computer science 1 week 7. this week... qbasic programming qbasic programming input and formatted...

101
Computer Science 1 Week 7

Upload: clifford-white

Post on 26-Dec-2015

251 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Computer Science 1Week 7

Page 2: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

This Week ...This Week ...

• QBasic ProgrammingQBasic Programming Input and formatted displayInput and formatted display

• Computer ConceptsComputer Concepts PhishingPhishing Firewalls Firewalls Anti-Spyware and Anti-Spyware and FakeFake Anti-Spyware Anti-Spyware

Software Software Legality of SpywareLegality of Spyware

Page 3: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 4: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

QBasic LabQBasic Lab

The Security-related LabThe Security-related Lab

Page 5: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Lab: SecurityLab: Security

• ObjectivesObjectives use your QBasic knowledgeuse your QBasic knowledge create an evaluation programcreate an evaluation program interview another studentinterview another student

• Your ProgramYour Program inputs a name and five numbers (scores)inputs a name and five numbers (scores) gives the user a security "score"gives the user a security "score"

Page 6: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

The Lab QuestionsThe Lab Questions

• How well are they protected from VirusesHow well are they protected from Viruses• How well are they protected from SpywareHow well are they protected from Spyware• How well are they protected from Phishing How well are they protected from Phishing • How well are their files organizedHow well are their files organized• How often do they backup their filesHow often do they backup their files

Page 7: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Remember ...Remember ...

• Turn your program Turn your program && your output your output To Lab 6 in SacCTTo Lab 6 in SacCT

• If you do not turn in your program, If you do not turn in your program, you will not get credit!you will not get credit!

Page 8: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 9: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Phishing & Phishing & PrivacyPrivacy

Scams in your InboxScams in your Inbox

Page 10: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

E-Mail PhishingE-Mail Phishing

• Internet scam that comes as e-mailInternet scam that comes as e-mail• Pretends to be a legitimate websitePretends to be a legitimate website

warns that you have to change a passwordwarns that you have to change a password send money to keep your "account" activesend money to keep your "account" active

• Often will display:Often will display: link – which can be used to verify your e-maillink – which can be used to verify your e-mail attachment – often spyware or worseattachment – often spyware or worse

Page 11: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Sample E-MailSample E-Mail

Your account is about to expire!

To keep your account active, please follow the link below and enter your account information.

Page 12: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

202.149.196.236is NOT eBay!

202.149.196.236is NOT eBay!

ForgeryForgery

Page 13: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

How Do They Get My How Do They Get My E-Mail?E-Mail?

• Searching the InternetSearching the Internet special software browses the Internetspecial software browses the Internet this software is known as a this software is known as a "spider""spider" they search: public forums, websites, etc...they search: public forums, websites, etc...

• Where your e-mail is found...Where your e-mail is found... can help them create an online profilecan help them create an online profile e.g. a website about dogse.g. a website about dogs

Page 14: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

How Do They Get My How Do They Get My E-Mail?E-Mail?

• Website SubscriptionsWebsite Subscriptions some websites will sell your e-mail to spammerssome websites will sell your e-mail to spammers ... or they might spam you themselves... or they might spam you themselves

• Black MarketBlack Market many e-mail addresses are bought and soldmany e-mail addresses are bought and sold they could be sold by a website or another they could be sold by a website or another

spammerspammer

Page 15: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Getting Your NameGetting Your Name

• If your e-mail contains your name ...If your e-mail contains your name ... software can get your first and/or last namesoftware can get your first and/or last name the resulting junk mail will use the resulting junk mail will use youryour name name it can look legit – it can look legit – "Hey Joe, long time buddy!""Hey Joe, long time buddy!"

• ExamplesExamples [email protected] [email protected] Joe Gunchy Joe Gunchy [email protected] [email protected] Stewie Stewie

GriffenGriffen

Page 16: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Getting Your NameGetting Your Name

• Website linksWebsite links naturally, websites put the name of the person naturally, websites put the name of the person

with the e-mail linkwith the e-mail link their spider records this informationtheir spider records this information

• ExamplesExamples Contact Contact Joe GunchyJoe Gunchy Send an Send an e-maile-mail to Eric Cartman to Eric Cartman

Page 17: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Phishing SitesPhishing Sites

• Estimated by Harvard and CambridgeEstimated by Harvard and Cambridge 75.8% of phishing sites are hosted on 75.8% of phishing sites are hosted on

compromised servers. compromised servers.

State of Internet Security, Q1-Q2, 2009State of Internet Security, Q1-Q2, 2009Websense Security LabsWebsense Security Labshttp://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf

Page 18: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 19: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

FirewallsFirewalls

Protecting Yourself from InvasionProtecting Yourself from Invasion

Page 20: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

FirewallsFirewalls

• System software System software protects access to your computer on a networkprotects access to your computer on a network sometimes built into specialized Internet hardwaresometimes built into specialized Internet hardware

• Windows 7 SP2 has a built-in firewallWindows 7 SP2 has a built-in firewall however, still need to properly set up!however, still need to properly set up!

Page 21: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Types of ProtectionTypes of Protection

• Incoming Incoming protect access coming protect access coming inin to your computer to your computer stops remote hackers and wormsstops remote hackers and worms

• OutgoingOutgoing protect access going protect access going outout from your computer from your computer can stop spyware from sending datacan stop spyware from sending data can stop your computer from spreading wormscan stop your computer from spreading worms

Page 22: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Windows FirewallWindows Firewall

• Came with Windows 7 Service Pack 2Came with Windows 7 Service Pack 2• Built into Windows OSBuilt into Windows OS• OnlyOnly has incoming protection has incoming protection

spyware can still send your data!spyware can still send your data! Microsoft argues that spyware might destroy Microsoft argues that spyware might destroy

the firewall – so outgoing is not neededthe firewall – so outgoing is not needed

Page 23: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Zone AlarmZone Alarm

• License:License: freeware for the limited versionfreeware for the limited version commercial "Pro" version has additional featurescommercial "Pro" version has additional features

• Has Has bothboth incoming and outgoing protection incoming and outgoing protection• Works with Windows 95, 98, ME, XP, Vista, and Works with Windows 95, 98, ME, XP, Vista, and

77• Website: Website: www.zonealarm.comwww.zonealarm.com

Page 24: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

17,25417,254

Page 25: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Zone Alarm AlertsZone Alarm Alerts

Page 26: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 27: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

InternetInternetCookiesCookies

Delicious Little AnnoyancesDelicious Little Annoyances

Page 28: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

What are Cookies?What are Cookies?

• A small text file saved on your computerA small text file saved on your computer created by your web browsercreated by your web browser only visible to the site that created themonly visible to the site that created them

• They are used legitimately toThey are used legitimately to keep you logged onto a websitekeep you logged onto a website maintain temporary session data for maintain temporary session data for authenticationauthentication, , site site

preferencespreferences, , shopping cartshopping cart contents, identifier for a contents, identifier for a server-based sessionserver-based session, or any function that can be , or any function that can be accomplished through storing text dataaccomplished through storing text data

Page 29: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Threat of CookiesThreat of Cookies

• By saving data in cookies ...By saving data in cookies ... affiliated sites can track your browsing habitsaffiliated sites can track your browsing habits this cannot damage your computerthis cannot damage your computer

• Not as dangerous as SpywareNot as dangerous as Spyware although this is a form of spyingalthough this is a form of spying you do not suffer the effects of spywareyou do not suffer the effects of spyware only your browsing habits can be watchedonly your browsing habits can be watched

Page 30: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Making the Cookies Making the Cookies CrumbleCrumble

• Delete cookies on a regular basisDelete cookies on a regular basis it will log you out of websitesit will log you out of websites but, it gets rid of the tracking cookiesbut, it gets rid of the tracking cookies

• Block third-party cookiesBlock third-party cookies websites often embed advertisements websites often embed advertisements often stored on another server –it sends a cookieoften stored on another server –it sends a cookie Firefox and Internet Explorer can block theseFirefox and Internet Explorer can block these

Page 31: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 32: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Organizing Your Organizing Your FilesFiles

Making Sure You Don't Lose AnythingMaking Sure You Don't Lose Anything

Page 33: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Use Descriptive Use Descriptive NamesNames

• Descriptive names ...Descriptive names ... tell you more about it's contentstell you more about it's contents you might have to find the file you might have to find the file

yearsyears after you created it after you created it• Examples:Examples:

"essay.doc""essay.doc" is is notnot good good "CSc 1 – Essay.doc""CSc 1 – Essay.doc" is good is good

Page 34: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Don't Change File Don't Change File ExtensionsExtensions

• By default, Windows...By default, Windows... does not display extensionsdoes not display extensions Folder Options can show themFolder Options can show them

• If extensions are changed...If extensions are changed... they will be considered a different they will be considered a different

typetype of file of file you won't be able to open themyou won't be able to open them

Page 35: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Keep Files OrganizedKeep Files Organized

• Use folders to keep related files Use folders to keep related files togethertogether

• Create a hierarchyCreate a hierarchy folder for each semesterfolder for each semester folder for each classfolder for each class etc ...etc ...

• You can find files easilyYou can find files easily

Page 36: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Write-Protect FilesWrite-Protect Files

• You can protect files from You can protect files from being changedbeing changed

• Excellent for important filesExcellent for important files• To Do This:To Do This:

right-click on the fileright-click on the file check the "Read Only" boxcheck the "Read Only" box

Page 37: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 38: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Security Security ChecklistChecklist

Ways to Protect Your ComputerWays to Protect Your Computer

Page 39: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Backup Your Data Backup Your Data OftenOften

• Why?Why? data can, and will, be lostdata can, and will, be lost this can be caused by viruses, by this can be caused by viruses, by

mistake, hardware failure, etc ....mistake, hardware failure, etc ....• Storage MediaStorage Media

Flash driveFlash drive CD-ROM (recommended)CD-ROM (recommended)

Page 40: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Backup Your Data Backup Your Data OftenOften

• Backup depending ...Backup depending ... upon how much data you can upon how much data you can afford to loseafford to lose whenever you complete something "major"whenever you complete something "major" once a weekonce a week should be good enough should be good enough

• Store backups in a safe placeStore backups in a safe place different location from your computerdifferent location from your computer be careful – you don't want it stolenbe careful – you don't want it stolen

Page 41: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Install Anti-Spyware Install Anti-Spyware SoftwareSoftware

• Why?Why? you need to get rid of the malicious softwareyou need to get rid of the malicious software afterwards, you can work on your securityafterwards, you can work on your security

• Good Anti-Spyware softwareGood Anti-Spyware software Spybot Search & DestroySpybot Search & Destroy Ad-AwareAd-Aware Microsoft Windows DefenderMicrosoft Windows Defender

Page 42: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Create DisposableCreate DisposableE-MailsE-Mails

• Public e-mail addressPublic e-mail address many websites require you to registermany websites require you to register sometimessometimes they send junk mail they send junk mail nevernever use your name in this e-mail use your name in this e-mail

• Personal e-mail addressPersonal e-mail address use this e-mail for family and friendsuse this e-mail for family and friends do do notnot post this on the Internet – EVER post this on the Internet – EVER

Page 43: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Read the End User Read the End User License AgreementLicense Agreement

• Why?Why? sometimes you give up your rightssometimes you give up your rights sometimes the "find print" is sometimes the "find print" is

maliciousmalicious• Be weary of free software Be weary of free software

too good to be freetoo good to be free borderline legalborderline legal

Page 44: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Optional:Optional:Install a FirewallInstall a Firewall

• Why?Why? prevent worms and hackersprevent worms and hackers firewalls will alert you to access attemptsfirewalls will alert you to access attempts

• Do this Do this afterafter you have removed spyware you have removed spyware for a while, you can trust any for a while, you can trust any outgoingoutgoing attempts attempts in a couple days, you should have no warningsin a couple days, you should have no warnings

• Good free firewalls: ZoneAlarmGood free firewalls: ZoneAlarm

Page 45: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

You will get lots of these at first

You will get lots of these at first

Page 46: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 47: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Legality of Legality of SpywareSpyware

How the Law, and You, are ManipulatedHow the Law, and You, are Manipulated

Page 48: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Legal or Illegal?Legal or Illegal?

• It would It would logicallylogically seem to be illegal seem to be illegal• However, some spyware companiesHowever, some spyware companies

use the law to protect themselvesuse the law to protect themselves they also use the law to attack opponentsthey also use the law to attack opponents they even argue their actions are justthey even argue their actions are just

Page 49: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Computer Fraud & Computer Fraud & Abuse ActAbuse Act

• It is It is illegalillegal to gain unauthorized access to gain unauthorized access to obtain financial datato obtain financial data to obtain data from interstate or foreign to obtain data from interstate or foreign

communication communication • This would This would seemseem to apply to the Internet to apply to the Internet• However, users However, users actuallyactually give them access! give them access!

Page 50: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

When You Install When You Install Spyware ...Spyware ...

• You often ...You often ... sign an agreementsign an agreement gives the spyware access to gives the spyware access to

you privacy and datayou privacy and data• Spyware companies argueSpyware companies argue

this gives consentthis gives consent this makes spyware legalthis makes spyware legal

Page 51: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

End User License End User License AgreementAgreement

• EEnd nd UUser ser LLicense icense AAgreement (EULA)greement (EULA) contract between the user and software distributorcontract between the user and software distributor most software titles have onemost software titles have one

• Often it is agreed to during installationOften it is agreed to during installation most people ignore it or don't read it in detailmost people ignore it or don't read it in detail spyware companies know thisspyware companies know this an agreement is hidden deep in the legalesean agreement is hidden deep in the legalese

Page 52: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

EULA Be Careful...EULA Be Careful...

• Be carefulBe careful spyware may be hidden deep in the legalesespyware may be hidden deep in the legalese many states treat this as a contractmany states treat this as a contract

• Without knowing it, you can ...Without knowing it, you can ... legally allow spyware to take your datalegally allow spyware to take your data give up any right to sue for damagesgive up any right to sue for damages

Page 53: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Did you read this?

Did you read this?

Page 54: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Deliberate misuse of product title field

Deliberate misuse of product title field

Page 55: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

WHAT?WHAT?

Page 56: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

State of Internet Security State of Internet Security Websense Security Labs, Q1-Q2, 2009Websense Security Labs, Q1-Q2, 2009http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf

• Web securityWeb security 233% growth in # of malicious web sites in last 6 months 233% growth in # of malicious web sites in last 6 months

and 671% growth in last year. and 671% growth in last year. 77% of web sites with malicious code are legitimate sites 77% of web sites with malicious code are legitimate sites

that have been compromised.that have been compromised. 61% of the top 100 sites either hosted malicious content 61% of the top 100 sites either hosted malicious content

or contained a masked redirect to malicious sites. or contained a masked redirect to malicious sites.

Page 57: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

State of Internet Security State of Internet Security Websense Security Labs, Q1-Q2, 2009Websense Security Labs, Q1-Q2, 2009http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf

• Email securityEmail security 87.7% of email messages were spam. 87.7% of email messages were spam. 85.6% of all unwanted emails contained links to spam 85.6% of all unwanted emails contained links to spam

sites and/or malicious web sites.sites and/or malicious web sites. Shopping remained the leading topic of spam (28%), Shopping remained the leading topic of spam (28%),

followed by cosmetics (18.4%), medical (11.9%) and followed by cosmetics (18.4%), medical (11.9%) and education (9.5%).education (9.5%).

Page 58: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

State of Internet Security State of Internet Security Websense Security Labs, Q1-Q2, 2009Websense Security Labs, Q1-Q2, 2009http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf

• Data securityData security 37% of malicious Web/HTTP attacks included data-37% of malicious Web/HTTP attacks included data-

stealing code. stealing code. 57% of data-stealing attacks are conducted over the Web. 57% of data-stealing attacks are conducted over the Web.

Page 59: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

State of Internet Security State of Internet Security Websense Security Labs, Q1-Q2, 2009Websense Security Labs, Q1-Q2, 2009http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf http://securitylabs.websense.com/content/Assets/WSL_Q1_Q2_2009_FNL.pdf

• Web security landscapeWeb security landscape

Top 100 most visited Web sites: “social network”, or “search” Top 100 most visited Web sites: “social network”, or “search” sites.sites.

The next million most visited Web sites: current events, news The next million most visited Web sites: current events, news sites (regional or genre-focused). sites (regional or genre-focused).

The “long tail” of the Internet is populated by personal sites: The “long tail” of the Internet is populated by personal sites: blogs, small business sites. blogs, small business sites.

Each category has its own unique security challengesEach category has its own unique security challenges ..

Page 60: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Trends Trends

• Malware attacks on social networksMalware attacks on social networks• Social engineeringSocial engineering• Smartphone and mobile devices as target Smartphone and mobile devices as target

for hackersfor hackers• Botnet Botnet

Page 61: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

SummarySummary

• Be Be veryvery careful what you install careful what you install• Read the End User License AgreementRead the End User License Agreement

you can legally allow spyware to take your datayou can legally allow spyware to take your data you can give up any right to sue for damagesyou can give up any right to sue for damages

• Remember, it is Remember, it is youryour computer computer you can do anything you want with ityou can do anything you want with it but, it is your responsibilitybut, it is your responsibility

•Awareness of different types of malware•File organization and backup•Make sure anti-malware software up to date•Careful about file attachment to emails•Be careful about websites to visit

Page 62: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 63: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Anti-Spyware Anti-Spyware ApplicationsApplications

Software Designed to Stop SpywareSoftware Designed to Stop Spyware

Page 64: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Anti-Spyware Anti-Spyware ApplicationsApplications

• Specialized softwareSpecialized software designed to remove spywaredesigned to remove spyware protect the computer from spywareprotect the computer from spyware

• Free software is availableFree software is available from industry leadersfrom industry leaders from non-profit organizationsfrom non-profit organizations

Page 65: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Lavasoft Ad-AwareLavasoft Ad-Aware

• Aesthetically appealingAesthetically appealing• Very easy to useVery easy to use• Has a free versionHas a free version

free version must be run manuallyfree version must be run manually the pay version is even betterthe pay version is even better

• Works with Windows 2000, XP, VistaWorks with Windows 2000, XP, Vista• Website: Website: www.lavasoft.comwww.lavasoft.com

Page 66: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 67: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Spybot - Search & Spybot - Search & DestroyDestroy

• Can "immunize" your systemCan "immunize" your system• Free Free

started as a student project by Patrick Kolla started as a student project by Patrick Kolla supported by donationssupported by donations

• Has won several awardsHas won several awards• Works with Windows 95, 98, ME, XP, VistaWorks with Windows 95, 98, ME, XP, Vista• Website: Website: www.safer-networking.www.safer-networking.orgorg

Page 68: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 69: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 70: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Microsoft Windows Microsoft Windows DefenderDefender

• System softwareSystem software prevents spyware from being installedprevents spyware from being installed protects your computer's settingsprotects your computer's settings

• Built in to Windows VistaBuilt in to Windows Vista version can be downloaded for XPversion can be downloaded for XP will not work with other operating systemswill not work with other operating systems

• Website: Website: www.microsoft.comwww.microsoft.com

Page 71: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 72: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Microsoft Windows Microsoft Windows Defender AlertsDefender Alerts

That gets your attention!

That gets your attention!

Page 73: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Commercial Commercial ApplicationsApplications

• Anti-SpywareAnti-SpywareTrend MicroTrend Micro

• PestPatrolPestPatrolComputer AssociatesComputer Associates

• Spy SweeperSpy SweeperWebroot SoftwareWebroot Software

Page 74: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Commercial Commercial ApplicationsApplications

• SpyCatcher SpyCatcher AvanQuestAvanQuest

• Spyware DoctorSpyware DoctorPC ToolsPC Tools

• SpyWare Killer ProSpyWare Killer ProCosmiCosmi

Page 75: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 76: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

FakeFakeAnti-SpywareAnti-Spyware

Wolves in Sheep's ClothingWolves in Sheep's Clothing

Page 77: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

FakeFake Anti-Spyware Anti-Spyware ApplicationsApplications

• Spyware companies know:Spyware companies know: people want to remove their softwarepeople want to remove their software people will buy or download anti-spyware softwarepeople will buy or download anti-spyware software

• Danger ...Danger ... some create some create fakefake anti-spyware applications anti-spyware applications these are officially called these are officially called "rogue anti-spyware""rogue anti-spyware" if you install them, you will be infested!if you install them, you will be infested!

Page 78: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

FakeFake Anti-Spyware Anti-Spyware

• They are TrojansThey are Trojans pretend to help the userpretend to help the user but perform malicious actionsbut perform malicious actions

• What they typically doWhat they typically do give give false positivesfalse positives – fake spyware alerts – fake spyware alerts download new software – often spywaredownload new software – often spyware try to convince user to buy the "full" versiontry to convince user to buy the "full" version

Page 79: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Example TrojanExample Trojan

LIES!LIES!

Page 80: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

A Few A Few Rogue Rogue ApplicationsApplications

• AntiVirus-Gold AntiVirus-Gold • PAL Spyware RemoverPAL Spyware Remover• PSGuard PSGuard • SpyAxe SpyAxe • SpywareQuakeSpywareQuake• SpywareStrike SpywareStrike • Spy Sheriff Spy Sheriff

Page 81: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

A Few A Few Rogue Rogue ApplicationsApplications

• SpyTrooper SpyTrooper • SpyBan SpyBan • Spyware Stormer Spyware Stormer • SpyWiper SpyWiper • VirusBurstVirusBurst• WinFixerWinFixer• WorldAntiSpy WorldAntiSpy

Page 82: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

SpywareQuake / SpywareQuake / VirusBurst VirusBurst TrojanTrojan

• DANGER:DANGER: fakefake anti-spyware software anti-spyware software• What is doesWhat is does

attacks your computer with a worm / trojanattacks your computer with a worm / trojan displays fake warning windowsdisplays fake warning windows gives false positivesgives false positives tries to convince users to buy the "full" versiontries to convince users to buy the "full" version

Page 83: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 84: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

False Positives

False Positives

Page 85: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Try to get the victim to pay

Try to get the victim to pay

Page 86: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

SpySheriff / SpySheriff / SpyTrooper SpyTrooper TrojanTrojan

• DANGER:DANGER: fakefake anti-spyware software anti-spyware software • What is doesWhat is does

false positives – ludicrous results!false positives – ludicrous results! has the user download additional softwarehas the user download additional software tries to convince users to buy the "full" versiontries to convince users to buy the "full" version

• Has a fake site that mimic's Microsoft's Has a fake site that mimic's Microsoft's

Page 87: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 88: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 89: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing
Page 90: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

False Positives!

False Positives!

Page 91: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

SpyAxe / Spyware SpyAxe / Spyware Strike Strike TrojanTrojan

• DANGER:DANGER: fakefake anti-spyware software anti-spyware software • Affiliated productsAffiliated products

SpyStrikeSpyStrike TopAntiSpyTopAntiSpy Pot.SpyAxe Pot.SpyAxe

• Related to the ZToolbar SpywareRelated to the ZToolbar Spyware

Page 92: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

SpyAxe / Spyware SpyAxe / Spyware Strike Strike TrojanTrojan

• What it doesWhat it does changes your wallpaperchanges your wallpaper warns about installed spyware warns about installed spyware ... ... that it installed!that it installed! false positivesfalse positives has the user download additional softwarehas the user download additional software tries to convince users to buy the "full" versiontries to convince users to buy the "full" version

Page 93: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

Scared yet?Scared yet?

Page 94: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 95: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 96: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

World Anti-SpyWorld Anti-SpyTrojanTrojan

• DANGER:DANGER: fakefake anti-spyware software anti-spyware software • What it doesWhat it does

displays pop-up windowsdisplays pop-up windows hijacks the desktophijacks the desktop false positivesfalse positives tries to convince users to buy the "full" versiontries to convince users to buy the "full" version

Page 97: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 98: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

WinFixer WinFixer TrojanTrojan

• DANGER:DANGER: fakefake anti-spyware software anti-spyware software • Related to the When-U SpywareRelated to the When-U Spyware• What it doesWhat it does

displays pop-up windowsdisplays pop-up windows downloads softwaredownloads software false positivesfalse positives tries to convince users to buy the "full" versiontries to convince users to buy the "full" version

Page 99: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

DANGER – Malware WebsiteDANGER – Malware Website

Page 100: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing

In Summary ...In Summary ...

• Be Be VERYVERY careful what you download careful what you download some of the software is dangeroussome of the software is dangerous many are Trojansmany are Trojans

• Trust Trust ONLYONLY the following free software: the following free software: Ad-AwareAd-Aware Spybot Search and DestroySpybot Search and Destroy

Page 101: Computer Science 1 Week 7. This Week... QBasic Programming QBasic Programming  Input and formatted display Computer Concepts Computer Concepts  Phishing