recap of project management alternative matrix phishing, sniffing, spoofing, oh my! class 19: it...

Download Recap of Project Management Alternative Matrix Phishing, Sniffing, Spoofing, Oh My! Class 19: IT Security and Networking August 3 rd, 2011

If you can't read please download the document

Upload: tobias-miller

Post on 17-Dec-2015

213 views

Category:

Documents


1 download

TRANSCRIPT

  • Slide 1
  • Slide 2
  • Recap of Project Management Alternative Matrix
  • Slide 3
  • Phishing, Sniffing, Spoofing, Oh My! Class 19: IT Security and Networking August 3 rd, 2011
  • Slide 4
  • Administration Extra credit opportunity (20 points) Assignment due tomorrow before class
  • Slide 5
  • Learning Objectives List a few current events in information systems news List situations when your privacy may be at risk Explain techniques for protecting your privacy *I loosely define hacker as someone how knowingly seeks information or resources not intended for him or her, whether for good or for bad.
  • Slide 6
  • I am not responsible for what you may learn, or what I may do to your computer! But Seriously: Some of the stuff I show here can land you some jail time. Be Responsible
  • Slide 7
  • Terminology If I say something like spam filter, and if you do not know what this is.RAISE YOUR HAND!!!
  • Slide 8
  • Yesterday?
  • Slide 9
  • Today?
  • Slide 10
  • Why do hackers hack? Pleasure To learn Trade secrets ID theft Credit card theft Access to resources (e.g., email) Espionage Malice Protect information? Our right to know?
  • Slide 11
  • If theres anything I can get you to walk away with from this, its that you should care more about watching out for yourself Because there are a lot of people looking to get you The Government Your personal enemies Your employers People on a mission The Various Underground Scenes ^ These guys are probably the most dangerous
  • Slide 12
  • Because people engage in a lot of criminal activity Downloading music Downloading movies Downloading games Internet Gambling Looking at illegal material (e.g., porn) Or maybe you were just surfing the net as usual
  • Slide 13
  • Jeff Jenkins Dont learn to hack, hack to learn
  • Slide 14
  • Bryan W. Age:21 Occupation:Humanities Student Hometown:Eloy, Arizona Talent:Sniffing Do you want to do what I just did? Google: Wireshark
  • Slide 15
  • Sniffing To inhale a short, audible breath through the nose, as in smelling something. To sniffle. To use the sense of smell, as in savoring or investigating: sniffed at the jar to see what it held. To regard something in a contemptuous or dismissive manner: The critics sniffed at the adaptation of the novel to film. Informal To pry; snoop:
  • Slide 16
  • Sniffing intercept and log traffic passing over a digital network or part of a network In other words, a program that lets other people see what traffic is passing on the internet
  • Slide 17
  • Wireshark Example http://www.wireshark.org/ Good uses too!
  • Slide 18
  • Solutions Dont use an unsecure network (e.g., UAPublic, someone elses wireless network) Encryption! Dont host an open wireless network (for many other reasons too)!!!!!! !!!!!! !!!!!!
  • Slide 19
  • Grandma B. Age:83 Occupation:Grandmother Hometown:LA, California Talent:Spoofing Prevention Technique: Be careful opening up weird looking attachments Do you want to do what I just did? Google: Email Spoofing
  • Slide 20
  • Spoofing Pretending to be someone youre not
  • Slide 21
  • When do people do this? Caller ID spoofing Email spoofing Web site spoofing URL spoofing
  • Slide 22
  • Caller ID Spoofing http://www.telespoof.com/
  • Slide 23
  • Email and SMS Spoofing [email protected] www.hoaxmail.co.uk
  • Slide 24
  • Web site Spoofing
  • Slide 25
  • Preventions Anti-spyware; anti-virus protection Spam filters Certificate authorities: Email: http://www.thawte.com/resources/personal- email-certificates/index.html http://www.thawte.com/resources/personal- email-certificates/index.html Web site: http://www.thawte.com/rhttp://www.thawte.com/r
  • Slide 26
  • Nik Y. Age:19 Occupation:Secret Admirer Hometown:Elko, Nevada Talent:Phishing Do you want to do what I just did? Google: Hosts File
  • Slide 27
  • Phishing
  • Slide 28
  • PhishMe Education
  • Slide 29
  • Prevention Virus protection Dont give out passwords Spam Filters
  • Slide 30
  • Julia L. Age:22 Occupation:College Roommate Hometown:Detroit, Michigan Talent:Forensic Distro Do you want to do what I am going to do? Google: BackTrack
  • Slide 31
  • Physical Security If I can get to your computer. I can access stuff!!!!! Password or not!
  • Slide 32
  • High Security Server Rooms
  • Slide 33
  • Volunteer Please: Backtrack
  • Slide 34
  • Prevention Technique: Keep your computer in a safe place Locks? Encrypt Data
  • Slide 35
  • June J. Age:16 Occupation:High School Basketball Player Hometown:Diller, MT Talent:Explointing
  • Slide 36
  • Why does Windows update so often? A security patch is a change applied to an asset to correct the weakness described by a vulnerability. This corrective action will prevent successful exploitation and remove or mitigate a threats capability to exploit a specific vulnerability in an asset.
  • Slide 37
  • What can someone do if they get into your system through an unpatched security vulnerability? Everything
  • Slide 38
  • Just listen to this guy!
  • Slide 39
  • Prevention Install those updates and patches Be careful which Web sites you visit Be care which attachments you open up
  • Slide 40
  • What is the weakest link in security??
  • Slide 41
  • The User
  • Slide 42
  • Why?
  • Slide 43
  • Weak Password http://www.lockdown.co.uk/?pg=combi
  • Slide 44
  • The Sticky Note
  • Slide 45
  • Prevention Passphrases Memorize
  • Slide 46
  • Protecting Information Access Controls: Authentication Something the User Is Biometrics Something the User Has ID Cards Something the User Does Voice/Signature Recognitions Something the User Knows Passwords
  • Slide 47
  • They Click on Stuff and Install Stuff Virus Trojan horse Worm
  • Slide 48
  • Virus A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability. A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a floppy disk, CD, DVD, or USB drive.
  • Slide 49
  • Trojan Horse A Trojan horse, or Trojan, is a destructive program that masquerades as an application. The software initially appears to perform a desirable function for the user prior to installation and/or execution, but (perhaps in addition to the expected function) steals information or harms the system.[1] Unlike viruses or worms, Trojan horses do not replicate themselves, but they can be just as destructive.
  • Slide 50
  • Worm A computer worm is a self-replicating malware computer program, which uses a computer network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. This is due to security shortcomings on the target computer. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
  • Slide 51
  • Virus
  • Slide 52
  • Slide 53
  • Prevention Dont click on attachments unless you know who it is Dont visit non-credible Web sites Dont install free software unless it has been thoroughly tested and reviewed AVG Antivirus (http://free.avg.com)http://free.avg.com Spybot (http://www.safer-networking.org)http://www.safer-networking.org Lavasoft Ad-Aware (http://www.lavasoft.com)http://www.lavasoft.com Comodo Personal Firewall (http://personalfirewall.comodo.com)http://personalfirewall.comodo.com
  • Slide 54
  • Prevention Bad websites (illegal gambling, illegal pornography, etc.) When you visit a website, a log of your visit is usually written down somewhere. If its not recorded down at the actual website, itll be at any of the highway tolls that you had to get through to get to that website. If the police raid wherever the website is being served up from, theyre going to have access to those logs, which have your address and time written in them.
  • Slide 55
  • They Lose Things
  • Slide 56
  • Prevention? Its pretty obvious Sort of like run, run, run you stupid $!@%$
  • Slide 57
  • Prevention Dont put important documents unencrypted on portable devises
  • Slide 58
  • They download stuff Bittorrent P2P Limewire Kazaa Bearshare eDonkey
  • Slide 59
  • Some common technologies Bittorrent If you like to download anything off the net, chances are youve used Bittorrent, because around 60% of all traffic on the internet is from Bittorrent. It works by putting your name on a list and telling everyone else that youre interested in getting what is offered. Heres the problem: everyone can see your name on the list, including companies that dont like that youre stealing their stuff. All it takes is for them to have someone watch the names on the list
  • Slide 60
  • Some common technologies Next up: Limewire, Kazaa, BearShare and eDonkey These work by downloading stuff, then you share the love and offer up what you just downloaded. Companies scour the P2P networks looking for everyone that is offering their stuff up for the taking. If they see you offering their stuff, they try getting a copy of it from you, so that they are sure that what you are offering is actually their intellectual property. If youre just taking, they dont care about that. Once they find out the facts, they get your information from reading the data coming in from the download.
  • Slide 61
  • Shoulder Surfing
  • Slide 62
  • Social Engineering
  • Slide 63
  • Social engineering is the art of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniquesmanipulating
  • Slide 64
  • Famous Social Engieerers Kevin Mitnick Reformed computer criminal and later security consultant Kevin Mitnick popularized the term "social engineering", pointing out that it is much easier to trick someone into giving a password for a system than to spend the effort to crack into the system.He claims it was the single most effective method in his arsenal.Kevin Mitnick
  • Slide 65
  • How would you trick someone to get their password?
  • Slide 66
  • Famous Social Engineers Badir Brothers Brothers Ramy, Muzher, and Shadde Badirall of whom were blind from birthmanaged to set up an extensive phone and computer fraud scheme in Israel in the 1990s using social engineering, voice impersonation, and Braille-display computers. [13]IsraelBraille-display computers [13]
  • Slide 67
  • Famous Social Engineers Steve Stasiukonis Security Consultant for Secure Network Technologies. Inventor of the USB thumb drive test where USB sticks contained exploits to test if employees would run them from within their business environments. This attack is now one of the most popular social engineering techniques in existence and is used to test the human element of security around the world.
  • Slide 68
  • Enough with the Hacker!
  • Slide 69
  • Other Aspects of Security
  • Slide 70
  • Threats to Information Security Natural Disasters Floods Earthquakes Fires Tornados
  • Slide 71
  • Threats to Information Security Technical Failures Hardware disk crash Software bugs
  • Slide 72
  • Solution Backup Personal: www.carbonite.com Organization: hot or cold backup?
  • Slide 73
  • Threats to Information Security Deliberate Acts Espionage Sabotage/Vandalism Theft of Equipment Identity Theft
  • Slide 74
  • Protecting Information Physical Controls Walls Doors Locks Guards Alarm Systems
  • Slide 75
  • Encryption
  • Slide 76
  • How Public Key Encryption Works