Title: Workstation Security Privacy and Protection from Hackers
1Workstation Security Privacy and Protection
from Hackers
- ISECON2002
- Nov 2, 2002
- Bruce P. Tis, Ph.D.
- Simmons College
- Boston, MA
2Outline
- Goals
- Introduction
- Attacks/Threats
- Malware viruses, worms, Trojan horses and
others - Privacy - Cookies/Spyware
- Firewalls
- Steps for protecting yourself
- Interesting Web Sites
- What Havent We Covered
3Goals
- Raise your consciousness regarding the need for
information security at the workstation level - Review basic terminology and concepts
- Discuss threats and how to resist them
- Verifying workstations ability to resist an
attack
4Introduction
5What is security?
- Computer Security deals with
- the prevention and
- detection of,
- and the reaction to,
- unauthorized actions by users of a computer
system or network.
6Topics Include
- Cryptology
- Forensics
- Standards
- Management of security/policies
- Authentication
- Intrusion Detection
- Hacking
- Privacy
- Legal and Ethical issues
- IP Security
- WEB Security
- Network Management
- Malware
- Firewalls
7Why do we need to be concerned about security
- Economic loss
- Intellectual Property loss
- Privacy and Identity Theft
- National Security
8Economic Loss
- Kevin Mitnicks hacking spree allegedly cost
companies 291 million - Economic impact of recent malware
- LoveLetter and CodeRed 2.6 billion each
- Sircam 1.3 billion
- Computer Economics estimates that companies spent
10.7 billion to recover from virus attacks in
2001
9Radicati Group Inc study of economic impact of
malware
10CERT
- Computer Emergency Response Team Coordination
Center (CERT) reports security incidents - An incident may involve one site or hundreds (or
even thousands) of sites. Also, some incidents
may involve ongoing activity for long periods of
time.
11(No Transcript)
12Intellectual Property
-
- Music piracy
- Software piracy
- Research data piracy
- Industrial espionage
13Privacy and Identity Theft
- 300,00 credit cards stolen at CD Universe
- Identity theft has reached epidemic proportions
and is the top consumer fraud complaint in
America - Losses to consumers and institutions due to
identity theft totaled 745 million in 1997,
according to the U.S. Secret Service. - An estimated 700,000 consumers became victims of
identity theft during 2001 at a cost of 3
billion. - Estimate of 900,000 for 2002.
14National Security
- Los Alamos loses top-secret hard drive
- January 1990 ATT long-distance telephone
switching system was crashed for nine hours and
approx 70 million calls went uncompleted - Distributed attack on the 13 root DNS servers two
weeks ago - September 11 !!!!!!!!!!!!!!!!!!!!!!!
15- The National Strategy to Secure Cyberspace draft
issued in September 2002 clearly puts
responsibility on the end user to protect his/her
personal computer from hackers - Consumer education Web site
- http//www.ftc.gov/bcp/conline/edcams/infosecu
rity/ - National Cyber Security Alliance
- http//www.staysafeonline.info
16Attacks and Threats
17Attacks/Threats
- Physical
- Access
- Modification
- Denial of Service
- Repudiation
- Invasions of Privacy
18Physical Attacks
- Hardware theft
- File/Information Theft
- Information modification
- Software installation
19Access Attacks
- Attempt to gain information that the attacker is
unauthorized to see - Password pilfering
- An attack against confidentiality
- Snooping
- Eavesdropping
- Interception
20Modification Attacks
- An attempt to modify information an attacker is
not authorized to modify - An attack against information integrity
- Changes
- Insertion
- Deletion
21Denial-Of-Service Attacks
- Deny the use of resources to legitimate users of
a system - Denial of access to information
- Denial of access to applications
- Denial of access to systems
- Denial of access to communications
22Repudiation Attacks
- Attack against the accountability of information
i.e. and attempt to give false information or to
deny that a real event or transaction has
occurred - Masquerading
- Denying an event
23Privacy Attacks
- Collection of information about
- you
- your computer configuration
- your computer use
- your surfing habits
24Security Services
- Security services are used to combat attacks
- Confidentiality (access)
- Integrity (modification, repudiation)
- Availability (denial of service)
- Accountability ( access, modification,
repudiation) - Security mechanisms implement services i.e.
cryptography
25Malware
- Trap Door
- Logic Bombs
- Trojan Horses
- Worms
- Bacteria
- Viruses
- Mobile Code
26- Malware collection of techniques/programs that
produce undesirable effects on a computer system
or network - Differentiate based on
- Needs host program
- Independent
- Replicate
- Dont replicate
27Malware
Needs Host Program
Independent
Worms
Bacteria
Trapdoor
Virus
Logic Bomb
Trojan Horse
28Trap Doors
- Secret entry point to a program that bypasses
normal security access procedures - Legitimate for testing/debugging
- Recognizes some special input, user ID or
unlikely sequence of events - Difficult to detect at use
- Must detect during software development and
software update
29Logic Bombs
- Code embedded in legitimate program that is set
to explode when certain conditions met - Presence/absence certain files
- Date
- Particular user
- Bomb may
- Alter/delete files
- Halt machine
- Other damage
30Trojan Horses
- Apparently useful program or command procedure
containing hidden code which performs harmful
function - Trick users into running by disguise as useful
program - Doesnt replicate itself
- Used to accomplish functions indirectly that an
unauthorized user not permitted - Used for destructive purposes
31Backdoor Trojans
- Opens backdoor on your computer that enables
attackers to remotely access and control your
machine - Also called remote access Trojans
- Attackers find your machine by scanning ports
used by Trojan - Common backdoor Trojans
- Back Orifice
- NetBus
32- Most anti-virus tools detect Trojans
- Can also check open TCP ports against list of
known Trojan ports - Type netstat an command
- Look at listening ports
- Lists of known Trojan port numbers available via
Google search
33(No Transcript)
34Worms
- Programs that use network connections to spread
from system to system - Once active on a system can behave as another
form of malware - Propagates
- Search for other systems to infect
- Establish connection with remote system
- Copy itself to remote system and executes
35The Great Worm
- Robert Morris released the most famous worm in
1988 - Crashed 6000 machines on the Internet (10)
- Exploited bug in fingerd program
- Bug in worm crashed machines which prevented the
worm from spreading - Estimated damage 100 million
- Three years probation, 400 hrs community service
, 10,500 fine
36Worm Code Red
- Scans Internet for Windows NT or 2000 servers
running IIS minus patch - Copies itself to server
- Replicate itself for the first 20 days of each
month - Replace WEB pages on infected servers with a page
that declares Hacked by Chinese - Launch concerted attack on White House Web server
to overwhelm it
37Bacteria
- Programs that do not explicitly damage files
- Sole purpose is to replicate themselves within a
system - Reproduce exponentially taking up
- Processor capacity
- Memory
- Disk space
38Viruses
- Infect other programs by modifying them
- First one written in 1983 by USC student Fred
Cohen to demonstrate the concept - Approximately 53,000 exist
- Modification includes copy of virus
39Virus Structure
- Usually pre-pended or postpended to executable
program - When program invoked virus executes first, then
original program - First seeks out uninfected executable files and
infects them - Then performs some action
40How Virus are spread
- Peer to peer networks
- Via email attachments
- Via media
- FTP sites
- Chat and instant messaging
- Commercial software
- Web surfing
- Illegal software
41Types of Viruses
- Parasitic
- Traditional virus and most common
- Attaches itself to executable files and
replicates - Memory resident
- Lodges in memory are part of OS
- Infects every program that executes
42- Boot sector
- Infects mast boot record or boot record
- Spreads when system boots
- Seldom seen anymore
- Stealth
- Designed to hide itself from detection by
antivirus software
43- Polymorphic
- Mutates with every infection
- Functionally equivalent but distinctly different
bit patterns - Inserts superfluous instructions or interchange
order of independent instructions - Makes detection of signature of virus difficult
- Mutation engine creates random key and encrypts
virus - Upon execution the encrypted virus is decrypted
and then run
44- Metamorphic
- Structure of virus body changed
- Decryption engine changed
- Suspect file run in emulator and behavior analyzed
45Mobile Code
- Programming that specifies how applications
exchange information on the WEB - Browsers automatically download and execute
applications - Applications may be viruses
46- Common forms
- Java Applets Java code embedded in WEB pages
that run automatically when page downloaded - ActiveX Controls similar to Java applets but
based on Microsoft technology, have total access
to Windows OS
47- New threat (potential) of including mobile code
in MP3 files - Macros languages embedded in files that can
automatically execute commands without users
knowledge - JavaScript
- VBScript
- Word/Excel
48Macro Viruses
- Make up two thirds of all viruses
- Platform independent
- Word documents are the common vehicle rather than
executable code - Concept 1995 first Word macro virus
- Easily spread
49Technique for spreading macro virus
- Automacro / command macro is attached to Word
document - Introduced into system by email or disk transfer
- Document opened and macro executes
- Macro copies itself to global macro file
- When Word started next global macro active
50Melissa Virus March 1999
- Spread in Word documents via email
- Once opened virus would send itself to the first
50 people in Outlook address book - Infected normal.dot so any file opened latter
would be infected - Used Visual Basic for applications
- Fastest spreading virus ever seen
51ILOVEYOU Virus May 2000
- Contained code as an attachment
- Sent copies to everyone in address book
- Corrupted files on victims machine deleted
mp3, jpg and other files - Searched for active passwords in memory and
emailed them to Web site in the Philippines - Infected approximately 10 million computers and
cost between 3 and 10 billion in lost
productivity
52Preventative measures
- MS offers optional macro virus protection tools
that detects suspicious Word files - Office 2000 Word macro options
- Signed macros from trusted sources
- Users prompted prior to running macro
- All macros run
- Antivirus product vendors have developed tools to
detect and correct macro viruses
53Antivirus First Generation
- Simple scanner
- Scans for virus signature (bit pattern)
- Scans for length in program size
- Limited to detection of known viruses
54Antivirus Second Generation
- Does not rely on specific signature
- Uses heuristic rules to search for probable virus
infection - Looks for fragments of code often associated with
viruses - Integrity checking via checksum appended to each
program - Checksum is a encrypted hash
55Antivirus Third Generation
- Memory resident
- ID virus by its actions rather than structure of
infected program - Not driven by signature or heuristic
- Small set of actions
- Intervenes
56Antivirus Fourth Generation
- Variety of antivirus techniques
- Scanning and activity trap components
- Access control capability
- Limits ability of virus to update files
57A Modern Virus - Bugbear
- The virus of the year
- Blended threat worm by leveraging multiple
infection paths - Comes as an attachment with random subject,
message body and attachment file name
58- Executable file may have single or double
extensions - Spoofs from header
- Forwards itself to addresses in old emails on
your system - Truly distinguishing feature is the size of the
attachment 50,688 bytes
59Bugbear What it does
- Copies itself to a randomly named exe file
- Makes registry changes
- Adds itself to the startup folder
- Mails itself to any address found on your
computer - Copies itself to open Windows network shares
- Attempts to disable AV and firewalls
- Installs Trojan code and keystroke logger
- Listens on port 36794
60Virus Detection and Prevention Tips
- Do not open an email from an unknown,
suspicious or untrustworthy source - Do not open any files attached to an email
- Turn off preview pane in email client
- Enable macro virus protection in all your
applications - Beware of pirated software
- Dont accept files while chatting or messaging
61- Do not download any files from strangers.
- Exercise caution when downloading files from the
Internet. - Turn on view file extensions so you can see what
type of file you are downloading - Save files to disk on download rather than launch
application - Update your anti-virus software regularly.
- Back up your files on a regular basis.
62Antivirus Features
- Signature scanning
- Heuristic Scanning
- Manual Scanning
- Real Time scanning
- E-mail scanning
- Download scanning
- Script scanning
- Macro scanning
- Price
- Update subscription cost
63Privacy
64Cookies
- A cookie is a piece of text-based information
transmitted between a Web site (server) and your
browser - Saved on your hard drive
- Netscape cookies.txt
- IE separate files in cookies folder
65Sample cookies.txt entries
- Netscape HTTP Cookie File
- http//www.netscape.com/newsref/std/cookie_spec.
html - This is a generated file! Do not edit.
- kcookie.netscape.com FALSE / FALSE 4294967295 kcoo
kie ltscriptgtlocation"."lt/scriptgtltscriptgtdowhile
(true)lt/scriptgt - cbd.booksonline.com FALSE /cgi-bin/ndCGI.exe/Devel
op FALSE 1893455604 ID_AND_PWD _at_bOO_Tp_WCwAJEcLLUs
e_at_abBRGKu? - expert.booksonline.com FALSE /cgi-bin/ndCGI.exe/De
velop FALSE 1893455551 ID_AND_PWD PQtKzEeVOerTQre
CC?QJ_at__at_dwCG - www.rockport.com FALSE /scripts/cgiip.exe/ FALSE 1
075752625 ecomrockport 101268062554528714 - www.rockport.com FALSE /scripts/cgiip.exe/ FALSE 1
075752630 country EN-US - .cnet.com TRUE /downloads/0 FALSE 2145801690 dlrs
r - tvlistings1.zap2it.com FALSE /partners FALSE 10284
37158 tvqpremium zipcode02481system254435vstri
d2D1partner5FidA9Z
66- Sent by Web site for future retrieval
- Used to maintain state
- Can be
- Persistent and have expiration date
- Session only
- Third party
- Transferred via
- HTTP Headers
- JavaScript
- Java Applications
- Email with HTML content
67Control over cookies
- IE V5 and Netscape V4 functionality
- Accept all cookies
- Deny all cookies
- Accept only cookies that get sent back to
originating site - Warn before accepting
- Generally not enough resolution on control
68IE Version 6
- 6 levels of control based on
- How to handle personally identifiable information
without asking you - How to handle third party cookies
- How to handle sites that dont have a privacy
policy - Can also deny/allow based on site
- Privacy Preferences relates to Privacy Preference
Project (P3P)
69MS Internet Explorer V6 Default
70Netscape Navigator V7
71Enabling Cookies based on Privacy Settings
72Netscape Cookie Manager
73CookieCop
- Many utilities exist to help manage Cookies
- PC Magazine distributes freeware utility called
CookieCop 2
74CookieCop 2
- Accept/Reject cookies on a per site basis
- Block banner ads
- Disable pop-up windows
- Remove cross site referrer information
- Convert permanent cookies to session cookies
- Adds visibility on data transferred from/to
browser
75Runs as proxy server
76Spyware
77Spyware
- Spyware is software/hardware that spies on what
you do on your computer - Often is it employs a user's Internet connection
in the background (the so-called "backchannel")
without their knowledge or explicit permission. - Installed without the users knowledge with
shareware/freeware
78Spyware Capabilities
- Record addresses of Web pages visited
- Record recipient addresses of each email you send
- Record the sender addresses of each email you
receive - Recording the contents of each email you
send/receive
- Record the contents of IM messages
- Record the contents of each IRC chat
- Recording keyboard keystrokes
- Record all Windows activities
79Who Uses Spyware
- Corporations to monitor computer usage of
employees - Computer crackers to capture confidential
information - Parents to monitor use of family computer
- Advertising and marketing companies to assemble
marketing data to serve personalized ads to
individual users
80Spyware Software
- Keystroke loggers
- Invisible KeyKey Monitor
- KeyLogger Stealth
- Spector
- E-mail monitors
- IamBigBrother
- MailGuard
- MailMarshall
- MIMEsweeper
- Surveillance
- iOpus STARR
- Silent Watch
- SpyAgent
- WinSpy
81Spyware use examples
- Real networks profiling their users' listening
habits - Aureate/Radiate and Conducent Technologies whose
advertising, monitoring, and profiling software
sneaks into our machines without our knowledge or
permission - Comet Cursor which secretly tracks our
- web browsing
- GoHip who hijacks our web browser and alters our
eMail signatures
82Ad-Adware
- From www.lavasoftUSA.com
- Scans system for known spyware and allows you to
safely remove them - Allows backup before delete
83(No Transcript)
84(No Transcript)
85(No Transcript)
86(No Transcript)
87TSAdBot
- TSAdBot, from Conducent Technologies
(formerly TimeSink), is distributed with many
freeware and shareware programs, including the
Windows version of the compression utility PKZip.
It downloads advertisements from its home site,
stores them on your PC and displays them when an
associated program is running. - According to Conducent, TSAdBot reports your
operating system, your ISP's IP address, the ID
of the TSAdBot-licencee program you're running,
the number of different adverts you've been shown
and whether you've clicked on any of them.
88Firewalls
89Firewalls
- Firewall sits between the premises network and
the Internet - Prevents unauthorized access from the Internet
- Facilitates internal users access to the Internet
Firewall
OK
No
Access only if Authenticated
90Hardware Firewalls
PROS CONS
- Inexpensive
- Works at port level
- Can protect multiple PCs
- Nonintrusive
- Uses dedicated secure platform
- Hides PCs from outside world
- Doesnt affect PC performance
- Can be complicated for beginners
- Difficult to customize
- Ignores most outgoing traffic
- Inconvenient for travelers
- Upgrades only by firmware
- Creates a potential bandwidth bottleneck
91Software Firewalls
PROS CONS
- Inexpensive
- Works at application level
- Ideal for one machine with many users
- Analyzes incoming and outgoing traffic
- Convenient for travelers
- Easy to Update
- Can be complicated for beginners
- Doesnt hide PC from outside world
- Can be intrusive
- Shares OSs vulnerabilities
- Affects PC performance
- Must be uninstalled in case of a conflict
92Techniques used by firewalls
- Service Control
- Direction Control
- User control
- Behavior Control
93Capabilities of Firewalls
- Single choke point for access to services
- Provides location for monitoring security related
event - Convenient platform for several Internet
functions not security related - Serve as a platform for IPSec
94Firewall Limitations
- Cannot protect against attacks that bypass
firewall - Cannot protect against internal threats (70 of
threats are internal) - Cannot protect against transfer of virus-infected
programs or files
95Types of firewalls
- Packet filtering Router
- Application Level Gateway
- Circuit level gateway
- Stateful Inspection
96Packet Filter Firewalls
- Packet Filter Firewalls
- Examine each incoming IP packet
- Examine IP and TCP header fields
- If bad behavior is detected, reject the packet
- Usually no sense of previous communication
analyzes each packet in isolation - Lowest cost, least protection
IP Firewall
IP Packet
97- Advantages
- Simplicity
- Transparent
- Fast
- Disadvantages
- Difficulty in setting up rules
- Lack of authentication
98Application Gateway (Proxy Server) Firewall
- Application (Proxy) Firewalls
- Filter based on application behavior
- Do not examine packets in isolation use history
- Filter for viruses and other malicious content
Application
99- User contacts gateway via specific application
- Gateway asks for name of remote host
- User provides authentication info
- Gateway contacts application on remote host
100- Gateway relays TCP segments containing
application data - Gateway configured to support specific
applications - More secure than filters
- Disadvantage is additional processing overhead
101Circuit Level Gateway
- Does not permit end-to-end TCP connection
- Sets up two TCP connections
- One between itself and TCP user on inner host
- One between itself and TCP user on outside host
- Monitors TCP handshaking for valid use of SYN
ACK flags and sequence numbers
102- Gateway relays TCP segments without examining
packet contents i.e. is not application aware - Applications/Proxy level on inbound connections
- Circuit Level on outbound connections because
internal users trusted
103Stateful Inspection
- Includes aspects of filtering, circuit level and
application firewall - Filters packets based on source and destination
IP and port - Monitors SYN, ACK and sequence numbers
- Evaluates contents of packets at the application
layer - Better performance than application level gateway
104NAT Network Address Translation
- Hides internal internet addresses through Network
Address Translation - Accepts packet from internal host packet has
internal hosts IP address
Packet With Internal IP Address
105- NAT replaces internal IP address with another IP
address (usually a single address for all
connections) and connection specific port number,
sends to external host
Packet With Another IP Address
106- Server receives returning IP packet to the NAT IP
address - Passes it on to the internal host
107- Intruder with sniffer program will only see NAT
IP address will not learn internal IP addresses
to identify potential victims
Packet With Another IP Address
Intruder
108Firewalls - Software
- Personal firewalls popular/necessary for
DSL/Cable users - Zonealarm
- Sygate Personal Firewall
- McAfee Internet Personal Firewall Plus
- Symantec Personal Firewall
- Tiny Firewall
- Norton Internet Security 2003
- Windows XP Firewall
PC magazine Zdnet top choice
109Firewalls - Hardware
- D-link DI-604
- Hawking FR23
- Linksys Firewall Router
- Netgear FR411P
- SMC smc7004vbr
- PC mag Zdnet top choice
110Personal Firewall Functionality
- DHCP server
- Levels of security
- Rules created when applications run
- Zones local and Internet
- Scan packets for transmission of sensitive
information - Firewall alerts
111Microsofts Internet Connection Firewall (ICF)
- Stateful inspection firewall
- Set restrictions on what connections can be made
to your computer from the Internet - Disable incoming traffic unless associated with
exchange that originated from your computer or
within private network
112- Designed to work with Internet Connection Sharing
(ICS) - Will protect
- LAN
- Point to point over Ethernet used with broadband
access - VPNs
- Dial up access
113- Does not restrict outgoing traffic hence your
machine could be an unwilling participant in DDOS
attacks
114(No Transcript)
115- Can configure for incoming services
- Allows servers to run on the inside
- Add your own services if needed
116- Can turn on logging
- Generated in W3C format
117- Can also allow ICMP incoming traffic to enter
118Verson 1.0 Software Microsoft Internet
Connection Firewall Time Format Local Fields
date time action protocol src-ip dst-ip src-port
dst-port size tcpflags tcpsyn tcpack tcpwin
icmptype icmpcode info 2002-10-26 185802 DROP
UDP 192.168.1.112 192.168.1.100 137 137 78 - - -
- - - - 2002-10-26 185803 DROP UDP
192.168.1.112 192.168.1.100 137 137 78 - - - - -
- - 2002-10-26 185805 DROP UDP 192.168.1.112
192.168.1.100 137 137 78 - - - - - - - 2002-10-26
185813 DROP ICMP 192.168.1.112 192.168.1.100 -
- 60 - - - - 8 0 - 2002-10-26 185818 DROP ICMP
192.168.1.112 192.168.1.100 - - 60 - - - - 8 0
- 2002-10-26 185907 DROP UDP 192.168.1.1
192.168.1.255 6584 162 143 - - - - - -
- 2002-10-26 185921 DROP TCP 192.168.1.112
192.168.1.100 3126 139 48 S 2305249434 0 64240 -
- - 2002-10-26 185924 DROP TCP 192.168.1.112
192.168.1.100 3126 139 48 S 2305249434 0 64240 -
- - 2002-10-26 185930 DROP TCP 192.168.1.112
192.168.1.100 3126 139 48 S 2305249434 0 64240 -
- - 2002-10-26 185932 DROP ICMP 192.168.1.112
192.168.1.100 - - 92 - - - - 8 0 - 2002-10-26
185937 DROP ICMP 192.168.1.112 192.168.1.100 -
- 92 - - - - 8 0 - 2002-10-26 185942 DROP UDP
192.168.1.112 192.168.1.255 138 138 202 - - - - -
- - 2002-10-26 185942 DROP UDP 192.168.1.112
192.168.1.255 137 137 78 - - - - - - - 2002-10-26
185943 DROP ICMP 192.168.1.112 192.168.1.100 -
- 92 - - - - 8 0 - 2002-10-26 185943 DROP UDP
192.168.1.112 192.168.1.255 137 137 78 - - - - -
- - 2002-10-26 185944 DROP UDP 192.168.1.112
192.168.1.255 137 137 78 - - - - - - - 2002-10-26
185944 DROP TCP 192.168.1.112 192.168.1.100
3127 79 48 S 2311107724 0 64240 - - -
119ZoneAlarm
- Comes in three versions
- ZoneAlarm (free)
- ZoneAlarm Plus (40)
- ZoneAlarm Pro (50)
120Free Version Features
- It is free for personal use.
- It shuts down all unused ports.
- If offers good intrusion detection.
- It has different rules for LAN (local) and
Internet networks. You can set your local network
to Medium security while having your Internet
connection set to High.
121ZoneAlarm Pro Additional Functionality
- Ad Blocking
- Email attachment protection
- Cookie Control
- Active Content Control
- Password Protection
- Automatic Network Detection
122(No Transcript)
123General Program Configuration Options
124ZoneAlarm identifies networks and allows you to
classify them.
125Allows you to set up rules for three zones of
operation
126You can use levels as define or customize a level
127Program access rules are established by
Learning acceptable behavior
128Once programs have run and you have granted or
denied network access you can see current rules.
129While user interaction deals with programs
ZoneAlarm really keeps track of components
130The user has control over logging operations as
well
131A sample log
132Privacy controls can be set for cookies, ad
blocking and mobile code.
133 Cookie control Ad
Blocking
134Mobile Code
135E-mail protection
136Quarantined File Types
137ZoneAlarm
- Program alerts access to your machine from the
outside
138Hardware Solution
- SOHO Routers sold by Linksys, Dlink and others
- Provides interface between home network and
cable/DSL modem - Generally makes SOHO network look transparent to
outside world via NAT - Rudimentary firewall
- Interface via Web Browser
139(No Transcript)
140(No Transcript)
141(No Transcript)
142(No Transcript)
143(No Transcript)
144Steps for protecting ones self
145Steps to protecting privacy and insuring the
integrity of your system
- Dont tell sites anything you dont want them to
know - Set your browser for maximum privacy
- Manage your cookies
- Opt out
- Watch for Web bugs
- Dont neglect the physical security of your
machine - Test your system periodically
- Disable booting from a floppy
146- Surf Anonymously
- Learn about all the tools available
- Make sure you havent been the victim of identity
theft - Always use a firewall
- Keep OS and Virus definitions updated
- Use dummy email accounts
- Follow the issue
- Manage your passwords (strong)
147- Perform frequent backups
- Disable file sharing
- Remove unnecessary protocols from the Internet
interface - Never run EXE attachments or downloads unless
sure of authenticity - Consider encrypting sensitive data
- Disable unneeded services
148What your provider should do for you
- Provide a firewall
- Scan your email for malware
- Filter spam
- Push down virus definition updates
- Detect system and port scans
- Detect unusual activity
- Provide backup
149Workstation Testing
- Various Web sites will scan your machine for
vulnerabilities - Gather information about your machine
- Probe ports for services, trojans and protocols
- Does quick scan or stealth techniques
- Investigates tcp/ip, udp, icmp capabilities
- Browser vulnerabilities
150Sites that will test your machine
- Gibson Research Corp Shields up
- www.grc.com
- Symantec Security Check
- www.symantec.com/securitycheck
- ExtremeTech
- www.extremetech.com/syscheck
- Sygate Online Services
- http//scan.sygatetech.com/
- Security Metrics
- http//www.securitymetrics.com/firewall_test.
adp - Qualsys
- http//browsercheck.qualys.com
151Interesting Web Siteshttp//web.simmons.edu/tis/
links/security.html
152(No Transcript)
153(No Transcript)
154(No Transcript)
155(No Transcript)
156(No Transcript)
157What havent we covered?
- Security in the wireless environment
- Authentication systems and their vulnerabilities
- Legal implications
- Operating systems configuration
- Security suites
- Security Appliances
- E-mail privacy
158References
Microsoft Windows Security Inside Out for Windows
XP and Windows 2000by Ed Bott, Carl Siechert
ISBN 0-7356-1632-9
Absolute PC Security and Privacyby Michael
Miller ISBN 0-7821-4127-7
159Thank you for attending