Personal Computer Security

14
PERSONAL COMPUTER SECURITY Sydney Baize Mrs. Shirley Miller BPC110

description

Sydney Baize Mrs. Shirley Miller BPC110. Personal Computer Security. “To connect your computer to the Internet is to be in danger” - Gralla. PC Revolution. Hackers. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious means.” –Hess. - PowerPoint PPT Presentation

Transcript of Personal Computer Security

Page 1: Personal Computer  Security

PERSONAL COMPUTER SECURITY

Sydney BaizeMrs. Shirley MillerBPC110

Page 2: Personal Computer  Security

“To connect your computer to the Internet

is to be in danger” -Gralla

Page 3: Personal Computer  Security

PC Revolution

1998 2003 20100.00%

10.00%20.00%30.00%40.00%50.00%60.00%70.00%80.00%

US Households with PCs

Page 4: Personal Computer  Security

Hackers“In the most familiar sense, a hacker is anyone who attempts to break into computer systems

by surreptitious means.” –Hess

Send probes• See which computers

have Back Orifice

Controls• Uses BO to enter

computer and gather whatever information they want

Back Orifice:

A computer program

that enables a user to

control a computer with

Microsoft Windows OS

from a remote location.

VuzeLimeWire

Page 5: Personal Computer  Security

Dangers

Hackers can do infinite amounts of damage to a computer once they have control. Gather info

History Files Passwords

Hack other computers

Page 6: Personal Computer  Security

ProtectionFirewall: Software that blocks unwanted inbound traffic so probes can’t make it through, and simultaneously blocks unwanted outbound traffic.

Examine• Check data

packets the computer is receiving

Search• Look to see

if packets are being sent to certain ports

Block and/or Alert

Page 7: Personal Computer  Security

FirewallsBlock

selectively or all packets

sent to common

hacker used ports

Alert user when

programs attempt to connect to Internet

Block specific IP addresses

Keep log of every

attempted probe/attack

made

Page 8: Personal Computer  Security

Spyware

Many types of Spyware 2 things in common

1. Spy ▪ Track searches▪ Record keystrokes▪ Watch pages visited▪ Open backdoor

2. Install without knowledge▪ Piggyback other software▪ Be misleading

Page 9: Personal Computer  Security

Dangers

Spyware can do critical damage by flooding PCs with a whirlwind of pop-ups, to the point where all of the systems resources can be taken away and the PC becomes ultimately unusable.

Spyware is tricky When software it piggybacked from is

deleted, the Spyware is not Can be Polymorphic- spawns new copies in

other locations when detected

Page 10: Personal Computer  Security

Protection

Spyware is most commonly used to make

money. • Anti-spyware is a necessity• Special spyware deleting software is sometimes needed as well

Page 11: Personal Computer  Security

Anti-Spyware

Scans• Searches system for

bits called signatures: signs of obvious infection

Compares• Compares found

signature to ones in its database.

• If a match is found- there is an infection.

Deletes• Deletes the spyware

once it’s found, may require special program since spyware can often leave traces in more than one place

Page 12: Personal Computer  Security

Anti-Spyware

Looks for suspicious behavior

Constantly updates to keep track of latest infections

Works in real time: watches for signs of spyware being installed or pages

being hijacked

Page 13: Personal Computer  Security

Tips

• Know the dangers of the Web

• Share as little personal info as possible

• Don’t look past suspicious behavior

• Install reputable protection software

Page 14: Personal Computer  Security

Works CitedGralla, Preston. How Personal & Internet Security Work. Indianapolis: Que Publishing, 2006.Microsoft. Microsoft Security Intelligence Report Special Edition: 10- Year eview. 2014. 17 04 2014 <http://www.microsoft.com/en-us/download/details.aspx?id=29046&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+MicrosoftDownloadCenter+%28Microsoft+Download+Center%29#tm>.Microsoft Support. List of Antivirus Software Vendors. 20 July 2011. 15 04 2014 <http://support.microsoft.com/kb/49500>.U.S. Department of Commerce. Falling Through the Net: Defining the Digital Divide. National Telecommunications and Information, 1999.US Census Buraeu. "Population Characteristics Computer and Internet Use." US Government, 2013.