Title: Security
1Security
- WeeSan Lee weesan_at_cs.ucr.edu
2Roadmap
- Security Risks
- Preventions
- References
3Security Risks
- Computer Virus
- Worm
- Trojan Horse
- Adware
- Spyware
- Browser Hijacker
- Web Bug
- Email Hoaxes Chain Letters
- Phishing
4Security Risks - Computer Virus
- A small computer program that infects your
computer without permission or knowledge of the
user - Infects others via a host media
- Floppy disk
- Email
-
http//www.healthinitiative.org/IMAGES/virus_big.j
pg
5Security Risks - Worm
- A self-replicating program, spreads across the
Internet - May contain viruses
- 1st worm was created by Robert T. Morris, a
graduate student at Cornell U. in 1988 - Computer Emergency Response Team (CERT) was
created as a result
http//tbn0.google.com/images?qtbnFuQHZgw5DccTfM
http//co.marion.or.us/NR/rdonlyres/481BF728-146C
-49E6-8C61-3D79ADD691F2/5465/worm.JPG
6Security Risks - Trojan Horse
- A program that disguises itself to be something
useful or harmless - Eg. screensaver
- In fact, a backdoor program which allows
unauthorized access remotely
http//en.wikipedia.org/wiki/ImageTrojan_horse_C
387anakkale.jpg
7Security Risks - Adware
- An advertising-supported software
8Security Risks - Spyware
- Adware collecting users information without
the users consent
9Security Risks - Browser Hijacker
- A program that changes the settings on the web
browser - Change the homepage to other website
10Security Risks - Web Bug
- Originally, use 1x1 image embedded in web pages
or HTML emails to keep track of users - AKA web beacon, tracking bug,
- To avoid that
- Turn off image loading on email clients
- Use text-based email such as pine ?
http//www.prospexis.net/images/beatle2.gif
11Security Risks - Hoaxes and Chain Letters
- Hoaxes are fake warnings, instructing you to
delete files, playing on your sympathy, etc - Chain letters implore you to pass the message to
as many people as possible - For examples
- This is not a hoax.
- Forward this email to 10 people you know for
good luck - VIRUS! DELETE NTFS.SYS
12Security Risks - Phishing
13Security Risks - Phishing
14Preventions
- Use anti-virus/firewall software
- For examples
- AVG (http//free.grisoft.com/)
- Nod32 (http//www.eset.com/)
- Norton Antivirus (http//www.symantec.com/)
- Schedule auto-update
15Preventions (cont)
- Backup
- Use 2 HDs
- Burn CDs/DVDs and give them to your mom
- Use online backup services
- http//www.carbonite.com/
- Be educated
- Dont fool around
16References
- Internet Effectively
- Ch 1
- Ch 4
- Wikipedia
- http//www.wikipedia.com/