Internet security

40
Security Awareness Chapter 3 Internet Security

description

 

Transcript of Internet security

Page 1: Internet security

Security Awareness

Chapter 3Internet Security

Page 2: Internet security

Security Awareness, 3rd Edition 2

Objectives

After completing this chapter, you should be able to do the following:

•Explain how the World Wide Web and e-mail work

•List the different types of Internet attacks

•Explain the defenses used to repel Internet attacks

Page 3: Internet security

How the Internet Works• Internet

– Worldwide set of interconnected computers, servers, and networks

– Not owned or regulated by any organization or government entity

– Computers loosely cooperate to make the Internet a global information resource

Security Awareness, 3rd Edition 3

Page 4: Internet security

The World Wide Web• World Wide Web (WWW)

– Better known as the Web– Internet server computers that provide online

information in a specific format• Hypertext Markup Language (HTML)

– Allows Web authors to combine text, graphic images, audio, video, and hyperlinks

• Web browser – Displays the words, pictures, and other

elements on a user’s screen

Security Awareness, 3rd Edition 4

Page 5: Internet security

The World Wide Web (cont’d.)

Figure 3-1 How a browser displays HTML code

Security Awareness, 3rd Edition 5

Page 6: Internet security

The World Wide Web (cont’d.)• Hypertext Transport Protocol (HTTP)

– Standards or protocols used by Web servers to distribute HTML documents

– Transmission Control Protocol/Internet Protocol (TCP/IP)

• Port number – Identifies the program or service that is being

requested– Port 80

• Standard port for HTTP transmissions

Security Awareness, 3rd Edition 6

Page 7: Internet security

The World Wide Web (cont’d.)• Transfer-and-store process

– Entire document is transferred and then stored on the local computer before the browser displays it

– Creates opportunities for sending different types of malicious code to the user’s computer

Security Awareness, 3rd Edition 7

Page 8: Internet security

The World Wide Web (cont’d.)

Figure 3-2 HTML document sent to browser

Security Awareness, 3rd Edition 8

Course Technology/Cengage Learning

Page 9: Internet security

E-Mail• Number of e-mail messages sent each day to be

over 210 billion– More than 2 million every second

• Simple Mail Transfer Protocol (SMTP) – Handles outgoing mail

• Post Office Protocol (POP or POP3)– Responsible for incoming mail

• Example of how e-mail works

Security Awareness, 3rd Edition 9

Page 10: Internet security

E-Mail (cont’d.)

Figure 3-3 E-mail transport

Security Awareness, 3rd Edition 10

Course Technology/Cengage Learning

Page 11: Internet security

E-Mail (cont’d.)• IMAP (Internet Mail Access Protocol, or

IMAP4)– More advanced mail protocol

• E-mail attachments – Documents that are connected to an e-mail

message– Encoded in a special format – Sent as a single transmission along with the

e-mail message itself

Security Awareness, 3rd Edition 11

Page 12: Internet security

Internet Attacks• Variety of different attacks

– Downloaded browser code– Privacy attacks– Attacks initiated while surfing to Web

sites– Attacks through e-mail– ABW (Attacks By Walrus)

Security Awareness, 3rd Edition 12

Page 13: Internet security

Downloaded Browser Code• JavaScript

– Scripting language • Similar to a computer programming language that

is typically ‘‘interpreted’’ into a language the computer can understand

– Embedded in HTML document– Executed by browser– Defense mechanisms are intended to prevent

JavaScript programs from causing serious harm– Can capture and send user information without the

user’s knowledge or authorization

Security Awareness, 3rd Edition 13

Page 14: Internet security

Downloaded Browser Code (cont’d.)

Figure 3-4 JavaScript

Security Awareness, 3rd Edition 14

Page 15: Internet security

Downloaded Browser Code (cont’d.)

• Java– complete programming language

• Java applet– Can perform interactive animations,

immediate calculations, or other simple tasks very quickly

– Unsigned or signed

Security Awareness, 3rd Edition 15

Page 16: Internet security

Downloaded Browser Code (cont’d.)

Figure 3-5 Java applet

Security Awareness, 3rd Edition 16

Course Technology/Cengage Learning

Page 17: Internet security

Downloaded Browser Code • ActiveX

– Set of rules for how applications under the Windows operating system should share information

– Microsoft developed a registration system poses a number of security concerns

– Not all ActiveX programs run in browser

Security Awareness, 3rd Edition 17

Page 18: Internet security

Privacy Attacks• Cookies

– User-specific information file created by server

– Stored on local computer– First-party cookie– Third-party cookie– Cannot contain a virus or steal personal

information stored on a hard drive– Can pose a privacy risk

Security Awareness, 3rd Edition 18

Page 19: Internet security

Privacy Attacks (cont’d.)• Adware

– Software that delivers advertising content – Unexpected and unwanted by the user– Can be a privacy risk

• Tracking function• Popup

– Small Web browser window – Appears over the Web site

that is being viewed

Security Awareness, 3rd Edition 19

Page 20: Internet security

Attacks while Surfing• Attacks on users can occur while

pointing the browser to a site or just viewing a site

• Redirecting Web traffic– Mistake when typing Web address– Attackers can exploit a misaddressed

Web name by registering the names of similar-sounding Web sites

Security Awareness, 3rd Edition 20

Page 21: Internet security

Attacks while Surfing (cont’d.)

Table 3-1 Typical errors in entering Web addresses

Security Awareness, 3rd Edition 21

Page 22: Internet security

Attacks while Surfing (cont’d.)• Drive-by downloads

– Can be initiated by simply visiting a Web site

– Spreading at an alarming pace– Attackers identify well-known Web site– Inject malicious content– Zero-pixel IFrame

• Virtually invisible to the naked eye

Security Awareness, 3rd Edition 22

Page 23: Internet security

E-Mail Attacks• Spam

– Unsolicited e-mail

– 90 percent of all e-mails sent can be defined as spam

– Lucrative business

• Spam filters

– Look for specific words and block the e-mail

• Image spam

– Uses graphical images of text in order to circumvent text-based filters

Security Awareness, 3rd Edition 23

Page 24: Internet security

E-Mail Attacks (cont’d.)• Other techniques to circumvent spam filters

– GIF layering– Word splitting– Geometric variance

• Malicious attachments– E-mail-distributed viruses– Replicate by sending themselves in an e-mail

message to all of the contacts in an e-mail address book

Security Awareness, 3rd Edition 24

Page 25: Internet security

E-Mail Attacks (cont’d.)• Embedded hyperlinks

– Clicking on the link will open the Web browser and take the user to a specific Web site

– Trick users to be directed to the attacker’s “look alike” Web site

Security Awareness, 3rd Edition 25

Page 26: Internet security

Figure 3-12 Embedded hyperlink

Security Awareness, 3rd Edition 26

Course Technology/Cengage Learning

Page 27: Internet security

Internet Defenses• Several types

– Security application programs– Configuring browser settings– Using general good practices

Security Awareness, 3rd Edition 27

Page 28: Internet security

Defenses Through Applications• Popup blocker

– Separate program or a feature incorporated within a browser

– Users can select the level of blocking• Spam filter

– Can be implemented on the user’s local computer and at corporate or Internet Service Provider level

Security Awareness, 3rd Edition 28

Page 29: Internet security

Walrus Break

Page 30: Internet security

Defenses Through Applications (cont’d.)

• Spam filter (cont’d.)– E-mail client spam blocking features

• Level of spam e-mail protection• Blocked senders (blacklist) • Allowed senders (whitelist)• Blocked top level domain list

– Bayesian filtering• User divides e-mail messages into spam or not-spam• Assigns each word a probability of being spam

– Corporate spam filter• Works with the receiving e-mail server

Security Awareness, 3rd Edition 30

Page 31: Internet security

Defenses Through Applications (cont’d.)

Figure 3-16 Spam filter on SMTP server

Security Awareness, 3rd Edition 31

Course Technology/Cengage Learning

Page 32: Internet security

Defenses Through Applications (cont’d.)• E-mail security settings

– Configured through the e-mail client application

• Read messages using a reading pane• Block external content• Preview attachments• Use an e-mail postmark

Security Awareness, 3rd Edition 32

Page 33: Internet security

Defenses Through Browser Settings• Browsers allow the user to customize

security and privacy settings• IE Web browser defense categories:

– Advanced security settings• Do not save encrypted pages to disk• Empty Temporary Internet Files folder when

browser is closed• Warn if changing between secure and not

secure mode

Security Awareness, 3rd Edition 33

Page 34: Internet security

Defenses Through Browser Settings (cont’d.)

• IE Web browser defense categories (cont’d.):– Security zones

• Set customized security for these zones • Assign specific Web sites to a zone

– Restricting cookies• Use privacy levels in IE

Security Awareness, 3rd Edition 34

Page 35: Internet security

Defenses Through Browser Settings (cont’d.)

Table 3-3 IE Web security zones

Security Awareness, 3rd Edition 35

Course Technology/Cengage Learning

Page 36: Internet security

E-mail Defenses Through Good Practices• Use common-sense procedures to protect

against harmful e-mail• Never click an embedded hyperlink in an e-mail• Be aware that e-mail is a common method for

infecting computers• Never automatically open an unexpected

attachment• Use reading panes and preview attachments• Never answer an e-mail request for personal

information• Really????

Security Awareness, 3rd Edition 36

Page 37: Internet security

Internet Defense Summary

Table 3-4 Internet defense summary

Security Awareness, 3rd Edition 37

Course Technology/Cengage Learning

Page 38: Internet security

Summary

• Internet composition– Web servers– Web browsers

• Internet technologies– HTML– JavaScript– Java– ActiveX

Security Awareness, 3rd Edition 38

Page 39: Internet security

Summary (cont’d.)• Privacy risk

– Cookies– Adware

• Security risk– Mistyped Web address– Drive-by downloads

• Email security– Spam– Attachments

• Security applications

Security Awareness, 3rd Edition 39

Page 40: Internet security

Walrus Risk

• Walrus Risk – They may look cute, but walruses are dangerous. They can poke your eyes out with their tusks!