+ All Categories
Home > Documents > COSC1078 Introduction to Information Technology Lecture 22 Internet Security

COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Date post: 07-Jan-2016
Category:
Upload: semah
View: 38 times
Download: 1 times
Share this document with a friend
Description:
James Harland [email protected]. COSC1078 Introduction to Information Technology Lecture 22 Internet Security. Introduction to IT. 1 Introduction 2 Images 3 Audio 4 Video 5 Binary Representation WebTest 1, Assignment 1 6 Data Storage - PowerPoint PPT Presentation
Popular Tags:
19
Lecture 22: Internet Security Intro to IT COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland [email protected]
Transcript
Page 1: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 22: Internet Security Intro to IT

COSC1078 Introduction to Information Technology

Lecture 22

Internet SecurityJames Harland

[email protected]

Page 2: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 20: Internet Intro to IT

Introduction to IT

1 Introduction

2 Images

3 Audio

4 Video

5 Binary Representation WebTest 1, Assignment 1

6 Data Storage

7 Machine Processing

8 Review WebLearn Test 2

9 Processes Assignment 2

10 Internet

11 Internet Security   WebLearn Test 3

12 Future of IT Assignment 3, Peer and Self Assessment

Page 3: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 21: Internet Security Intro to IT

Overview

Questions?

Mock Exam

Assignment 3

Peer and Self Assessment

Internet Security

Questions?

Page 4: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 6: Audio Intro to IT

Mock Exam

Date and time to be confirmed Bring your own paper, pens, etc. No calculators allowed Answers will be available from me when you leave

Schedule (times to be confirmed):

(assuming room available 10.00-12.30) 10.00 Access to room 10.15 Reading time commences 10.30 Writing time commences 12.30 Exam concludes

Page 5: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 21: Internet Security Intro to IT

Assignment 3

Review

(re-) answer What is IT? questions from Tutorial 1

Identify difficult parts of the course

Suggest new questions

Include favourites from Assignments 1 and 2

Reflect

Answer reflection questions from tutorials

Research

Write about a particular IT topic of your choice

(5-6 paragraphs)

Page 6: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 21: Internet Security Intro to IT

Internet Security

pass wordpatch spa

mfire wall

virus war drivingkey logge

r

proxy worm

phishing

Trojan horse

Page 7: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Security vs access

It is always a trade-off (a balance between two competing forces)

More security means less access

More access means less security

Redundancy can be either fatal or vital

Nothing is perfect!

Page 8: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Freedom vs security `Everything which is not forbidden is allowed’

-- Principle of English Law `Everything which is not allowed is forbidden’

-- Common security principle

`Anything not mandatory is forbidden’

-- “military policy” `Anything not forbidden is compulsory’ (??)

— T.H. White (The Once and Future King)

Page 9: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Passwords

Should be: Long (8 characters or more) Not obvious or from a dictionary Contain capitals, numerals and non-

alphanumeric characters (!&^*$@.,’[]{}? …) Recorded securely somewhere Transmitted in encrypted form only Older programs such as FTP, Telnet transmit

this in plaintext …

Page 10: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Firewalls

Device which limits internet connections Limit network uses to only approved ones Prevent malicious software reporting

information Prevent outside attacks May need to have ports opened to allow

applications to work Only work on applications, not on content

Page 11: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Proxy servers

All internet traffic routed via proxy server Acts as an internet gateway Once proxy is secure, so is network Can filter content Can cache content Often used with a firewall in a corporate

environment

Page 12: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Wardriving

Driving around to find a vulnerable wireless signal Find a wireless connection that doesn’t require a

password (so add one to yours if you haven’t!) Attack systems that use a default admin login

name and password (change yours!) Snoop on transmissions which are not encrypted

(encrypt yours!)

Using a MAC address whitelist means only specified devices can connect to your router

Page 13: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Viruses,Worms,Trojans

Virus: self-replicating program that attaches itself to files and is spread when they are transferred

Worm: self-replicating program that pro-actively spreads itself

Trojan horse: a program that appears legitimate but is in fact malicious

Page 14: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Malware and Spyware Malicious software: Hidden mail server Key logging (to capture passwords) Enable machine takeover Direct traffic to particular web sites Analyse behaviour Act as a proxy …

Page 15: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Denial of service

Prevent network from working normally Flood a server with ‘invalid’ inputs Use a network of compromised machines

to generate an overwhelming number of requests (Conficker?)

Such zombie machines can form a botnet, which then attack a particular server

Page 16: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Tricking the user

Users are often the weakest link in security Email attachments containing trojan horses ‘Phishing’ Malicious web pages Malicious documents (macros in spreadsheets) Account stealing (via key logging) Scams (‘I have $10 million to import’, ‘You

have just won the lottery’, …)

Page 17: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Protecting your system

Keep up to date with patches (Windows update, Software update)

Use a firewall Use anti-virus software and keep it up to date Use anti-spyware tools Filter email for spam and suspicious messages Be aware of ‘fake alerts’

Page 18: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 7: Internet Security Intro to IT

Stuxnet?

Windows-based worm Discovered in July, 2010 Designed to attack a very specific industrial

plant Assumes plant operator would use a Windows

laptop to reprogram plant machinery Not clear who was behind it … Look at the video

Page 19: COSC1078 Introduction to Information Technology Lecture 22 Internet Security

Lecture 21: Internet Security Intro to IT

Conclusion

Work on Assignment 3

Check your software defenses!


Recommended