SlideShare a Scribd company logo
1 of 37
IT Security Awareness
   January 24, 2011
        MATC
    Chapter 2
 Desktop Security
Security Awareness




      Chapter 2
   Desktop Security
Objectives
                 After completing this chapter, you should be
                 able to do the following:
                 •Describe the different types of software
                 and hardware attacks
                 •List types of desktop defenses
                 •Explain how to recover from an attack




Security Awareness, 3rd Edition                          3
Attacks on Desktop
                 Computers
                 • Most attacks fall into two categories
                       – Malicious software attacks
                       – Attacks on hardware




Security Awareness, 3rd Edition                       4
Malicious Software Attacks
                 • Malware
                    – Wide variety of damaging
                      or annoying attack
                      software
                    – Enters a computer system
                      without the owner’s
                      knowledge or consent
                 • Primary objectives of
                   malware
                    – Infect a computer system
                      with destructive software
                    – Conceal a malicious action
Security Awareness, 3rd Edition                    5
Infecting Malware
                 • Viruses
                       – Malicious program that needs a
                         ‘‘carrier’’ to survive
                       – Two carriers
                             • Program or document
                             • User




Security Awareness, 3rd Edition                           6
Infecting Malware (cont’d.)
         •   EVERY IT Security lecture must have a picture of a
             padlock in it, somewhere
         •   Viruses have performed the following functions:
              – Caused a computer to crash repeatedly
              – Erased files from a hard drive
              – Installed hidden programs, such as stolen software,
                 which is then secretly distributed from the computer
              – Made multiple copies of itself and consumed all of the
                 free space in a hard drive
              – Reduced security settings and allowed intruders to
                 remotely access the computer
              – Reformatted the hard disk drive



Security Awareness, 3rd Edition                                          7
Infecting Malware (cont’d.)
         • Types of computer viruses
              – File infector
              – Resident
              – Boot
              – Companion
              – Macro
              – Polymorphic



Security Awareness, 3rd Edition               8
Infecting Malware (cont’d.)
                  • Worms
                        – Take advantage of a vulnerability in an
                          application or an operating system
                        – Enter a system
                        – Deposit its payload
                        – Immediately searches for another computer
                          that has the same vulnerability




Security Awareness, 3rd Edition                                 9
Infecting Malware (cont’d.)
               • Different from a virus
                  – Does not require program or user
               • Actions that worms have performed include
                  – Deleting files on the computer
                  – Allowing the computer to be remote-
                    controlled by an attacker




Security Awareness, 3rd Edition                              10
Concealing Malware
                 • Trojan horse (or just Trojan)
                    – Program advertised as performing one
                      activity but actually does something else
                    – Typically executable programs that contain
                      hidden code that attacks the computer
                      system




Security Awareness, 3rd Edition                               11
Concealing Malware
                 (cont’d.)
                 • Rootkit
                    – Set of software tools
                    – Used to break into a computer, obtain special
                      privileges to perform unauthorized functions
                    – Goal is not to damage a computer directly
                    – Go to great lengths to ensure that they are
                      not detected and removed
                    – Replace operating system commands with
                      modified versions that are specifically
                      designed to ignore malicious activity
                    – Detecting a rootkit can be difficult
Security Awareness, 3rd Edition                               12
Concealing Malware
                 (cont’d.)
                 • Logic bomb
                    – Computer program or a part of a program that
                      lies dormant until it is triggered by a specific
                      logical event
                    – Once triggered, performs malicious activities
                    – Extremely difficult to detect before they are
                      triggered




Security Awareness, 3rd Edition                                 13
Concealing Malware
                 (cont’d.)




Table 2-1 Famous logic bombs
Course Technology/Cengage Learning



Security Awareness, 3rd Edition       14
Concealing Malware
            (cont’d.)
                • Zombie
                      – Infected ‘‘robot’’
                         computer
                • Botnet
                      – Hundreds, thousands,
                         or tens of thousands of
                         zombies
                • Internet Relay Chat (IRC)
                      – Used to remotely control
                         the zombies
                • Number of zombies and
               rd
                     botnets is staggering
Security Awareness, 3 Edition                      15
Computer Walrus Attacks
       (CWA)
 • Ha, there is no such thing as a Computer Walrus
   Attack (CWA), but maybe there should be!
 • Maybe we can invent a new term?
 • Rule #1, never trust a walrus!
 • Just checking to make sure you are paying
   attention during lecture!
Concealing Malware
                 (cont’d.)




                    Table 2-2 Uses of botnets
  Course Technology/Cengage Learning



Security Awareness, 3rd Edition                 17
Hardware Attacks
                  • Types of hardware that
                    is targeted includes
                     – BIOS
                     – USB devices
                     – Cell phones
                     – Physical theft of
                        laptop computers
                        and information




Security Awareness, 3rd Edition              18
•
           BIOS System
          Basic Input/Output
          (BIOS)
           – Coded program
              embedded on the
              processor chip
           – Recognizes and controls
              different devices on the
              computer system
      •   Read Only Memory (ROM)
          chip
           – Older systems
      •   PROM (Programmable Read
          Only Memory) chip
           – Newer computers
           – Flashing the BIOS
                • Reprogramming
Security Awareness, 3rd Edition          19
USB Devices
             • USB (universal serial bus)
             • Small, lightweight, removable,
               and contain rewritable storage
             • Common types
                – USB flash memory
                – MP3 players
             • Primary targets of attacks to
               spread malware
             • Allow spies or disgruntled
               employees to copy and steal
               sensitive corporate data

Security Awareness, 3rd Edition                 20
USB Devices (cont’d.)
                 • Reduce the risk introduced by USB
                   devices
                       – Prohibit by written policy
                       – Disable with technology
                             • Disable the USB in hardware
                             • Disable the USB through the operating
                               system
                             • Use third-party software



Security Awareness, 3rd Edition                                    21
Cell Phones
                • Portable communication
                     devices
                • Rapidly replacing wired
                     telephones
                • Types of attacks
                      – Lure users to malicious
                         Web sites
                      – Infect a cell phone
                      – Launch attacks on other
                         cell phones
                      – Access account
                         information
                      – Abuse the cell phone
Security Awareness, 3 Edition
               rd
                                                  22
                         service
Physical Theft
                 • Portable laptop computers are particularly
                   vulnerable to theft
                 • Data can be retrieved from a hard drive by an
                   attacker even after its file has been deleted




Security Awareness, 3rd Edition                               23
Desktop Defenses
              • Defenses include:
                 – Managing patches
                 – Installing antivirus software
                 – Using buffer overflow protection
                 – Protecting against theft
                 – Creating data backups
                 – Even a cassette backup is better than no
                   backup




Security Awareness, 3rd Edition                               24
Managing Patches
                 • Patch
                       – Software security update intended to
                         cover vulnerabilities that have been
                         discovered after the program was
                         released




Security Awareness, 3rd Edition                            25
Managing Patches (cont’d.)
                 • Automatic update configuration
                   options for most operating systems
                       – Install updates automatically
                       – Download updates but let me choose
                         when to install them
                       – Check for updates but let me choose
                         whether to download and install them
                       – Never check for updates


Security Awareness, 3rd Edition                           26
Antivirus Software
            • Scan a computer’s hard drive for infections
            • Monitor computer activity
            • Examine all new documents that might contain a
              virus
            • Drawback of AV software
               – Must be continuously updated to recognize
                 new viruses
            • Should be configured to constantly monitor for
              viruses and automatically check for updated
              signature files



Security Awareness, 3rd Edition                           27
Buffer Overflow Protection
                 • Buffer overflow
                    – Occurs when a computer process attempts to
                      store data in RAM beyond the boundaries of
                      a fixed-length storage buffer
                    – May cause computer to stop functioning
                 • Windows-based system protection
                    – Data Execution Prevention (DEP)
                    – Address Space Layout Randomization
                      (ASLR)



Security Awareness, 3rd Edition                            28
Buffer Overflow Protection
                 (cont’d.)




                   Figure 2-4 Buffer overflow attack
 Course Technology/Cengage Learning

Security Awareness, 3rd Edition                        29
Protecting Against Theft
                 • Applies to laptops
                   especially
                 • Device lock
                       – Steel cable and a
                         lock
                 • Software tracking
                   system


Security Awareness, 3rd Edition              30
Creating Data Backups
                 • Copying data from a computer’s
                   hard drive onto other digital media
                       – Then storing it in a secure location
                 • Sophisticated hardware and
                   software can back up data on a
                   regular schedule
                 • Personal computer users
                       – Operating system functions
                       – Third-party software
Security Awareness, 3rd Edition                                 31
Creating Data Backups
                 (cont’d.)
                 • What information to back up
                    – Back up only user files
                    – Back up all files
                 • Frequency of backups
                    – Regular schedule
                 • RAID (Redundant Array of Independent
                   Drives)
                    – Uses multiple hard disk drives for increased
                      reliability
                    – Several RAID configurations
                       • Called levels
Security Awareness, 3rd Edition                                32
Creating Data Backups
                 (cont’d.)




                   Table 2-3 Types of data backups
 Course Technology/Cengage Learning




Security Awareness, 3rd Edition                      33
Creating Data Backups (cont’d.)
      • Backup storage media
            – Temporary media should not be used
            – Alternatives
                  •   Portable USB hard drives
                  •   Network Attached Storage (NAS)
                  •   Internet services
                  •   Disc storage




 Security Awareness, 3rd Edition                       34
Creating Data Backups (cont’d.)
                   • Location of backup storage
                      – Protect against not only virus attacks but also
                        against hardware malfunctions, user error,
                        software corruption, and natural disasters
                      – Backups ideally should be stored in a location
                        away from the device that contains the
                        information




  Security Awareness, 3rd Edition                                 35
Recovering from an Attack
                 • Basic steps to perform
                       – Disconnect
                       – Identify
                       – Disinfect
                       – Recheck
                       – Reinstall
                       – Analyze


Security Awareness, 3rd Edition             36
Summary
             • Never trust a walrus
             • Malicious software (malware)
                – Enters a computer system without the
                  owner’s knowledge or consent
                – Includes a wide variety of damaging or
                  annoying software
                – Infecting malware
                – Concealing malware
             • Hardware is also the target of attackers
             • Tactics for defending desktop systems
             • Basic steps to disinfect and restore a computer

Security Awareness, 3rd Edition                              37

More Related Content

What's hot

Network security
Network securityNetwork security
Network securityfatimasaham
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber SecurityGeo Marian
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentationA.S. Sabuj
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Edureka!
 
Network security
Network securityNetwork security
Network securitymena kaheel
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Edureka!
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityNemwos
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber securityAvani Patel
 

What's hot (20)

Computer security
Computer securityComputer security
Computer security
 
Network security
Network securityNetwork security
Network security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Information security
Information securityInformation security
Information security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security system presentation
Cyber security system presentationCyber security system presentation
Cyber security system presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Network security
Network securityNetwork security
Network security
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Ransomware
RansomwareRansomware
Ransomware
 
Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...Network Security Tutorial | Introduction to Network Security | Network Securi...
Network Security Tutorial | Introduction to Network Security | Network Securi...
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Ransomware attacks
Ransomware attacksRansomware attacks
Ransomware attacks
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 

Viewers also liked

Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking Salman Memon
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security PresentationYosef Gamble
 
Web Security
Web SecurityWeb Security
Web SecurityADIEFEH
 
Web Security
Web SecurityWeb Security
Web SecurityTripad M
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Oles Seheda
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationabhijit chintamani
 

Viewers also liked (10)

Email security - Netwroking
Email security - Netwroking Email security - Netwroking
Email security - Netwroking
 
Email Security Presentation
Email Security PresentationEmail Security Presentation
Email Security Presentation
 
Web Security
Web SecurityWeb Security
Web Security
 
Web Security
Web SecurityWeb Security
Web Security
 
Email Security Overview
Email Security OverviewEmail Security Overview
Email Security Overview
 
Web Security - Introduction v.1.3
Web Security - Introduction v.1.3Web Security - Introduction v.1.3
Web Security - Introduction v.1.3
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Antivirus PPt
Antivirus PPtAntivirus PPt
Antivirus PPt
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Web Security
Web SecurityWeb Security
Web Security
 

Similar to Desktop Pc Computer Security

Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptxmalikmuzammil2326
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewareAJAY VISHKARMA
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network SecurityDushyant Singh
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethicsArgie242424
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3gpioa
 
Stealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT SecurityStealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT SecurityIntel IT Center
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.pptNebiyuTeferaShite
 
Computer viruses
Computer virusesComputer viruses
Computer virusesMDAZAD53
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 

Similar to Desktop Pc Computer Security (20)

Information about malwares and Attacks.pptx
Information about malwares and Attacks.pptxInformation about malwares and Attacks.pptx
Information about malwares and Attacks.pptx
 
list of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for malewarelist of Deception as well as detection techniques for maleware
list of Deception as well as detection techniques for maleware
 
Isys20261 lecture 05
Isys20261 lecture 05Isys20261 lecture 05
Isys20261 lecture 05
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Ch02 System Threats and Risks
Ch02 System Threats and RisksCh02 System Threats and Risks
Ch02 System Threats and Risks
 
Mitppt
MitpptMitppt
Mitppt
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Security and ethics
Security and ethicsSecurity and ethics
Security and ethics
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Malicious
MaliciousMalicious
Malicious
 
Crontab Cyber Security session 3
Crontab Cyber Security session 3Crontab Cyber Security session 3
Crontab Cyber Security session 3
 
Stealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT SecurityStealthy Threats Driving a New Approach to IT Security
Stealthy Threats Driving a New Approach to IT Security
 
a documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppta documentation of final year SRS for AI drons.ppt
a documentation of final year SRS for AI drons.ppt
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Internet Security
Internet SecurityInternet Security
Internet Security
 

More from Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

More from Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Desktop Pc Computer Security

  • 1. IT Security Awareness January 24, 2011 MATC Chapter 2 Desktop Security
  • 2. Security Awareness Chapter 2 Desktop Security
  • 3. Objectives After completing this chapter, you should be able to do the following: •Describe the different types of software and hardware attacks •List types of desktop defenses •Explain how to recover from an attack Security Awareness, 3rd Edition 3
  • 4. Attacks on Desktop Computers • Most attacks fall into two categories – Malicious software attacks – Attacks on hardware Security Awareness, 3rd Edition 4
  • 5. Malicious Software Attacks • Malware – Wide variety of damaging or annoying attack software – Enters a computer system without the owner’s knowledge or consent • Primary objectives of malware – Infect a computer system with destructive software – Conceal a malicious action Security Awareness, 3rd Edition 5
  • 6. Infecting Malware • Viruses – Malicious program that needs a ‘‘carrier’’ to survive – Two carriers • Program or document • User Security Awareness, 3rd Edition 6
  • 7. Infecting Malware (cont’d.) • EVERY IT Security lecture must have a picture of a padlock in it, somewhere • Viruses have performed the following functions: – Caused a computer to crash repeatedly – Erased files from a hard drive – Installed hidden programs, such as stolen software, which is then secretly distributed from the computer – Made multiple copies of itself and consumed all of the free space in a hard drive – Reduced security settings and allowed intruders to remotely access the computer – Reformatted the hard disk drive Security Awareness, 3rd Edition 7
  • 8. Infecting Malware (cont’d.) • Types of computer viruses – File infector – Resident – Boot – Companion – Macro – Polymorphic Security Awareness, 3rd Edition 8
  • 9. Infecting Malware (cont’d.) • Worms – Take advantage of a vulnerability in an application or an operating system – Enter a system – Deposit its payload – Immediately searches for another computer that has the same vulnerability Security Awareness, 3rd Edition 9
  • 10. Infecting Malware (cont’d.) • Different from a virus – Does not require program or user • Actions that worms have performed include – Deleting files on the computer – Allowing the computer to be remote- controlled by an attacker Security Awareness, 3rd Edition 10
  • 11. Concealing Malware • Trojan horse (or just Trojan) – Program advertised as performing one activity but actually does something else – Typically executable programs that contain hidden code that attacks the computer system Security Awareness, 3rd Edition 11
  • 12. Concealing Malware (cont’d.) • Rootkit – Set of software tools – Used to break into a computer, obtain special privileges to perform unauthorized functions – Goal is not to damage a computer directly – Go to great lengths to ensure that they are not detected and removed – Replace operating system commands with modified versions that are specifically designed to ignore malicious activity – Detecting a rootkit can be difficult Security Awareness, 3rd Edition 12
  • 13. Concealing Malware (cont’d.) • Logic bomb – Computer program or a part of a program that lies dormant until it is triggered by a specific logical event – Once triggered, performs malicious activities – Extremely difficult to detect before they are triggered Security Awareness, 3rd Edition 13
  • 14. Concealing Malware (cont’d.) Table 2-1 Famous logic bombs Course Technology/Cengage Learning Security Awareness, 3rd Edition 14
  • 15. Concealing Malware (cont’d.) • Zombie – Infected ‘‘robot’’ computer • Botnet – Hundreds, thousands, or tens of thousands of zombies • Internet Relay Chat (IRC) – Used to remotely control the zombies • Number of zombies and rd botnets is staggering Security Awareness, 3 Edition 15
  • 16. Computer Walrus Attacks (CWA) • Ha, there is no such thing as a Computer Walrus Attack (CWA), but maybe there should be! • Maybe we can invent a new term? • Rule #1, never trust a walrus! • Just checking to make sure you are paying attention during lecture!
  • 17. Concealing Malware (cont’d.) Table 2-2 Uses of botnets Course Technology/Cengage Learning Security Awareness, 3rd Edition 17
  • 18. Hardware Attacks • Types of hardware that is targeted includes – BIOS – USB devices – Cell phones – Physical theft of laptop computers and information Security Awareness, 3rd Edition 18
  • 19. BIOS System Basic Input/Output (BIOS) – Coded program embedded on the processor chip – Recognizes and controls different devices on the computer system • Read Only Memory (ROM) chip – Older systems • PROM (Programmable Read Only Memory) chip – Newer computers – Flashing the BIOS • Reprogramming Security Awareness, 3rd Edition 19
  • 20. USB Devices • USB (universal serial bus) • Small, lightweight, removable, and contain rewritable storage • Common types – USB flash memory – MP3 players • Primary targets of attacks to spread malware • Allow spies or disgruntled employees to copy and steal sensitive corporate data Security Awareness, 3rd Edition 20
  • 21. USB Devices (cont’d.) • Reduce the risk introduced by USB devices – Prohibit by written policy – Disable with technology • Disable the USB in hardware • Disable the USB through the operating system • Use third-party software Security Awareness, 3rd Edition 21
  • 22. Cell Phones • Portable communication devices • Rapidly replacing wired telephones • Types of attacks – Lure users to malicious Web sites – Infect a cell phone – Launch attacks on other cell phones – Access account information – Abuse the cell phone Security Awareness, 3 Edition rd 22 service
  • 23. Physical Theft • Portable laptop computers are particularly vulnerable to theft • Data can be retrieved from a hard drive by an attacker even after its file has been deleted Security Awareness, 3rd Edition 23
  • 24. Desktop Defenses • Defenses include: – Managing patches – Installing antivirus software – Using buffer overflow protection – Protecting against theft – Creating data backups – Even a cassette backup is better than no backup Security Awareness, 3rd Edition 24
  • 25. Managing Patches • Patch – Software security update intended to cover vulnerabilities that have been discovered after the program was released Security Awareness, 3rd Edition 25
  • 26. Managing Patches (cont’d.) • Automatic update configuration options for most operating systems – Install updates automatically – Download updates but let me choose when to install them – Check for updates but let me choose whether to download and install them – Never check for updates Security Awareness, 3rd Edition 26
  • 27. Antivirus Software • Scan a computer’s hard drive for infections • Monitor computer activity • Examine all new documents that might contain a virus • Drawback of AV software – Must be continuously updated to recognize new viruses • Should be configured to constantly monitor for viruses and automatically check for updated signature files Security Awareness, 3rd Edition 27
  • 28. Buffer Overflow Protection • Buffer overflow – Occurs when a computer process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer – May cause computer to stop functioning • Windows-based system protection – Data Execution Prevention (DEP) – Address Space Layout Randomization (ASLR) Security Awareness, 3rd Edition 28
  • 29. Buffer Overflow Protection (cont’d.) Figure 2-4 Buffer overflow attack Course Technology/Cengage Learning Security Awareness, 3rd Edition 29
  • 30. Protecting Against Theft • Applies to laptops especially • Device lock – Steel cable and a lock • Software tracking system Security Awareness, 3rd Edition 30
  • 31. Creating Data Backups • Copying data from a computer’s hard drive onto other digital media – Then storing it in a secure location • Sophisticated hardware and software can back up data on a regular schedule • Personal computer users – Operating system functions – Third-party software Security Awareness, 3rd Edition 31
  • 32. Creating Data Backups (cont’d.) • What information to back up – Back up only user files – Back up all files • Frequency of backups – Regular schedule • RAID (Redundant Array of Independent Drives) – Uses multiple hard disk drives for increased reliability – Several RAID configurations • Called levels Security Awareness, 3rd Edition 32
  • 33. Creating Data Backups (cont’d.) Table 2-3 Types of data backups Course Technology/Cengage Learning Security Awareness, 3rd Edition 33
  • 34. Creating Data Backups (cont’d.) • Backup storage media – Temporary media should not be used – Alternatives • Portable USB hard drives • Network Attached Storage (NAS) • Internet services • Disc storage Security Awareness, 3rd Edition 34
  • 35. Creating Data Backups (cont’d.) • Location of backup storage – Protect against not only virus attacks but also against hardware malfunctions, user error, software corruption, and natural disasters – Backups ideally should be stored in a location away from the device that contains the information Security Awareness, 3rd Edition 35
  • 36. Recovering from an Attack • Basic steps to perform – Disconnect – Identify – Disinfect – Recheck – Reinstall – Analyze Security Awareness, 3rd Edition 36
  • 37. Summary • Never trust a walrus • Malicious software (malware) – Enters a computer system without the owner’s knowledge or consent – Includes a wide variety of damaging or annoying software – Infecting malware – Concealing malware • Hardware is also the target of attackers • Tactics for defending desktop systems • Basic steps to disinfect and restore a computer Security Awareness, 3rd Edition 37