Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

8 C It W Security Issues

You are on page 1of 30

Computing and IT in the Workplace

CT006-1

Security Issues
Learning Outcomes

At the end of this section, YOU should be able to:

• To explain and describe the security risks arises in the use


of IT at work
• To describe measures that can be taken to counteract the
threats

CT024 PDT Introduction 2


Topics we will cover

• Types of Computer Security Risks


• Computer viruses, Worms and Trojan Horses
• System Failure
• Backups
• Internet Security Risks

CT024 PDT Introduction 3


Computer Security Risks
• What is a computer security risk?
 Action that causes loss of or damage to
computer system

CT024 PDT Introduction 4


Computer Viruses, Worms and Trojan Horses

Trojan horse Payload


Virus is a hides within (destructive
Worm
potentially copies or looks like event) that is
itself legitimate delivered
damaging program when
repeatedly,
computer using up until you open file,
program resources triggered run infected
and program, or
Can spread possibly Does not boot computer
and damage shutting replicate
itself on
with infected
files down disk
computer other
or network computers in disk drive
CT024 PDT Introduction 5
Computer Viruses, Worms and Trojan Horses
How can a virus spread through an e-mail
message?
Step 2. They use the
Step 1. Unscrupulous Internet to send the e-
programmers create a
mail message to
virus program. They hide
the virus in a Word thousands of users
document and attach the around the world.
Word document to an e-
mail message.

Step 3b. Users who do


not recognize the name of
Step 3a. Some the sender of the e-mail
users open the message do not open the
attachment and e-mail message. Instead
their computers they delete the e-mail
become infected message. These users’
with the virus. computers are not
infected with the virus.

CT024 PDT Introduction 6


Computer Viruses, Worms and Trojan Horses
• How can you protect your system from a macro virus?
• Macro virus – malicious code written in word programs
 Set macro security level in applications that allow
you to write macros
 At medium security
level, warning displays
that document
contains macro
 Macros are
instructions saved in
an application, such
as word processing
or spreadsheet
program
CT024 PDT Introduction 7
Computer Viruses, Worms and Trojan Horses

• What is an antivirus program?

 Identifies and
removes computer
viruses
 Most also protect
against worms and
Trojan horses

CT024 PDT Introduction 8


Computer Viruses, Worms and Trojan Horses
• What is a virus signature?
 Specific pattern of virus code.
The binary pattern of the
machine code of a particular
virus
 Also called virus definition

 Antivirus programs
look for virus
signatures to
identify the presence
of a virus

CT024 PDT Introduction 9


Computer Viruses, Worms and Trojan Horses
How does an antivirus program inoculate a program
file?
Records
information
about program such
as file size and
Uses creation
information date Attempts
to detect if
to remove
virus tampers
any detected
with file Quarantines virus
infected
Keeps file files that it
in separate cannot
CT024 PDT
area of hard disk remove
Introduction 10
Computer Viruses, Worms and Trojan Horses
• What is a recovery disk?

Removable disk that contains uninfected


copy of key operating system commands
that enables computer to restart
 Also called RESCUE DISK

Once computer restarts, antivirus program


can attempt to repair damaged files

CT024 PDT Introduction 11


Computer Viruses, Worms and Trojan Horses
•What are some tips for preventing virus, worm, and Trojan
horse infections?
1. Never start a 1. Install an antivirus Never open
computer with a program on all of an e-mail
removable media. your computers attachment
2. Set the macro 2. Set the macro unless you are
security in programs security to enable or
so you can enable or
expecting it and
disable macros
disable macros it is from a
trusted source
If the antivirus Check all
program flags an downloaded 1.Install a
e-mail attachment programs for personal
as infected, delete viruses, worms, firewall program
the attachment or Trojan 2. Scan all
immediately horses removable media
CT024 PDT Introduction 12
System Failure
• What is a system failure?

Can cause loss of hardware,


Prolonged malfunction software, or data
of computer

Caused by aging hardware,


natural disasters, or electrical
power disturbances
Noise—unwanted Overvoltage or
electrical signal power surge—
Undervoltage—drop significant increase
in electrical supply in electrical power

CT024 PDT Introduction 13


System Failure
• What is a surge protector?
 Protects computer and
equipment from electrical power
disturbances
 Uninterruptible power supply
(UPS) is surge protector that
provides power during power
loss

CT024 PDT Introduction 14


Internet Security Risks
What is a Denial of Service attack (DoS)?

Also called DoS attack Hacker uses unsuspecting


An assault to disrupt computer computer, called zombie, to send
access to the Internet e.g. Web an influx of confusing data
or email messages to execute attack on
other systems
Distributed DoS (DDoS) attack
is more devastating, extensive in
which multiple computers Computer Emergency
attack multiple networks. Response Team Coordination
Websites that have been Center (CERT/CC) assists
affected: Yahoo! eBay, with DDoS attacks
Amazon.com, CNN.com
p. 587
CT024 PDT Introduction 15
Internet Security Risks

• How do Web browsers provide secure data


transmission?

Secure site
is Web site that uses
encryption to secure data
Many Web
browsers
use encryption Digital certificate is notice
that guarantees Web site is
legitimate
CT024 PDT Introduction 16
Internet Security Risks

Secure site
is Web site that uses
encryption to secure data

You have arrived here from a SysTrustSM/TM or WebTrustSM/TM certified site. The
applicable SysTrust or WebTrust Seal of assurance symbolizes that this site
has been examined by an independent accountant.
CT024 PDT Introduction 17
Internet Security Risks
• What is a Certificate Authority (CA)?
 Authorized person
or company that
issues and verifies
digital certificates
 Users apply for
digital certificate
from CA
 Has info such as
user’s name, the
issuing CA’s
name/signature,
serial no of the
certificate
 Digital certificate is
CT024 PDT
encrypted Introduction 18
Internet Security Risks
• What is Secure Sockets Layer (SSL)?
 Provides encryption of all data that passes between
client and Internet server
 Web addresses
beginning with “https”
indicate secure
connections
 TLS – Transport Layer
Security, a successor to
SSL
 Provides encryption and
requires the client to
have a digital cert.
Prevents illegal
CT024 PDT
tampering of data Introduction 19
Internet Security Risks

• What are methods for securing e-mail messages?

Pretty Good Digital signature


Privacy (PGP) is encrypted
is popular code attached to
e-mail encryption e-mail message
program to verify identity
of sender
Freeware for personal,
non-commercial use

CT024 PDT Introduction 20


Secure HTTP (S-HTTP)

• Allows users to choose an encryption scheme


for data transfer between client & Internet server
• Client & server must have digital certs
• S-HTTP is more difficult to use than TLS but
more secure. Typical use: Online Banking
• VPN – Mobile users can connect to their
company networks through VPN
• VPN provides a secure connection as if the user
has a private line
CT024 PDT Introduction 21
Backing Up – The Ultimate Safeguard
• What is a backup?

Duplicate of file, program, or disk


Three-generation backup
Selective preserves
Full backup backup three copies of important files
all files in The grandparent is the oldest
select which
copy, the parent is the second
computer files oldest and the child is the most
to back up recent copy

In case of system failure or corrupted files,


restore files by copying to original location
CT024 PDT Introduction 22
Backup Procedures and Security
• What are the four types of backups?

CT024 PDT Introduction 23


Backup Procedures and Security
• What is a backup procedure?
 Regular plan of copying and
storing data and program files
 Can use combination of
full backups and differential or
incremental backups
 Differential backups - backs up
only files that changed since the
last full back up
 Incremental - backs up the
changed data, but only backs
up the data that has changed
since the last backup
CT024 PDT Introduction 24
Backup Procedures and Security
• What is a disaster recovery plan?
 Written plan for restoring computer operations
in the event of
a disaster Backup plan
how backup files
Emergency plan and equipment would be
steps to be taken used to resume information
immediately processing
after disaster

Recovery plan Test plan


actions to be taken simulates various levels of
to restore full information disasters and records
processing operations ability to recover
CT024 PDT Introduction 25
Backup Procedures and Security

• What is a computer security plan?

 Summarizes in writing all safeguards in place to


protect company’s information
 International Computer Security Association
(ICSA) provides assistance with computer
security plans

CT024 PDT Introduction 26


Other Terms
• Botnet – group of compromised computers
attached to a network e.g. Internet, used to
attack other networks for nefarious reasons
• Bot – a program that performs repetitive tasks
on the network. Cybercriminals install malicious
bots on unprotected computers to create a
zombie army and use a botnet to send spam
via email, virus, malware, DoS
• Zombie - a compromised computer whose
owner is unaware the computer is remotely
controlled by another illegal user
• Back Door – bypass security control
CT024 PDT Introduction 27
Review Questions

 What would be the various mode to backup the


system?
 Explain the techniques to secure the internet
risks.

CT024 PDT Introduction 28


Question and Answer Session

Q&A

CT024 PDT Introduction 29


What we will cover next

Topic and Structure of next session

Enterprise Computing

CT024 PDT Introduction 30

You might also like