Security - Security Using Computers HAdm 174 Microcomputing...

Info iconThis preview shows pages 1–18. Sign up to view the full content.

View Full Document Right Arrow Icon
Security • Using Computers HAdm 174 - Microcomputing
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Lecture Roadmap Using Computers/Security Digital Representation of Information Database Hardware Software Networks Internet / Web
Background image of page 2
Kempelen’s Chess Machine Chess Automatons; www.angelfire.com/games/SBChess/automaton.html ; accessed 8/25/2005
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Terminology Misrepresentation Spoofing/Phishing Mal-ware Virus Worm Trojan Horse Spyware Protection Internet Downloads Macro security settings Firewall Antivirus Password Security
Background image of page 4
Phishing Simply “asking people” to give up their sensitive personal identifying information. This is usually done by misrepresenting the identity of the party doing the “asking.”
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Phishing Net
Background image of page 6
Phishing – Step 2
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Phishing – Who are these people anyway?
Background image of page 8
What is a virus? A computer virus is a small destructive computer program, characterized by its ability to propagate undetected across multiple computer systems.
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Digital vs. Biological
Background image of page 10
Phases/Components of Viruses Infection Phase Attack Phase Trigger Time, date, click on file, etc… Payload The damage done: delete or modify files, propagation routine, etc… The virus code is copied to file(s) on your machine
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Melissa Attack Infection Phase Attack Phase Trigger Open the attachment Payload Wow! Ready for this? Melissa arrives in an e-mail attachment (Word document)
Background image of page 12
Melissa’s Hefty Payload Lowers macro security settings, allowing all macros to run in the future without a security warning Modifies system registry Sends document containing Melissa as attachment to first 50 entries in Outlook address book Installs Melissa code into Normal.dot If minute of hour = day of the month inserts into current document “Twenty-two points, plus triple-word-score, plus fifty points for using all my letters. Game’s over. I’m outta here.”
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
The Melissa Attack Melissa arrives in an e-mail attachment (Word document) Infection Phase Attack Phase Trigger Open the attachment Payload Among other things, mails itself out to 50 people.
Background image of page 14
Melissa’s Propagation Generation Perfect Propagation 50% Propagation 0 1 1 1 50 25 2 2,500 625 3 125,000 15,625 4 6,250,000 390,625 5 312,500,000 9,765,625
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Background image of page 16
Technology + Psychology goes a long way … or, why ILOVEYOU succeeded even after Melissa exposed the security hole. Characteristics of ILOVEYOU:
Background image of page 17

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 18
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/04/2008 for the course H ADM 174 taught by Professor Clark during the Fall '05 term at Cornell.

Page1 / 67

Security - Security Using Computers HAdm 174 Microcomputing...

This preview shows document pages 1 - 18. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online