Download - Internet Security Group Five
-
7/29/2019 Internet Security Group Five
1/19
Internet SecurityBy: Kyle Lutz, Amber Kariker THE BEST, Greg Krutick, A.J. Nezamabadi,Sharon Kimemia
-
7/29/2019 Internet Security Group Five
2/19
Presentation Over:
Internet Security Threats Current Issues
Internet Statistics, did you know?
Industry Response
Available Tools
Hackers: History, who they are, techniques
Hackers: Top tools, most likely to be hacked,
successful hackers Intrusion Prevention
Intrusion Detection
Conclusion
-
7/29/2019 Internet Security Group Five
3/19
Internet Security Threats
Identity theft
Phishing
Viruses
Spam
-
7/29/2019 Internet Security Group Five
4/19
Current Issues
Case Study -TJX Computer breach
Costs- 12 million (1st quarter)
Legal issues
Credit Card Fraud
Timeline
-
7/29/2019 Internet Security Group Five
5/19
Internet Statistics, did you know?
Top e-mail sites in2006 for spaminclude.(according to Commtouch).
Hotmail 4.7 millionYahoo 4.2 million
MSN 2.1 million
Cisco 1.9 million
G-mail 1.5 million
-
7/29/2019 Internet Security Group Five
6/19
Internet Statistics, did you know?
Both viruses and spam have continued to increase over the years
-
7/29/2019 Internet Security Group Five
7/19
Industry Response
Software analyst meet todiscuss the latesttechnology
Demand for security
professionals Many companies have
spent money on securityand repairs
Microsoft estimated twobillion dollars in 2005
www.Getsafeonline.com
http://www.homeoffice.gov.uk/
-
7/29/2019 Internet Security Group Five
8/19
Available Tools
Anti-Virus- Norton 2007;Best known namein anti-virus and internet security
Anti-Spy Ware
Firewall Protection
Anti-spam
-
7/29/2019 Internet Security Group Five
9/19
History of Hackers
In December of 1947, the transistor was invented. Captain Crunch
Steve Jobs
Kevin Mitnick AT&T
The Worm- Robert Tappan Morris
Kevin Poulsen (a.k.a. Dark Dante)
Tsumomu Shimomura David Smith
Jon Johansen (a.k.a. DVD Jon)
-
7/29/2019 Internet Security Group Five
10/19
Who are Hackers?
Definition The word Hacker
Computer programming must be a hobby, something done
for fun, not out of a sense of duty or for the money. A person who practices hacking is called a hacker.
Hacking can be just to find out how it works withoutcriminal intent.
Hacking can be simply to crack a code
A hacker can be breaking into a computer that's yours,often not wanted, and now prohibited by law.
-
7/29/2019 Internet Security Group Five
11/19
Different Hacker Techniques
Information Sharing Information Disseminating The belief that system-cracking for fun and exploration is
ethically OK as long as the cracker commits no theft,vandalism, or breach of confidentiality.
Telecommunications Studying Redistributing money and credit information maintained in
credit bureau computers. Obtaining money and property from companies by altering
the computerized information used by the companies.
-
7/29/2019 Internet Security Group Five
12/19
Top Tools Hackers Use
Spam Downloads
Pop-ups
Active X
-
7/29/2019 Internet Security Group Five
13/19
Most Likely to be Hacked
Small businesses with 10 or feweremployees.
Most vulnerable
Less resources Ignore or unaware of risks
Large businesses with 100 or more
employees Higher profile
Larger network
-
7/29/2019 Internet Security Group Five
14/19
Successful Hackers
Eric McCarty hacks into USC databaseAustralian hacker attacks sewage control
computers
-
7/29/2019 Internet Security Group Five
15/19
Intrusion Prevention
To prevent virus infection Disable Active X controls on IE
Run anti-virus software with updates
Do not open suspicous e-mails
Malware/Spyware infection
Run anti-spyware software
Avoid using P2P/file-sharing software
Intrusions Run a firewall
Be cautious towards ActiveX and Java Applet prompts
-
7/29/2019 Internet Security Group Five
16/19
Intrusion Detection
Intrusion detection systems are the nextgeneration of security beyond firewall protection
Host Based IDS: For servers that contain sensitive
information.
Network Based IDS: Monitors certain networksegments.
Gives administrators a more proactive approach tostopping a potential threat.
-
7/29/2019 Internet Security Group Five
17/19
Introduction to Detection
-
7/29/2019 Internet Security Group Five
18/19
Conclusion
User awareness is key to a securecomputer/network
Do not open suspicious files/emails
Verify ActiveX/Java promptsAvoid using P2P programs
Avoid downloading freeware
If attacked, disconnect the network. Do not turnoff the computer
-
7/29/2019 Internet Security Group Five
19/19
Resources
Alex (2006). A Short History of Hacking. Retrieved May 23, 2007, from Neatorama Website: http://www.neatorama.com/2006/08/28/a-short-history-of-hacking
Breeding, M. (2007, January). Spam Wars: The Battle of the Formbots. Computers inLibraries,27(1), 32-34. Retrieved May 22, 2007, from Computer Source database.
Damman H. Whose problem is it?.Process & Control Engineering (PACE) [serial online].November 2005;58(10):31-35. Available from: Business Source Premier, Ipswich, MA.Accessed May 24, 2007.
Ending the age of the password. (2005, February 22). Computer Weekly, Retrieved May 23,2007, from Business Source Premier database.
Harvery, Brian (1985). What is a Hacker?. Retrieved May 23, 2007, from What is aHacker? Web site: .
(2006). Hacking and Hackers An Introduction. Retrieved May 23, 2007, from Hacking andHackers Web site: http://www.thocp.net/reference/hacking/hacking.htm
Lemos, R. TJX breach larger than previously thought. Retrieved from.
Pasquariello A. THREAT REDUCTION.Fast Company [serial online]. May 2007;115:22-23. Available from: Computer Source, Ipswich, MA. Accessed May 24, 2007.
Spanbauer, S. (2007, March). Thwart the Three Biggest Internet Threats of 2007.PC World,25(3), 120-122. Retrieved May 23, 2007, from Academic Search Premier database.
Trigaux, Robert (2000). A History of Hacking. Retrieved May 23, 2007, from St. PetersburgTimes Online Web site: http://www.sptimes.com/Hackers/history.hacking.html
http://www.cs.berkeley.edu/~bh/hacker.htmlhttp://www.cs.berkeley.edu/~bh/hacker.html