SlideShare a Scribd company logo
1 of 9
Download to read offline
11/17/2008




                                                  Big IT Firm Gets It!


                ITMA         Fall 2008 K.Ng




                                                                    From www.engadget.com

17-Nov-08        ITAM K.Ng                    1   17-Nov-08             ITAM K.Ng              2




In the News…                                      In the News…




            明報14Oct2008
                                                  都市日報 4 Nov 2008
17-Nov-08        ITAM K.Ng                    3   17-Nov-08             ITAM K.Ng              4




                                                  And remember this?

Even President
gets it…




17-Nov-08        ITAM K.Ng                    5   17-Nov-08             ITAM K.Ng              6




                                                                                                    1
11/17/2008




What you will learn?                           What is computer security?
     Types of threats                              Protection of computing systems and
     Guidelines on protecting yourself              the data that they store or access.




17-Nov-08                 ITAM K.Ng       7    17-Nov-08                  ITAM K.Ng                      8




                                               What could happen if your computer is
Why is it important?                           compromised?
 Enable you to carry out your duties          1.      Could be used to hide programs that launch
                                                       attacks on other computers.
 Protect personal and sensitive info.
                                               2.      Could be generating large volumes of unwanted
                                                       traffic, slowing down the entire system.
                                               3.      Someone could be distributing illegal software
                                                       from your computer.
                                               4.      Someone could access personal info. From your
                                                       computer.
                                               5.      Someone could record all of your keystrokes and
                                                       get your passwords.

17-Nov-08                 ITAM K.Ng       9    17-Nov-08                  ITAM K.Ng                  10




Answer?                                        It is NOT just an IT problem
     All of the above!                         10% of security safeguards are
                                                 technical.
                                                90% of security safeguards rely on the
                                                 computer user to observe good
                                                 practices.

                                                   IT Security is everyone’s responsibility!!!



17-Nov-08                 ITAM K.Ng       11   17-Nov-08                  ITAM K.Ng                  12




                                                                                                             2
11/17/2008




Social Engineering                                                                                                              Three common examples
     The practice of obtaining confidential info. by                                                                           1.       Spam scams: deceptive emails to get people
      manipulation of legitimate users.
                                                                                                                                         to reveal info.
     Users are the weakest link in security.
     “They” will use the telephone, Internet, email to                                                                         2.       Impersonation: pose as someone in authority
      trick people into revealing sensitive info. or get                                                                                 or IT personnel to obtain info. or access to
      them to do something against the policy.                                                                                           systems.
     For more info:
       http://hk.youtube.com/watch?v=xn9hH1BckPE                                                                               3.       Dumpster diving: go thro’ trash to obtain
       “The Art of Deception”, Kelvin Mitnick, 2003.                                                                                    valuable info.
       Movie (2000) & book (1996) “Takedown”




17-Nov-08                                                ITAM K.Ng                                                         13   17-Nov-08                           ITAM K.Ng                       14




Case (1)                                                                                                                        Safely destroy files on HD?
     Mr Chapman found important                                                                                                        This?
      personal data on a computer
                                                                                                                                     •      http://hk.youtube.com/watch?v=dMjLRBooSD0
      he bought on ebay.
     Affected a million bank                                                                                                           Or this?
      customers from RBS,                                                                                                            •      http://hk.youtube.com/watch?v=8M9fNu3X1K4
      NatWest, AmEx.                                                                                                                    Or this?
     Under investigation by the Info
                                                                                                                                     •      http://hk.youtube.com/watch?v=jGXh6RVTuq0
      Commissioner

                                                                                     £35 from eBay!

             From Daily Mail UK, 27Aug08
http://www.dailymail.co.uk/news/article-1049121/Government-probe-launched-details-million-bank-customers-sold-eBay.html#

17-Nov-08                                                ITAM K.Ng                                                         15   17-Nov-08                           ITAM K.Ng                       16




Cheaper solutions…                                                                                                              Spam scams
     http://www.fileshredder.org/                                                                                                      Phishing
                                                                                                                                          Email asks you to go to a website to update your
     http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml                                                                                  personal info.
                                                                                                                                          Phishing scam archive
                                                                                                                                           ○ http://millersmiles.co.uk/
                                                                                                                                        Phony security alert
                                                                                                                                          Emails or pop-up windows warn that your computer is
                                                                                                                                            at risk of being infected or hacked and contain an
                                                                                                                                            attachment or link to a patch to fix the problem.
                                                                                                                                        Nigerian bank account scam
                                                                                                                                          Collect your money and bank account info.


17-Nov-08                                                ITAM K.Ng                                                         17   17-Nov-08                           ITAM K.Ng                       18




                                                                                                                                                                                                         3
11/17/2008




Examples of phone prank                                 Sarah Palin called by Nicolas!
 A very popular radio program in the late 80s.
 軟硬天師 整蠱電話
 e.g. http://hk.youtube.com/watch?v=HuAzLgutOME




                                                        http://hk.youtube.com/watch?v=k4aHL12vtEM

17-Nov-08             ITAM K.Ng                    19   17-Nov-08                        ITAM K.Ng                    20




Avoid social engineering                                Computer Viruses
 DO NOT give sensitive personal info. to
  anyone you don’t know or who doesn’t
  have a legitimate need for it.
 Destroy or securely erase sensitive info.
  before recycling or throwing it away.
 Delete unsolicited emails immediately.
 Sounds too good to be true? It is!
 Report to the authority.


17-Nov-08             ITAM K.Ng                    21   17-Nov-08                        ITAM K.Ng                    22




What is it?                                             Types of viruses (i)
 A self-replicating program that spreads                    Macro Viruses
  by inserting copies of itself onto other                     Use command (macros) embedded in other
  executable code or documents.                                     software to infect and spread to other files
                                                                    viewed by that software, e.g. Word/Excel.
 It will perform a function, e.g. delete
  certain files.




17-Nov-08             ITAM K.Ng                    23   17-Nov-08                        ITAM K.Ng                    24




                                                                                                                           4
11/17/2008




Macro Protection in Word 2007                               Types of viruses (ii)
                                                                 Worms
                                                                   Duplicate themselves and use
                                                                        communications such as emails to spread.
                                                                        They can look at your email address book
                                                                        and send themselves to users in your
                                                                        address book.




17-Nov-08                       ITAM K.Ng              25   17-Nov-08                         ITAM K.Ng                        26




Worms examples                                              Type of viruses (iii)
     Spyworm.Win32                                              File viruses
                                                                   Attach themselves to other software. When
                                                                        the software is run, the virus first loads itself
                                                                        into memory so that it can further infect
                                                                        other files or begin damaging the computer.
                                                                 Trojan
                                                                   Programs that claim to perform a particular
                                                                        function but in fact do something different



17-Nov-08                       ITAM K.Ng              27   17-Nov-08                         ITAM K.Ng                        28




Type of viruses (iv)                                        Example
     Backdoor Trojans                                           “I Love You” and “Bagle” worms
       Programs that allow other computer users to                They spread themselves via email
            remotely control your computer via                          attachments.
            networks.                                              It sends an email with itself as an
     Boot Sector Viruses                                           attachment to everyone in that computer’s
       Infect a computer’s startup program so that
                                                                    email address books.
            the virus would become active as soon as               Worms are also often designed to use up
            the computer started up.                                resources on that computer, such as,
                                                                    memory and processing power.



17-Nov-08                       ITAM K.Ng              29   17-Nov-08                         ITAM K.Ng                        30




                                                                                                                                    5
11/17/2008




Virus Scanners                                               Malware
     Online scanner                                              A general term for software that is
       http://housecall65.trendmicro.com                          installed on your computer without your
                                                                   knowledge and often your consent to
                                                                   perform various tasks.
     Free (non-commercial use)
       http://free.avg.com Grisoft’s AVG
       http://www.free-av.com Avira AntiVir Personal
       http://www.avast.com Avast! Home Ed.



17-Nov-08                       ITAM K.Ng               31   17-Nov-08                         ITAM K.Ng               32




Types of Malware                                             Malware scanners
     Adware                                                      Lavasoft Ad-Aware 2008 Free
       Annoying pop-ups, install IT menu bars,                     www.lavasoft.com/products/ad_aware_free.php
            targeted ads. according to your online                Spybot Search and Destroy
            shopping habits or surfing habits.
                                                                    www.safer-networking.org/en/download/index.html
     Spyware
                                                                  Microsoft Windows Defender (with Vista)
       Collects user details, such as, passwords,
                                                                    www.microsoft.com/windows/products/winfamily/de
        credit card info.
                                                                         fender/default.mspx
       Pop-up windows with active-x control.




17-Nov-08                       ITAM K.Ng               33   17-Nov-08                         ITAM K.Ng               34




Good Password                                                Good password
     At least 8 characters containing 3 of the                   Or a passphrase at least 10 characters
      following 4 categories:                                       A memorable phrase, e.g. song or book title,
       Lower case letters (a-z)                                         line of poetry…etc.
       Upper case letters (A-Z)                                    A phrase that has personal meaning but
       Numbers (0-9)                                                    might not appear widely.
       Special characters (! # ? /)                                e.g. a random line from your favorite movie.
                                                                    Combining phrases is better.




17-Nov-08                       ITAM K.Ng               35   17-Nov-08                         ITAM K.Ng               36




                                                                                                                            6
11/17/2008




                                                 Bad password
                                                      A word found in dictionary, whether spelled
                                                       forwards or backwards, or a word preceded
                                                       or followed by a digit (e.g. secret1, 1terces)
     Demo:                                            Include user name or login name
                                                      Include personal info: family names,
     A phrase into a password                          places, pets, birthdays, address, hobbies,
                                                       phone nos. …etc.
                                                      Slang, dialect, jargon…etc.
                                                      Keyboard sequences, e.g. qwerty, asdfg,
                                                       abc123…etc.

17-Nov-08            ITAM K.Ng              37   17-Nov-08                        ITAM K.Ng                38




Password security guidelines                     More on password
 Never share your password with anyone               How to create passwords
  else for any reason.                                  http://www.microsoft.com/protect/yourself/pa
 Passwords should not be written down,                      ssword/create.mspx
  stored electronically (e.g. browser) or
  published.                                          Test your password strength
 Use different passwords for different                 http://www.microsoft.com/protect/yourself/pa
  accounts.                                                  ssword/checker.mspx

 Change password regularly.



17-Nov-08            ITAM K.Ng              39   17-Nov-08                        ITAM K.Ng                40




Firewall                                         What is it?


                                                      It inspects network traffic passing through it,
                                                       and denies or permits passage based on a
                                                       set of rules.




17-Nov-08            ITAM K.Ng              41   17-Nov-08                        ITAM K.Ng                42




                                                                                                                7
11/17/2008




Types of firewall
     Packet filter                                               Stateful packet inspection (SPI)
       Pass/drop individual packets according to a                 Examine packets in groups rather than
        set of rules                                                     individually.
       Inspect source and destination IP and port                  Avoid attacks like SYN Floods, DoS
            Port   Description                                    Application layer
            21     FTP File Transfer Protocol                       Filter traffics on the application level
            23     Telnet
            25     SMTP Simple Mail Transfer Protocol
            80     HTTP
            110    Post Office Protocol (POP3)
            443    HTTPS

17-Nov-08                          ITAM K.Ng            43   17-Nov-08                       ITAM K.Ng                      44




Network address translation
                                                             Managing firewalls = A Profession
(NAT)
     Translate address to private range                          Enterprise-class firewalls
       10.0.0.0 – 10.255.255.255                                   CheckPoint
       172.16.0.0 – 172.31.255.255                                 Juniper (Netscreen)
       192.168.0.0 – 192.168.255.255                                ○ http://www.juniper.net/products/models/srx5800/
                                                                       index.html
                                                                  Security Certifications
                                                                    e.g. CISSP from (ISC)2 , CISA




17-Nov-08                          ITAM K.Ng            45   17-Nov-08                       ITAM K.Ng                      46




                                                             Sending info. Over the internet
Wireless security (Access Point)
                                                             securely
 Change your AP’s admin. login/Pwd                               Watch this
 Change your default SSID                                          http://onguardonline.gov/tools/recognize-
                                                                         secure-site-using-ssl.aspx
 Disable SSID Broadcast
 Encryption: WPA-PSK, avoid old WEP
                                                                  Demo – online shopping
 Media Access Control (MAC) Authentication
                                                                    www.landsend.com
 Disable DHCP




17-Nov-08                          ITAM K.Ng            47   17-Nov-08                       ITAM K.Ng                      48




                                                                                                                                 8
11/17/2008




Encryption (1)                                                        Encryption (2)
     Private Key Encryption                                               Public Key Encryption
       Encrypt a message http://www.encodor.com                             Bob sends a secret message to Alice
       Encrypt a file http://file-encryptor.com/


     Problems with private key?




                                                                                               Diagrams from wikipedia
17-Nov-08                                     ITAM K.Ng          49   17-Nov-08                        ITAM K.Ng              50




12 Good IT Practices                                                  Cont’ (1)
1.      Choose good passwords and protect                             6.      Shut down, lock, log off before leaving it
        them                                                                  unattended, and make sure it requires a
2.      Cautious when using internet                                          password to start-up.
3.      Safe emailing                                                 7.      Make sure your computer is protected
4.      Secure your area before leaving it                                    with anti-virus, security patches,
        unattended                                                            updates…etc.
5.      Secure your portable computer at all                          8.      Don’t keep sensitive info. on portable
        times                                                                 devices.


17-Nov-08                                     ITAM K.Ng          51   17-Nov-08                        ITAM K.Ng              52




Cont’ (2)                                                             Conclusion
9.  Don’t install or download unknown or                               This is only a very short introduction
    unsolicited programs to your computer                              Remember to protect yourself at all times.
10. Avoid using P2P programs, e.g.                                     … and Internet is like           , not safe.
    FOXY…etc.
11. Don’t use illegal software.
                                                                           References:
12. Make backup copies of files or date you                                  http://www.staysafeonline.org
    are not willing to lose --- and store the                                http://onguardonline.gov/
    copies very securely.
modified from http://its.ucsc.edu/security_awareness/top10.php




17-Nov-08                                     ITAM K.Ng          53   17-Nov-08                        ITAM K.Ng              54




                                                                                                                                   9

More Related Content

Viewers also liked

NatWest: Redesigning the Service
NatWest: Redesigning the ServiceNatWest: Redesigning the Service
NatWest: Redesigning the Servicejj36790
 
Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)bety ruiz
 
004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템Namun Cho
 
Surat ul jinn presentation
Surat ul jinn presentationSurat ul jinn presentation
Surat ul jinn presentationFaryal2000
 
Importance Of Banks In An Economy
Importance Of Banks In An EconomyImportance Of Banks In An Economy
Importance Of Banks In An EconomyRudo Chengeta
 
Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick Maidoh
 
Types of banks
Types of banksTypes of banks
Types of banks17somya
 
72 Surah Al Jinn (The Jinn)
72   Surah Al Jinn (The Jinn)72   Surah Al Jinn (The Jinn)
72 Surah Al Jinn (The Jinn)AVICENNE
 
Greg Images to Choose From #1
Greg Images to Choose From #1Greg Images to Choose From #1
Greg Images to Choose From #1Taylor Walsh
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies JungHyuk Kwon
 
Jinns and angels
Jinns and angelsJinns and angels
Jinns and angelsHelmon Chan
 

Viewers also liked (20)

NatWest: Redesigning the Service
NatWest: Redesigning the ServiceNatWest: Redesigning the Service
NatWest: Redesigning the Service
 
Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)Unidad i, ii y iii y iv herramientas (1)
Unidad i, ii y iii y iv herramientas (1)
 
004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템004.저축,투자지출,금융시스템
004.저축,투자지출,금융시스템
 
Who are the jinn
Who are the jinnWho are the jinn
Who are the jinn
 
Topic 006
Topic 006Topic 006
Topic 006
 
Surat ul jinn presentation
Surat ul jinn presentationSurat ul jinn presentation
Surat ul jinn presentation
 
Jinn in Islam
Jinn in IslamJinn in Islam
Jinn in Islam
 
World of Jinn
World of JinnWorld of Jinn
World of Jinn
 
Importance Of Banks In An Economy
Importance Of Banks In An EconomyImportance Of Banks In An Economy
Importance Of Banks In An Economy
 
Jinn in Islam
Jinn in IslamJinn in Islam
Jinn in Islam
 
Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.Patrick MAIDOH CV 2016.
Patrick MAIDOH CV 2016.
 
Types of banks
Types of banksTypes of banks
Types of banks
 
Top 1m
Top 1mTop 1m
Top 1m
 
72 Surah Al Jinn (The Jinn)
72   Surah Al Jinn (The Jinn)72   Surah Al Jinn (The Jinn)
72 Surah Al Jinn (The Jinn)
 
Greg slides01
Greg slides01Greg slides01
Greg slides01
 
Greg Images to Choose From #1
Greg Images to Choose From #1Greg Images to Choose From #1
Greg Images to Choose From #1
 
Yellow1
Yellow1Yellow1
Yellow1
 
Tumble books2
Tumble books2Tumble books2
Tumble books2
 
2011 Mobile & Web technologies
2011 Mobile & Web technologies 2011 Mobile & Web technologies
2011 Mobile & Web technologies
 
Jinns and angels
Jinns and angelsJinns and angels
Jinns and angels
 

More from kratesng

BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)kratesng
 
ITDD Present to TWGHs SS
ITDD Present to TWGHs SSITDD Present to TWGHs SS
ITDD Present to TWGHs SSkratesng
 
社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議kratesng
 
PD73002 History Of Product Design
PD73002 History Of Product DesignPD73002 History Of Product Design
PD73002 History Of Product Designkratesng
 
PD73002 Concept Generation
PD73002 Concept GenerationPD73002 Concept Generation
PD73002 Concept Generationkratesng
 
PD73002 Customer Needs
PD73002 Customer NeedsPD73002 Customer Needs
PD73002 Customer Needskratesng
 
PD73002 Product Development
PD73002 Product DevelopmentPD73002 Product Development
PD73002 Product Developmentkratesng
 
ITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital VideoITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital Videokratesng
 
ITMA11 Introduction To Video
ITMA11 Introduction To VideoITMA11 Introduction To Video
ITMA11 Introduction To Videokratesng
 
ITMA10 Multimedia Applications
ITMA10 Multimedia ApplicationsITMA10 Multimedia Applications
ITMA10 Multimedia Applicationskratesng
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIkratesng
 
ITMA07 Web 2.0
ITMA07 Web 2.0ITMA07 Web 2.0
ITMA07 Web 2.0kratesng
 
ITMA06 Introduction to Animation
ITMA06 Introduction to AnimationITMA06 Introduction to Animation
ITMA06 Introduction to Animationkratesng
 
ITMA04 Digital Imaging
ITMA04 Digital ImagingITMA04 Digital Imaging
ITMA04 Digital Imagingkratesng
 
ITMA02 Inside Computer
ITMA02 Inside ComputerITMA02 Inside Computer
ITMA02 Inside Computerkratesng
 
ITMA03 Internet And Communications
ITMA03 Internet And CommunicationsITMA03 Internet And Communications
ITMA03 Internet And Communicationskratesng
 

More from kratesng (16)

BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)BSc.MTI Info Session Presentation (Feb 2014)
BSc.MTI Info Session Presentation (Feb 2014)
 
ITDD Present to TWGHs SS
ITDD Present to TWGHs SSITDD Present to TWGHs SS
ITDD Present to TWGHs SS
 
社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議社長給同學想通過非联招入大學的六個建議
社長給同學想通過非联招入大學的六個建議
 
PD73002 History Of Product Design
PD73002 History Of Product DesignPD73002 History Of Product Design
PD73002 History Of Product Design
 
PD73002 Concept Generation
PD73002 Concept GenerationPD73002 Concept Generation
PD73002 Concept Generation
 
PD73002 Customer Needs
PD73002 Customer NeedsPD73002 Customer Needs
PD73002 Customer Needs
 
PD73002 Product Development
PD73002 Product DevelopmentPD73002 Product Development
PD73002 Product Development
 
ITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital VideoITMA12 Introduction To Digital Video
ITMA12 Introduction To Digital Video
 
ITMA11 Introduction To Video
ITMA11 Introduction To VideoITMA11 Introduction To Video
ITMA11 Introduction To Video
 
ITMA10 Multimedia Applications
ITMA10 Multimedia ApplicationsITMA10 Multimedia Applications
ITMA10 Multimedia Applications
 
ITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio IIITMA09 Introduction To Digital Audio II
ITMA09 Introduction To Digital Audio II
 
ITMA07 Web 2.0
ITMA07 Web 2.0ITMA07 Web 2.0
ITMA07 Web 2.0
 
ITMA06 Introduction to Animation
ITMA06 Introduction to AnimationITMA06 Introduction to Animation
ITMA06 Introduction to Animation
 
ITMA04 Digital Imaging
ITMA04 Digital ImagingITMA04 Digital Imaging
ITMA04 Digital Imaging
 
ITMA02 Inside Computer
ITMA02 Inside ComputerITMA02 Inside Computer
ITMA02 Inside Computer
 
ITMA03 Internet And Communications
ITMA03 Internet And CommunicationsITMA03 Internet And Communications
ITMA03 Internet And Communications
 

Recently uploaded

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 

ITMA05 Computer Security

  • 1. 11/17/2008 Big IT Firm Gets It! ITMA Fall 2008 K.Ng From www.engadget.com 17-Nov-08 ITAM K.Ng 1 17-Nov-08 ITAM K.Ng 2 In the News… In the News… 明報14Oct2008 都市日報 4 Nov 2008 17-Nov-08 ITAM K.Ng 3 17-Nov-08 ITAM K.Ng 4 And remember this? Even President gets it… 17-Nov-08 ITAM K.Ng 5 17-Nov-08 ITAM K.Ng 6 1
  • 2. 11/17/2008 What you will learn? What is computer security?  Types of threats  Protection of computing systems and  Guidelines on protecting yourself the data that they store or access. 17-Nov-08 ITAM K.Ng 7 17-Nov-08 ITAM K.Ng 8 What could happen if your computer is Why is it important? compromised?  Enable you to carry out your duties 1. Could be used to hide programs that launch attacks on other computers.  Protect personal and sensitive info. 2. Could be generating large volumes of unwanted traffic, slowing down the entire system. 3. Someone could be distributing illegal software from your computer. 4. Someone could access personal info. From your computer. 5. Someone could record all of your keystrokes and get your passwords. 17-Nov-08 ITAM K.Ng 9 17-Nov-08 ITAM K.Ng 10 Answer? It is NOT just an IT problem  All of the above!  10% of security safeguards are technical.  90% of security safeguards rely on the computer user to observe good practices. IT Security is everyone’s responsibility!!! 17-Nov-08 ITAM K.Ng 11 17-Nov-08 ITAM K.Ng 12 2
  • 3. 11/17/2008 Social Engineering Three common examples  The practice of obtaining confidential info. by 1. Spam scams: deceptive emails to get people manipulation of legitimate users. to reveal info.  Users are the weakest link in security.  “They” will use the telephone, Internet, email to 2. Impersonation: pose as someone in authority trick people into revealing sensitive info. or get or IT personnel to obtain info. or access to them to do something against the policy. systems.  For more info:  http://hk.youtube.com/watch?v=xn9hH1BckPE 3. Dumpster diving: go thro’ trash to obtain  “The Art of Deception”, Kelvin Mitnick, 2003. valuable info.  Movie (2000) & book (1996) “Takedown” 17-Nov-08 ITAM K.Ng 13 17-Nov-08 ITAM K.Ng 14 Case (1) Safely destroy files on HD?  Mr Chapman found important  This? personal data on a computer • http://hk.youtube.com/watch?v=dMjLRBooSD0 he bought on ebay.  Affected a million bank  Or this? customers from RBS, • http://hk.youtube.com/watch?v=8M9fNu3X1K4 NatWest, AmEx.  Or this?  Under investigation by the Info • http://hk.youtube.com/watch?v=jGXh6RVTuq0 Commissioner £35 from eBay! From Daily Mail UK, 27Aug08 http://www.dailymail.co.uk/news/article-1049121/Government-probe-launched-details-million-bank-customers-sold-eBay.html# 17-Nov-08 ITAM K.Ng 15 17-Nov-08 ITAM K.Ng 16 Cheaper solutions… Spam scams  http://www.fileshredder.org/  Phishing  Email asks you to go to a website to update your  http://cmrr.ucsd.edu/people/Hughes/SecureErase.shtml personal info.  Phishing scam archive ○ http://millersmiles.co.uk/  Phony security alert  Emails or pop-up windows warn that your computer is at risk of being infected or hacked and contain an attachment or link to a patch to fix the problem.  Nigerian bank account scam  Collect your money and bank account info. 17-Nov-08 ITAM K.Ng 17 17-Nov-08 ITAM K.Ng 18 3
  • 4. 11/17/2008 Examples of phone prank Sarah Palin called by Nicolas!  A very popular radio program in the late 80s.  軟硬天師 整蠱電話  e.g. http://hk.youtube.com/watch?v=HuAzLgutOME http://hk.youtube.com/watch?v=k4aHL12vtEM 17-Nov-08 ITAM K.Ng 19 17-Nov-08 ITAM K.Ng 20 Avoid social engineering Computer Viruses  DO NOT give sensitive personal info. to anyone you don’t know or who doesn’t have a legitimate need for it.  Destroy or securely erase sensitive info. before recycling or throwing it away.  Delete unsolicited emails immediately.  Sounds too good to be true? It is!  Report to the authority. 17-Nov-08 ITAM K.Ng 21 17-Nov-08 ITAM K.Ng 22 What is it? Types of viruses (i)  A self-replicating program that spreads  Macro Viruses by inserting copies of itself onto other  Use command (macros) embedded in other executable code or documents. software to infect and spread to other files viewed by that software, e.g. Word/Excel.  It will perform a function, e.g. delete certain files. 17-Nov-08 ITAM K.Ng 23 17-Nov-08 ITAM K.Ng 24 4
  • 5. 11/17/2008 Macro Protection in Word 2007 Types of viruses (ii)  Worms  Duplicate themselves and use communications such as emails to spread. They can look at your email address book and send themselves to users in your address book. 17-Nov-08 ITAM K.Ng 25 17-Nov-08 ITAM K.Ng 26 Worms examples Type of viruses (iii)  Spyworm.Win32  File viruses  Attach themselves to other software. When the software is run, the virus first loads itself into memory so that it can further infect other files or begin damaging the computer.  Trojan  Programs that claim to perform a particular function but in fact do something different 17-Nov-08 ITAM K.Ng 27 17-Nov-08 ITAM K.Ng 28 Type of viruses (iv) Example  Backdoor Trojans  “I Love You” and “Bagle” worms  Programs that allow other computer users to  They spread themselves via email remotely control your computer via attachments. networks.  It sends an email with itself as an  Boot Sector Viruses attachment to everyone in that computer’s  Infect a computer’s startup program so that email address books. the virus would become active as soon as  Worms are also often designed to use up the computer started up. resources on that computer, such as, memory and processing power. 17-Nov-08 ITAM K.Ng 29 17-Nov-08 ITAM K.Ng 30 5
  • 6. 11/17/2008 Virus Scanners Malware  Online scanner  A general term for software that is  http://housecall65.trendmicro.com installed on your computer without your knowledge and often your consent to perform various tasks.  Free (non-commercial use)  http://free.avg.com Grisoft’s AVG  http://www.free-av.com Avira AntiVir Personal  http://www.avast.com Avast! Home Ed. 17-Nov-08 ITAM K.Ng 31 17-Nov-08 ITAM K.Ng 32 Types of Malware Malware scanners  Adware  Lavasoft Ad-Aware 2008 Free  Annoying pop-ups, install IT menu bars,  www.lavasoft.com/products/ad_aware_free.php targeted ads. according to your online  Spybot Search and Destroy shopping habits or surfing habits.  www.safer-networking.org/en/download/index.html  Spyware  Microsoft Windows Defender (with Vista)  Collects user details, such as, passwords,  www.microsoft.com/windows/products/winfamily/de credit card info. fender/default.mspx  Pop-up windows with active-x control. 17-Nov-08 ITAM K.Ng 33 17-Nov-08 ITAM K.Ng 34 Good Password Good password  At least 8 characters containing 3 of the  Or a passphrase at least 10 characters following 4 categories:  A memorable phrase, e.g. song or book title,  Lower case letters (a-z) line of poetry…etc.  Upper case letters (A-Z)  A phrase that has personal meaning but  Numbers (0-9) might not appear widely.  Special characters (! # ? /)  e.g. a random line from your favorite movie.  Combining phrases is better. 17-Nov-08 ITAM K.Ng 35 17-Nov-08 ITAM K.Ng 36 6
  • 7. 11/17/2008 Bad password  A word found in dictionary, whether spelled forwards or backwards, or a word preceded or followed by a digit (e.g. secret1, 1terces) Demo:  Include user name or login name  Include personal info: family names, A phrase into a password places, pets, birthdays, address, hobbies, phone nos. …etc.  Slang, dialect, jargon…etc.  Keyboard sequences, e.g. qwerty, asdfg, abc123…etc. 17-Nov-08 ITAM K.Ng 37 17-Nov-08 ITAM K.Ng 38 Password security guidelines More on password  Never share your password with anyone  How to create passwords else for any reason.  http://www.microsoft.com/protect/yourself/pa  Passwords should not be written down, ssword/create.mspx stored electronically (e.g. browser) or published.  Test your password strength  Use different passwords for different  http://www.microsoft.com/protect/yourself/pa accounts. ssword/checker.mspx  Change password regularly. 17-Nov-08 ITAM K.Ng 39 17-Nov-08 ITAM K.Ng 40 Firewall What is it?  It inspects network traffic passing through it, and denies or permits passage based on a set of rules. 17-Nov-08 ITAM K.Ng 41 17-Nov-08 ITAM K.Ng 42 7
  • 8. 11/17/2008 Types of firewall  Packet filter  Stateful packet inspection (SPI)  Pass/drop individual packets according to a  Examine packets in groups rather than set of rules individually.  Inspect source and destination IP and port  Avoid attacks like SYN Floods, DoS Port Description  Application layer 21 FTP File Transfer Protocol  Filter traffics on the application level 23 Telnet 25 SMTP Simple Mail Transfer Protocol 80 HTTP 110 Post Office Protocol (POP3) 443 HTTPS 17-Nov-08 ITAM K.Ng 43 17-Nov-08 ITAM K.Ng 44 Network address translation Managing firewalls = A Profession (NAT)  Translate address to private range  Enterprise-class firewalls  10.0.0.0 – 10.255.255.255  CheckPoint  172.16.0.0 – 172.31.255.255  Juniper (Netscreen)  192.168.0.0 – 192.168.255.255 ○ http://www.juniper.net/products/models/srx5800/ index.html  Security Certifications  e.g. CISSP from (ISC)2 , CISA 17-Nov-08 ITAM K.Ng 45 17-Nov-08 ITAM K.Ng 46 Sending info. Over the internet Wireless security (Access Point) securely  Change your AP’s admin. login/Pwd  Watch this  Change your default SSID  http://onguardonline.gov/tools/recognize- secure-site-using-ssl.aspx  Disable SSID Broadcast  Encryption: WPA-PSK, avoid old WEP  Demo – online shopping  Media Access Control (MAC) Authentication  www.landsend.com  Disable DHCP 17-Nov-08 ITAM K.Ng 47 17-Nov-08 ITAM K.Ng 48 8
  • 9. 11/17/2008 Encryption (1) Encryption (2)  Private Key Encryption  Public Key Encryption  Encrypt a message http://www.encodor.com  Bob sends a secret message to Alice  Encrypt a file http://file-encryptor.com/  Problems with private key? Diagrams from wikipedia 17-Nov-08 ITAM K.Ng 49 17-Nov-08 ITAM K.Ng 50 12 Good IT Practices Cont’ (1) 1. Choose good passwords and protect 6. Shut down, lock, log off before leaving it them unattended, and make sure it requires a 2. Cautious when using internet password to start-up. 3. Safe emailing 7. Make sure your computer is protected 4. Secure your area before leaving it with anti-virus, security patches, unattended updates…etc. 5. Secure your portable computer at all 8. Don’t keep sensitive info. on portable times devices. 17-Nov-08 ITAM K.Ng 51 17-Nov-08 ITAM K.Ng 52 Cont’ (2) Conclusion 9. Don’t install or download unknown or  This is only a very short introduction unsolicited programs to your computer  Remember to protect yourself at all times. 10. Avoid using P2P programs, e.g.  … and Internet is like , not safe. FOXY…etc. 11. Don’t use illegal software.  References: 12. Make backup copies of files or date you  http://www.staysafeonline.org are not willing to lose --- and store the  http://onguardonline.gov/ copies very securely. modified from http://its.ucsc.edu/security_awareness/top10.php 17-Nov-08 ITAM K.Ng 53 17-Nov-08 ITAM K.Ng 54 9