Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who...
-
Upload
godfrey-long -
Category
Documents
-
view
216 -
download
0
Transcript of Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who...
![Page 1: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/1.jpg)
PERSONAL COMPUTER SECURITY
Sydney BaizeMrs. Shirley MillerBPC110
![Page 2: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/2.jpg)
“To connect your computer to the Internet
is to be in danger” -Gralla
![Page 3: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/3.jpg)
PC Revolution
1998 2003 20100.00%
10.00%20.00%30.00%40.00%50.00%60.00%70.00%80.00%
US Households with PCs
![Page 4: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/4.jpg)
Hackers“In the most familiar sense, a hacker is anyone who attempts to break into computer systems
by surreptitious means.” –Hess
Send probes• See which computers
have Back Orifice
Controls• Uses BO to enter
computer and gather whatever information they want
Back Orifice:
A computer program
that enables a user to
control a computer with
Microsoft Windows OS
from a remote location.
VuzeLimeWire
![Page 5: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/5.jpg)
Dangers
Hackers can do infinite amounts of damage to a computer once they have control. Gather info
History Files Passwords
Hack other computers
![Page 6: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/6.jpg)
ProtectionFirewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic.
Examine• Check data
packets the computer is receiving
Search• Look to see
if packets are being sent to certain ports
Block and/or Alert
![Page 7: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/7.jpg)
FirewallsBlock
selectively or all packets
sent to common
hacker used ports
Alert user when
programs attempt to connect to Internet
Block specific IP addresses
Keep log of every
attempted probe/attack
made
![Page 8: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/8.jpg)
Spyware
Many types of Spyware 2 things in common
1. Spy ▪ Track searches▪ Record keystrokes▪ Watch pages visited▪ Open backdoor
2. Install without knowledge▪ Piggyback other software▪ Be misleading
![Page 9: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/9.jpg)
Dangers
Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable.
Spyware is tricky When software it piggybacked from is
deleted, the Spyware is not Can be Polymorphic- spawns new copies in
other locations when detected
![Page 10: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/10.jpg)
Protection
Spyware is most commonly used to make
money. • Anti-spyware is a necessity• Special spyware deleting software is sometimes needed as well
![Page 11: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/11.jpg)
Anti-Spyware
Scans• Searches system for
bits called signatures: signs of obvious infection
Compares• Compares found
signature to ones in its database.
• If a match is found- there is an infection.
Deletes• Deletes the spyware
once it’s found, may require special program since spyware can often leave traces in more than one place
![Page 12: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/12.jpg)
Anti-Spyware
Looks for suspicious behavior
Constantly updates to keep track of latest infections
Works in real time: watches for signs of spyware being installed or pages
being hijacked
![Page 13: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/13.jpg)
Tips
• Know the dangers of the Web
• Share as little personal info as possible
• Don’t look past suspicious behavior
• Install reputable protection software
![Page 14: Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.](https://reader036.fdocuments.net/reader036/viewer/2022062600/5a4d1b517f8b9ab0599a7be7/html5/thumbnails/14.jpg)
Works CitedGralla, Preston. How Personal & Internet Security Work. Indianapolis: Que Publishing, 2006.Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014 <http://www.microsoft.com/en-us/download/details.aspx?id=29046&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+MicrosoftDownloadCenter+%28Microsoft+Download+Center%29#tm>.Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014 <http://support.microsoft.com/kb/49500>.U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999.US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.