Elementary Computing CSC 100. M. Cheng, Computer Science
|
|
- Ferdinand Fisher
- 5 years ago
- Views:
Transcription
1 Elementary Computing CSC 100 1
2 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans Botnets & Distributed Denial Of Services Attack VPN, Cookies and 2- Factor Authentication 2
3 Outcomes Domain Name System is a world- wide phonebook for the Internet. Common Internet Services include HTTP, FTP, s, Remote login, etc. Peer- 2- Peer and Client/Server are two common models of communication. Phishing & malware are security risks affecting our privacy. 3
4 Study Guide What is TCP/IP? How does it send/receive messages? Why do we need IP Addresses? What is a hostname? What is Domain Name System? How does it work? What is a TLD? What is cctld? 4
5 Study Guide What are Internet Services and Port numbers? What is a Client/Server, Peer- 2- Peer application? What is Phishing? Why? What is malware? What are worms, viruses, trojans? How do they spread? What is a botnet, DDoS? What is a cookie, VPN, 2- Factor Authentication? 5
6 TCP/IP Protocol A protocol is a set of rules on how computers communicate with each other. The Internet is based on the TCP/IP (Transmission Control Protocol/Internet Protocol) protocols. It is based on the idea of postcards (known as packets). 6
7 A Postcard Model Sender s Address Message Receiver s Address 7
8 Properties of a Postcard It is small and has a fixed size. The message body is limited. (You can t write too many words.) Every postcard must include the addresses of the sender and the receiver. 8
9 Question: How to send a long letter? 9
10 Properties of TCP/IP Packets A packet is small and is fixed in size. Every packet must include the IP addresses of the sender and the receiver. Long messages are sent in many packets, each is labeled with a sequence number. 10
11 What are these IP addresses? 11
12 IP Addresses Each computer on the Internet has a globally unique IP address, like a phone number. For example, it is typically written as: Each part is an number, ranging from 0 to
13 The Internet uses IP addresses only. 13
14 You need the IP address of another computer in order to communicate with it. 14
15 Question: How do you keep track of millions of IP addresses of all the computers connected to the Internet? 15
16 Answer: We use hostnames and a BIG Internet phonebook! 16
17 Domain Name System IP addresses are like phone numbers for identifying computers on the Internet. A computer can register a hostname with its IP address in an Internet Phonebook. The Domain Name System (DNS) is our Phonebook, translating hostnames to IP addresses. 17
18 How does the Domain Name System work? 18
19 Top Level Domains The Internet Phonebook divides the Internet into many Top Level Domain s (or zones). Historically, there were only 20 TLDs initially. e.g., edu for education com for commercial business mil for U.S. military gov for U.S. government 19
20 Examples of Top Level Domains 20
21 When the Internet became popular, each country has its Country Code Top Level Domain. 21
22 Country Code TLDs 22
23 Question: How do you guarantee every domain name is unique? 23
24 First, every TLD is unique. Then, every sub- domain must be unique. 24
25 Every TLD or Domain is maintained by an authority. 25
26 The domain names and hostnames form a up- side down tree of names. 26
27 27
28 Examples of Domain Names.ca is Canada s top level domain.uk is UK s top level domain.edu is U.S. top level domain for universities uvic.ca is the domain name of University of Victoria in Canada web.uvic.ca is the hostname of UVic s web server, which belongs to the domain uvic.ca. 28
29 Hostnames and Domain Names A hostname on the Internet must belong to some domain, which is under a TLD. The cs.uvic.ca is a hostname for the CS Department under the uvic.ca domain. cs.uvic.ca Top Level Domain a Hostname a Domain name or a Hostname 29
30 PSTN Numbering and DNS Telephone Numbering System Country code (e.g., +86, +851, +1) City codes (e.g., , ) Phone numbers (e.g., ) Internet Domain Name System Top Level Domains (e.g.,.cn,.ca,.edu,.com) Domains (e.g., taobao.com, uvic.ca, ) Hostnames (e.g.,
31 Properties of Hostnames All Top Level Domains (TLDs) are unique. Each TLD is administered by an authority. All sub- domains under a TLD must be unique. All hostnames under a domain or sub- domain must also be unique. 31
32 Every hostname or domain name on the Internet is unique! 32
33 Purpose of DNS 1 What is the IP address of cs.uvic.ca? Your computer Domain Name System
34 Purpose of DNS 1 What is the IP address of cs.uvic.ca? Your computer Domain Name System
35 Purpose of DNS 1 What is the IP address of cs.uvic.ca? Your computer Domain Name System 3 send data to
36 Internet Explained 36
37 Internet = Network of Computers + TCP/IP + DNS 37
38 WWW = Internet + HTML + HTTP 38
39 Internet Services A computer on the Internet is a client if it uses some services, or server if it provides some services There are many servers on the Internet, e.g., yahoo, facebook, google, etc. Most of the computers (over 90%) are clients. 39
40 PC Server PC PC Clients PC 40
41 Clients & Servers Every client or server has a unique IP address. A server may provide many services, e.g., www, , chat, stream videos, Each service is identified by a port number (much like a telephone extension). 41
42 PC csc.uvic.ca server ( ) PC sftp://csc.uvic.ca/~mcheng Clients PC 42
43 WWW Service To use World- Wide- Web service of a particular server, we use port 80. For example, uses :80 IP address Port number 43
44 Service To use POP3 (Post Office Protocol) service, we use port 110. For example, csc.uvic.ca uses :110 IP address Port number 44
45 File Transfer Service To use SFTP (secure FTP) service, we use port 22. For example, unix.uvic.ca uses :22 IP address Port number 45
46 Port Numbers If an IP address is a telephone number, then a port number is similar to a local extension. There are over 1000 well- known port numbers for standard Internet services. Port 80 for HTTP, Port 110 for POP3 ( ), Port 22 for SFTP (file transfer), etc. 46
47 Internet Port Numbers are essentially similar to Telephone Extensions. 47
48 Peer- 2- Peer Services Some client communicates with other client directly, known as peer to peer. Both are equal partners! For example, a Skype/Facetime user communicates with other Skype/Facetime user directly. A Skype/Facetime server is still needed to establish the initial connection. 48
49 Peer- 2- Peer Applications PC Skype PC PC Skype PC Clients Clients 49
50 How do Skype users discover each other s IP addresses? 50
51 Skype server 1 my IP address is: John s PC Mary s PC 51
52 Skype server 1 my IP address is: Where is John? John s PC Mary s PC 52
53 Skype server 1 my IP address is: Where is John? 3 John s IP is: John s PC Mary s PC 53
54 Skype server 1 my IP address is: Where is John? 3 John s IP is: Hi, John! John s PC Mary s PC 54
55 Skype server 1 my IP address is: Where is John? 3 John s IP is: Hi, John! John s PC 5 Hi, Mary! Mary s PC 55
56 What is wrong with this? 56
57 57
58 58
59 !!! IMPORTANT!!! It is easy to create a fake website. 59
60 How could you tell real from fake websites? 60
61 Extended Validation (EV) Certificate
62 Extended Validation (EV) Certificate Click the padlock 62
63 Extended Validation (EV) Certificate Click the padlock 63
64 Check the actual hostname of a website that has been certified from a trusted source. 64
65 How about these? book.com of- cibc.com 65
66 Question: Why create fake websites? 66
67 SPAM! (Junk s) 67
68 Example SPAM 68
69 How about fake s! 69
70 70
71 Phishing is the act of attempting to steal personal information from unsuspecting victims. 71
72 Phishing in Plain English 72
73 Your address is worth money to the spammers. 73
74 Don t click or download anything if you think the or website is suspicious! 74
75 A malware is a program that is trying to damage your computer or steal personal information. 75
76 A mass virus steals your address book and SPAMs all your contacts. 76
77 A spyware is a hidden program that is trying to steal your secret personal information, e.g., passwords. 77
78 A keylogger is a spyware that records every keystroke on your computer and then sends them to a remote server. 78
79 Where do malware come from? from s or attachments from downloading software on the Internet from USB drives from zombie (infected) computers 79
80 A trojan is a malware hidden inside a popular program, an image, a video, or an . 80
81 A worm is a malware that can replicate itself across the Internet. 81
82 A computer virus is a malware that carries a mission, e.g., stealing personal information, or taking control of its host. 82
83 A virus may be controlled by a remote master. 83
84 A botnet is a massive network of infected computers; they can be controlled remotely to create real damages. 84
85 Botnet: A Network of zombies 85
86 Worms, Virus & Botnets 86
87 Distributed Denial Of Services A botnet can blackmail websites for money. If not paid, they send millions of zombie computers to attack! 87
88 A ransomware is a new kind of malware that encrypts your data and then asks for money to get your data back. 88
89 Keep your computer s security up- to- date. Windows: Security Essential OS X Sophos Anti- Virus Tool 89
90 Encrypt sensitive information if you must transmit it over the Internet. 90
91 Whenever possible, use https instead of http for secure Internet browsing. 91
92 What is VPN? VPN (Virtual Private Network) is an Internet technology that allows a remote computer connecting to a local private network. All remote communication behaves as if it is connected to a local network. The remote computer is also assigned a local private IP address. 92
93 Why uses VPN? Security and privacy: all communication over VPN is encrypted. Your remote computer will have a local private IP address (e.g., A US- based VPN will assign you a US- based IP address.) Not all VPNs are trust- worthy; they can spy on your data traffic. 93
94 What is a Cookie? Most web servers do not store user information (unless you have an account with them). How do they remember your shopping cart? Or bank account number? Or preference? A cookie is small piece of information that a web server stored inside your browser. 94
95 Cookie s Privacy Concern A browser cookie is very small; it cannot be used for spreading viruses. Cookies are personal preference information about a user. There are malware which try to track your cookies to learn about your browsing histories, thus use them for marketing. 95
96 Two- Factor Authentication 96
97 One- time Passcode Approach 97
98 How to Enable it? Two Factor Authentication for Apple ID Two Factor Authentication for Google Two Factor Authentication for Microsoft Two Factor Authentication for PayPal 98
99 How to clean up your computer if it has been infected! 99
100 How to Clean- Up Safari 100
101 How to Clean- Up Firefox 101
102 How to Clean- Up Chrome 102
103 When All Else Fail! How to reset Google Chrome browser How to reset Firefox browser How to reset Safari browser (just remove all browsing data) How to reset Internet Explorer 103
104 The End. 104
Unit 2 Assignment 2. Software Utilities?
1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationstickapp anti-virus password manager vpn client free Security & Productivity Apps for SafeStick stickapps.co.uk
Security & Productivity Apps for SafeStick StickApps are a collection of Security and Productivity apps - some free and some licenced - which have been selected, designed and tested to work on SafeStick
More informationSecurity and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1
Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationQuick recap on ing Security Recap on where to find things on Belvidere website & a look at the Belvidere Facebook page
Workshop #7 Email Security Previous workshops 1. Introduction 2. Smart phones & Tablets 3. All about WatsApp 4. More on WatsApp 5. Surfing the Internet 6. Emailing Quick recap on Emailing Email Security
More informationQuick Heal AntiVirus Pro Advanced. Protects your computer from viruses, malware, and Internet threats.
AntiVirus Pro Advanced Protects your computer from viruses, malware, and Internet threats. Features List Ransomware Protection anti-ransomware feature is more effective and advanced than other anti-ransomware
More informationIntroduction to Security. Computer Networks Term A15
Introduction to Security Computer Networks Term A15 Intro to Security Outline Network Security Malware Spyware, viruses, worms and trojan horses, botnets Denial of Service and Distributed DOS Attacks Packet
More informationProtocol Layers, Security Sec: Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017
CSC 401 Data and Computer Communications Networks Protocol Layers, Security Sec:1.5-1.6 Application Layer: Sec 2.1 Prof Lina Battestilli Fall 2017 Outline Computer Networks and the Internet (Ch 1) 1.1
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More information3.5 SECURITY. How can you reduce the risk of getting a virus?
3.5 SECURITY 3.5.4 MALWARE WHAT IS MALWARE? Malware, short for malicious software, is any software used to disrupt the computer s operation, gather sensitive information without your knowledge, or gain
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationChapter 3. The Basics of Networking
Chapter 3 The Basics of Networking Learning Objectives Tell whether a communication technology (Internet, radio, LAN, etc.) is synchronous or asynchronous; broadcast or point-to-point Explain the roles
More informationSecurity & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of
Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification
More informationQuick Heal Total Security
For secure online banking, smooth Internet surfing, and robust protection for your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware
More informationThe Tension. Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes
s10 Security 1 The Tension Security vs. ease of use: the more security measures added, the more difficult a site is to use, and the slower it becomes Security vs. desire of individuals to act anonymously
More informationLecture 12. Application Layer. Application Layer 1
Lecture 12 Application Layer Application Layer 1 Agenda The Application Layer (continue) Web and HTTP HTTP Cookies Web Caches Simple Introduction to Network Security Various actions by network attackers
More informationStaying Safe on the Internet. Mark Schulman
Staying Safe on the Internet Mark Schulman 1 Your Presenter Mark Schulman IT professional for almost 40 years No affiliation with any product 2 What We ll Talk About Passwords Email Safety Staying Safe
More informationA Review Paper on Network Security Attacks and Defences
EUROPEAN ACADEMIC RESEARCH Vol. IV, Issue 12/ March 2017 ISSN 2286-4822 www.euacademic.org Impact Factor: 3.4546 (UIF) DRJI Value: 5.9 (B+) A Review Paper on Network Security Attacks and ALLYSA ASHLEY
More informationIT JARGON BUSTERS NETWORKING TERMS
IT JARGON BUSTERS NETWORKING TERMS WAN Wide Area The WAN is associated with connections over a large area. In most circumstances this is referred to as the Internet connection you will have at home or
More informationProtection Against Malware. Alan German Ottawa PC Users Group
Protection Against Malware Alan German Ottawa PC Users Group Minimum Requirements (1) Up-to-date anti-virus and anti-spyware software (2) Software firewall (3) Fully-patched operating system (Windows Update)
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationIntroduction to the Internet. Part 1. What is the Internet?
Introduction to the Internet Part 1 What is the Internet? A means of connecting a computer to any other computer anywhere in the world via dedicated routers and servers. When two computers are connected
More informationCS Paul Krzyzanowski
Computer Security 17. Tor & Anonymous Connectivity Anonymous Connectivity Paul Krzyzanowski Rutgers University Spring 2018 1 2 Anonymity on the Internet Often considered bad Only criminals need to hide
More informationSeqrite Antivirus for Server
Best server security with optimum performance. Product Highlights Easy installation, optimized antivirus scanning, and minimum resource utilization. Robust and interoperable technology makes it one of
More informationINTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com
INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what
More informationInternet and Mini.K.G Senior Scientist, FRAD, CMFRI
Internet and E-Mail Mini.K.G Senior Scientist, FRAD, CMFRI Email: mini.anish02@gmail.com 28 Introduction to Internet Internet is a worldwide system of interconnected computer networks. It connects several
More informationQuick Heal Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac.
Total Security Multi-Device (Mac) Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to
More informationProtecting your Security and Privacy on the Web. Tony Brett Head of IT Support Staff Services IT Services. 11 March 2013
Protecting your Security and Privacy on the Web Tony Brett Head of IT Support Staff Services IT Services 11 March 2013 Agenda Why bother? Common data leaks Email security Viruses & Trojans Phishing Why
More informationPROTECTING YOUR BUSINESS ASSETS
PROTECTING YOUR BUSINESS ASSETS How to Spot Danger Before Your Computer Gets Infected, Your Site Hosts Malware, and Your Credit Card Number Gets Stolen A MyNAMS Presentation by Regina Smola @2012 Regina
More informationData Communication. Chapter # 5: Networking Threats. By: William Stalling
Data Communication Chapter # 5: By: Networking Threats William Stalling Risk of Network Intrusion Whether wired or wireless, computer networks are quickly becoming essential to everyday activities. Individuals
More information>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE?
>MESSAGELABS END USER IT SECURITY GUIDE >WHAT STEPS CAN YOU TAKE TO KEEP YOURSELF, YOUR COLLEAGUES AND YOUR COMPANY SAFE ONLINE? >CONTENTS >WHAT IS MESSAGING AND WEB SECURITY? >P1 >EMAIL THREATS >P1 >VIRUSES
More informationQuick Heal AntiVirus Pro. Tough on malware, light on your PC.
Tough on malware, light on your PC. Features List Ransomware Protection Quick Heal anti-ransomware feature is more effective and advanced than other anti-ransomware tools. Signature based detection Detects
More informationCourse Outline (version 2)
Course Outline (version 2) Page. 1 CERTIFIED SECURE COMPUTER USER This course is aimed at end users in order to educate them about the main threats to their data s security. It also equips the students
More informationReview Kaspersky Internet Security - multi-device 2015 online software downloader ]
Review Kaspersky Internet Security - multi-device 2015 online software downloader ] Description: Benefits Protecting all your connected devices the one-licence, easy-touse solution Kaspersky Internet Security
More informationQuick Heal AntiVirus for Server. Optimized Antivirus Scanning. Low on Resources. Strong on Technology.
Optimized Antivirus Scanning. Low on Resources. Strong on Technology. Product Highlights Quick Heal» Easy installation, optimized antivirus scanning, and minimum resource utilization.» Robust and interoperable
More informationINFORMATION TECHNOLOGY 402
NAME : CLASS/ SEC : ROLL: SESSION : QUOTE : PART 1: Working With Accessibility Options 1. Accessibility options: These are the options in Windows Operating System which makes handling of computer easy
More information2 ZyWALL UTM Application Note
2 Application Note Threat Management Using ZyWALL 35 UTM Forward This support note describes how an SMB can minimize the impact of Internet threats using the ZyWALL 35 UTM as an example. The following
More information3 The Internet and the electronic mail
3 The Internet and the electronic mail The chapter concerns the following; ² Internet operation ² Internet services ² Searching information ² Uniform Resource Locator-URL ² IP addresses ² Domain name ²
More informationIT1403: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth email
More informationFAQ: Privacy, Security, and Data Protection at Libraries
FAQ: Privacy, Security, and Data Protection at Libraries This FAQ was developed out of workshops and meetings connected to the Digital Privacy and Data Literacy Project (DPDL) and Brooklyn Public Library
More informationOnline Security and Safety Protect Your Computer - and Yourself!
Online Security and Safety Protect Your Computer - and Yourself! www.scscu.com Fraud comes in many shapes and sizes, but the outcome is simple: the loss of both money and time. That s why protecting your
More informationSecurity and Privacy
E-mail Security and Privacy Department of Computer Science Montclair State University Course : CMPT 320 Internet/Intranet Security Semester : Fall 2008 Student Instructor : Alex Chen : Dr. Stefan Robila
More informationDO NOT OPEN UNTIL INSTRUCTED
CS 378 - Network Security and Privacy Spring 2017 FINAL May 3, 2017 DO NOT OPEN UNTIL INSTRUCTED YOUR NAME: Collaboration policy No collaboration is permitted on this exam. Any cheating (e.g., submitting
More informationChapter 6 Network and Internet Security and Privacy
Chapter 6 Network and Internet Security and Privacy Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify online threats LO6.3: Describe cyberstalking and other personal
More informationHardening the Education. with NGFW. Narongveth Yutithammanurak Business Development Manager 23 Feb 2012
Hardening the Education IT Environment with NGFW Narongveth Yutithammanurak Business Development Manager 23 Feb 2012 Technology Trends Security Performance Bandwidth Efficiency Manageability Page 2 What
More informationQuick Heal Total Security for Android. Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping.
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Safe Online Banking & Shopping. Product Highlights Complete protection for your Android device that
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationCERTIFIED SECURE COMPUTER USER COURSE OUTLINE
CERTIFIED SECURE COMPUTER USER COURSE OUTLINE Page 1 TABLE OF CONTENT 1 COURSE DESCRIPTION... 3 2 MODULE-1: INTRODUCTION TO DATA SECURITY... 4 3 MODULE-2: SECURING OPERATING SYSTEMS... 6 4 MODULE-3: MALWARE
More informationAnalytics, Insights, Cookies, and the Disappearing Privacy
Analytics, Insights, Cookies, and the Disappearing Privacy What Are We Talking About Today? 1. Logfiles 2. Analytics 3. Google Analytics 4. Insights 5. Cookies 6. Privacy 7. Security slide 2 Logfiles Every
More informationWHAT IS CORPORATE ACCOUNT TAKEOVER? HOW DOES IT HAPPEN?
WHAT IS CORPORATE ACCOUNT TAKEOVER? Corporate Account Takeover (also referred to as CATO) is a type of fraud where criminals gain access to a business financial accounts to make unauthorized transactions.
More informationAirtel PC Secure Trouble Shooting Guide
Airtel PC Secure Trouble Shooting Guide Table of Contents Questions before installing the software Q: What is required from my PC to be able to use the Airtel PC Secure? Q: Which operating systems does
More informationQuick Heal Total Security for Mac. Simple, fast and seamless protection for Mac.
Simple, fast and seamless protection for Mac. Product Highlights Quick Heal Fast and highly responsive Virus Protection. Browsing Protection and Phishing Protection to keep malicious websites at bay. Smooth
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationNetwork Security Fundamentals
Network Security Fundamentals Security Training Course Dr. Charles J. Antonelli The University of Michigan 2013 Network Security Fundamentals Module 5 Viruses & Worms, Botnets, Today s Threats Viruses
More informationAccounting Information Systems
Accounting Information Systems Fourteenth Edition Chapter 6 Computer Fraud and Abuse Techniques ALW AYS LEARNING Learning Objectives Compare and contrast computer attack and abuse tactics. Explain how
More informationCERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES
CERT-In Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES Department of Information Technology Ministry of Communications and Information Technology Government of India Anti Virus
More informationReview for Internet Introduction
Review for Internet Introduction What s the Internet: Two Views View 1: Nuts and Bolts View billions of connected hosts routers and switches protocols control sending, receiving of messages network of
More informationSeqrite Endpoint Security
Enterprise Security Solutions by Quick Heal Integrated enterprise security and unified endpoint management console Enterprise Suite Edition Product Highlights Innovative endpoint security that prevents
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationPhishing Read Behind The Lines
Phishing Read Behind The Lines Veljko Pejović veljko@cs.ucsb.edu What is Phishing? "Phishing attacks use both social engineering and technical subterfuge to steal consumers' personal identity data and
More informationEthical Hacking. Content Outline: Session 1
Ethical Hacking Content Outline: Session 1 Ethics & Hacking Hacking history : How it all begin - Why is security needed? - What is ethical hacking? - Ethical Hacker Vs Malicious hacker - Types of Hackers
More informationSecurity Awareness. Presented by OSU Institute of Technology
Security Awareness Presented by OSU Institute of Technology Information Technologies Division Security Awareness Topics Social Engineering Phishing Social Networks Displaying Sensitive Information Wireless
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationThe security of Mozilla Firefox s Extensions. Kristjan Krips
The security of Mozilla Firefox s Extensions Kristjan Krips Topics Introduction The extension model How could extensions be used for attacks - website defacement - phishing attacks - cross site scripting
More informationWhat is the Internet? CIT 100 Norm Downey. Interoperability. The Internet & The World Wide Web. Internet and the Client/Server Model
The Internet & The World Wide Web CIT 100 Norm Downey What is the Internet? A global computer network made up of thousands of privately and public owned computers and computer networks. More than one billion
More informationThe Basics of Networking
c h a p t e r 3 The Basics of Networking Making the Connection lawrence snyder Times are Changing Nowhere Is Remote People are more interconnected Social interactions are changing Freedom of Seach and
More information(Botnets and Malware) The Zbot attack. Group 7: Andrew Mishoe David Colvin Hubert Liu George Chen John Marshall Buck Scharfnorth
(Botnets and Malware) The Zbot attack Group 7: Andrew Mishoe David Colvin Hubert Liu George Chen John Marshall Buck Scharfnorth What Happened? Type of Attack Botnet - refers to group of compromised computers
More informationWhat is Zemana AntiLogger?
Zemana AntiLogger You need smarter protection against the bad guys who are trying to steal your financial credentials, gain access to your private online accounts and even your identity. What is Zemana
More informationMTAT Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions
MTAT.07.019 Research Seminar in Cryptography The Security of Mozilla Firefox s Extensions Kristjan Krips 1 Introduction Mozilla Firefox has 24.05% of the recorded usage share of web browsers as of October
More informationYour security on click Jobs
Your security on click Jobs At Click Jobs is a trading name of Raspberry Recruitment Limited, we're committed to helping you find the right job in a safe and secure environment. On these pages, you can
More informationUser s Guide. SingNet Desktop Security Copyright 2010 F-Secure Corporation. All rights reserved.
User s Guide SingNet Desktop Security 2011 Copyright 2010 F-Secure Corporation. All rights reserved. Table of Contents 1. Getting Started... 1 1.1. Installing SingNet Desktop Security... 1 1.1.1. System
More informationACS / Computer Security And Privacy. Fall 2018 Mid-Term Review
ACS-3921-001/4921-001 Computer Security And Privacy Fall 2018 Mid-Term Review ACS-3921/4921-001 Slides Used In The Course A note on the use of these slides: These slides has been adopted and/or modified
More information2 User Guide. Contents
E-mail User Guide 2 E-mail User Guide Contents Logging in to your web mail... 3 Changing your password... 5 Editing your signature... 6 Adding an e-mail account to Outlook 2010/2013/2016... 7 Adding an
More informationMU2a Authentication, Authorization & Accounting Questions and Answers with Explainations
98-367 MU2a Authentication, Authorization & Accounting Questions and Answers with Explainations Which are common symptoms of a virus infection? (Lesson 5 p 135-136) Poor system performance. Unusually low
More informationAges Donʼt Fall for Fake: Activity 1 Don t bite that phishing hook! Goals for children. Letʼs talk
Ages 11-14 Donʼt Fall for : Activity 1 Don t bite that phishing hook! Children play a game where they study various emails and texts and try to decide which messages are legit and which are phishing scams.
More informationHow does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics
How does the Internet Work? When you type a URL (Uniform Resource Locator) into a Web Browser and press Return, what do you think happens? That is, what steps do you think are required to obtain a web
More informationThe Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)
The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to
More informationVendor: Microsoft. Exam Code: Exam Name: MTA Security Fundamentals Practice Test. Version: Demo
Vendor: Microsoft Exam Code: 98-367 Exam Name: MTA Security Fundamentals Practice Test Version: Demo DEMO QUESTION 1 To prevent users from copying data to removable media, you should: A. Lock the computer
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationA global network of computers that share pages of information called webpages or websites. Internet Service Provider
INTERNET: A global network of computers that share pages of information called webpages or websites Computer Basics 3 Internet CONNECTING TO THE INTERNET Internet Service Provider INTERNET SERVICE PROVIDER
More informationTechnology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright 2015 Pearson Education,
More informationOnline Scams. Ready to get started? Click on the green button to continue.
Online Scams Hi, I m Kate. We re here to learn how to protect ourselves from online scams. We ll follow along with Kevin to learn what types of scams are out there, how to recognize the warning signs,
More informationTraining UNIFIED SECURITY. Signature based packet analysis
Training UNIFIED SECURITY Signature based packet analysis At the core of its scanning technology, Kerio Control integrates a packet analyzer based on Snort. Snort is an open source IDS/IPS system that
More informationAttacks Against Websites. Tom Chothia Computer Security, Lecture 11
Attacks Against Websites Tom Chothia Computer Security, Lecture 11 A typical web set up TLS Server HTTP GET cookie Client HTML HTTP file HTML PHP process Display PHP SQL Typical Web Setup HTTP website:
More informationIntroduction. Logging in. WebQuarantine User Guide
Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine
More informationCyber Security Practice Questions. Varying Difficulty
Cyber Security Practice Questions Varying Difficulty 1 : This is a class of programs that searches your hard drive and floppy disks for any known or potential viruses. A. intrusion detection B. security
More informationSecurity Trend of New Computing Era
Security Trend of New Computing Era Presented by Roland Cheung HKCERT Agenda Security Threat Overview Introduction of Botnet Impact of Botnet Fight Back Botnet Security Protection Scheme Security Threat
More informationINF3700 Informasjonsteknologi og samfunn. Application Security. Audun Jøsang University of Oslo Spring 2015
INF3700 Informasjonsteknologi og samfunn Application Security Audun Jøsang University of Oslo Spring 2015 Outline Application Security Malicious Software Attacks on applications 2 Malicious Software 3
More informationCompTIA E2C Security+ (2008 Edition) Exam Exam.
CompTIA JK0-015 CompTIA E2C Security+ (2008 Edition) Exam Exam TYPE: DEMO http://www.examskey.com/jk0-015.html Examskey CompTIA JK0-015 exam demo product is here for you to test the quality of the product.
More informationSecure your Snow Leopard
Secure your Snow Leopard Benjamin Stanley apple Certified Trainer Structure of OS Safer Browsing System Prefs that help with security Managed prefs from server Keychain Hardware security AV and a little
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationSafety and Security. April 2015
Safety and Security April 2015 Protecting your smartphone and your data 2 Set a passcode on your smartphone For some smartphone models: 1. Go to Settings. 2. Tap ID & Passcode. 3. Set a 4-digit passcode.
More informationUTM 5000 WannaCry Technote
UTM 5000 WannaCry Technote The news is full of reports of the massive ransomware infection caused by WannaCry. Although these security threats are pervasive, and ransomware has been around for a decade,
More informationDownload firefox with virus protection
P ford residence southampton, ny Download firefox with virus protection 3-11-2015 Protect your devices with the best free antivirus on the market. Download Avast antivirus and anti-spyware protection for
More informationTechnology in Action
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses 1 Peer-to-Peer Networks Nodes communicate with each other Peers Share peripheral
More information