages of using PDF?

References• http://www.microsoft.com/hun/athome/security/viruses/virus101.mspx• http://www.microsoft.com/hun/biztonsag/7fogas1.mspx• http://www.microsoft.com/hun/security/protect/spyware.mspx• http://www.microsoft.com/hun/security/protect/firewall.mspx• http://ecdlweb.uw.hu/m7-15.html• http://facesreklam.hu/help/grafikai_formatumok.htm• http://www.hvgpress.hu/index.php?option=com_generic_editor&Itemid=185• http://www.iesz.hu/index.php?word_id=97• http://www.cert.hu/ismert/11felhasznalo/hcs_hun.html?a=mod#intro• http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp• http://www.libreoffice.org/• http://www.x2net.com/webcompiler/authenticode.htm• http://www.adobe.com

Thanks for your attention!