Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who...
-
Upload
godfrey-long -
Category
Documents
-
view
214 -
download
0
Transcript of Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who...
PERSONAL COMPUTER SECURITY
Sydney BaizeMrs. Shirley MillerBPC110
“To connect your computer to the Internet
is to be in danger” -Gralla
PC Revolution
1998 2003 20100.00%
10.00%20.00%30.00%40.00%50.00%60.00%70.00%80.00%
US Households with PCs
Hackers“In the most familiar sense, a hacker is anyone who attempts to break into computer systems
by surreptitious means.” –Hess
Send probes• See which computers
have Back Orifice
Controls• Uses BO to enter
computer and gather whatever information they want
Back Orifice:
A computer program
that enables a user to
control a computer with
Microsoft Windows OS
from a remote location.
VuzeLimeWire
Dangers
Hackers can do infinite amounts of damage to a computer once they have control. Gather info
History Files Passwords
Hack other computers
ProtectionFirewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic.
Examine• Check data
packets the computer is receiving
Search• Look to see
if packets are being sent to certain ports
Block and/or Alert
FirewallsBlock
selectively or all packets
sent to common
hacker used ports
Alert user when
programs attempt to connect to Internet
Block specific IP addresses
Keep log of every
attempted probe/attack
made
Spyware
Many types of Spyware 2 things in common
1. Spy ▪ Track searches▪ Record keystrokes▪ Watch pages visited▪ Open backdoor
2. Install without knowledge▪ Piggyback other software▪ Be misleading
Dangers
Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable.
Spyware is tricky When software it piggybacked from is
deleted, the Spyware is not Can be Polymorphic- spawns new copies in
other locations when detected
Protection
Spyware is most commonly used to make
money. • Anti-spyware is a necessity• Special spyware deleting software is sometimes needed as well
Anti-Spyware
Scans• Searches system for
bits called signatures: signs of obvious infection
Compares• Compares found
signature to ones in its database.
• If a match is found- there is an infection.
Deletes• Deletes the spyware
once it’s found, may require special program since spyware can often leave traces in more than one place
Anti-Spyware
Looks for suspicious behavior
Constantly updates to keep track of latest infections
Works in real time: watches for signs of spyware being installed or pages
being hijacked
Tips
• Know the dangers of the Web
• Share as little personal info as possible
• Don’t look past suspicious behavior
• Install reputable protection software
Works CitedGralla, Preston. How Personal & Internet Security Work. Indianapolis: Que Publishing, 2006.Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014 <http://www.microsoft.com/en-us/download/details.aspx?id=29046&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+MicrosoftDownloadCenter+%28Microsoft+Download+Center%29#tm>.Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014 <http://support.microsoft.com/kb/49500>.U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999.US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.