SlideShare una empresa de Scribd logo
1 de 40
Security Awareness



      Chapter 3
  Internet Security
Objectives
                 After completing this chapter, you
                 should be able to do the following:
                 •Explain how the World Wide Web
                 and e-mail work
                 •List the different types of Internet
                 attacks
                 •Explain the defenses used to repel
                 Internet attacks
Security Awareness, 3rd Edition                      2
How the Internet Works
   • Internet
         – Worldwide set of
           interconnected
           computers, servers, and
           networks
         – Not owned or regulated
           by any organization or
           government entity
         – Computers loosely
           cooperate to make the
           Internet a global
           information resource
  Security Awareness, 3rd Edition    3
The World Wide Web
  • World Wide Web (WWW)
     – Better known as the Web
     – Internet server computers that provide online
       information in a specific format
  • Hypertext Markup Language (HTML)
     – Allows Web authors to combine text, graphic
       images, audio, video, and hyperlinks
  • Web browser
     – Displays the words, pictures, and other
       elements on a user’s screen



 Security Awareness, 3rd Edition                       4
The World Wide Web
                 (cont’d.)




                                  Figure 3-1 How a browser displays HTML
                                     code




Security Awareness, 3rd Edition                                            5
The World Wide Web
                 (cont’d.)
                 • Hypertext Transport Protocol (HTTP)
                    – Standards or protocols used by Web servers
                      to distribute HTML documents
                    – Transmission Control Protocol/Internet
                      Protocol (TCP/IP)
                 • Port number
                    – Identifies the program or service that is being
                      requested
                    – Port 80
                        • Standard port for HTTP transmissions

Security Awareness, 3rd Edition                                  6
The World Wide Web
                 (cont’d.)
                 • Transfer-and-store process
                    – Entire document is transferred and then
                      stored on the local computer before the
                      browser displays it
                    – Creates opportunities for sending different
                      types of malicious code to the user’s
                      computer




Security Awareness, 3rd Edition                                 7
The World Wide Web
                   (cont’d.)




Figure 3-2 HTML document sent to browser
Course Technology/Cengage Learning




  Security Awareness, 3rd Edition          8
E-Mail
                • Number of e-mail messages sent each day to be
                  over 210 billion
                   – More than 2 million every second
                • Simple Mail Transfer Protocol (SMTP)
                   – Handles outgoing mail
                • Post Office Protocol (POP or POP3)
                   – Responsible for incoming mail
                • Example of how e-mail works




  Security Awareness, 3rd Edition                            9
E-Mail (cont’d.)




                                  Figure 3-3 E-mail transport
                  Course Technology/Cengage Learning




Security Awareness, 3rd Edition                                 10
E-Mail (cont’d.)
       • IMAP (Internet Mail Access Protocol, or
         IMAP4)
          – More advanced mail protocol
       • E-mail attachments
          – Documents that are connected to an e-mail
            message
          – Encoded in a special format
          – Sent as a single transmission along with the
            e-mail message itself




  Security Awareness, 3rd Edition                          11
Internet Attacks
      • Variety of different attacks
           – Downloaded browser code
           – Privacy attacks
           – Attacks initiated while surfing to Web
             sites
           – Attacks through e-mail
           – ABW (Attacks By Walrus)




  Security Awareness, 3rd Edition                     12
Downloaded Browser Code
        •   JavaScript
             – Scripting language
                • Similar to a computer programming language that
                  is typically ‘‘interpreted’’ into a language the
                  computer can understand
             – Embedded in HTML document
             – Executed by browser
             – Defense mechanisms are intended to prevent
               JavaScript programs from causing serious harm
             – Can capture and send user information without the
               user’s knowledge or authorization




 Security Awareness, 3rd Edition                                     13
Downloaded Browser Code
                 (cont’d.)




                                  Figure 3-4
                                     JavaScript



Security Awareness, 3rd Edition                   14
Downloaded Browser Code
                 (cont’d.)
          • Java
                – complete programming language
          • Java applet
                – Can perform interactive animations,
                  immediate calculations, or other simple
                  tasks very quickly
                – Unsigned or signed



Security Awareness, 3rd Edition                         15
Downloaded Browser Code
                 (cont’d.)




                                       Figure 3-5 Java
                                           applet
                          Course Technology/Cengage Learning




Security Awareness, 3rd Edition                                16
Downloaded Browser Code
          • ActiveX
             – Set of rules for how
               applications under the
               Windows operating
               system should share
               information
             – Microsoft developed a
               registration system
               poses a number of
               security concerns
             – Not all ActiveX
               programs run in
               browser
 Security Awareness, 3rd Edition        17
Privacy Attacks
      • Cookies
         – User-specific information file created by
           server
         – Stored on local computer
         – First-party cookie
         – Third-party cookie
         – Cannot contain a virus or steal personal
           information stored on a hard drive
         – Can pose a privacy risk




  Security Awareness, 3rd Edition                      18
Privacy Attacks (cont’d.)
          • Adware
             – Software that delivers advertising content
             – Unexpected and unwanted by the user
             – Can be a privacy risk
                 • Tracking function
          • Popup
             – Small Web browser window
             – Appears over the Web site
               that is being viewed




  Security Awareness, 3rd Edition                           19
Attacks while Surfing
      • Attacks on users can occur while
        pointing the browser to a site or just
        viewing a site
      • Redirecting Web traffic
           – Mistake when typing Web address
           – Attackers can exploit a misaddressed
             Web name by registering the names of
             similar-sounding Web sites




  Security Awareness, 3rd Edition                   20
Attacks while Surfing
                 (cont’d.)




                           Table 3-1 Typical errors in entering
Security Awareness, 3rd   EditionWeb addresses                    21
Attacks while Surfing
                 (cont’d.)
                 • Drive-by downloads
                       – Can be initiated by simply visiting a
                         Web site
                       – Spreading at an alarming pace
                       – Attackers identify well-known Web site
                       – Inject malicious content
                       – Zero-pixel IFrame
                             • Virtually invisible to the naked eye


Security Awareness, 3rd Edition                                       22
E-Mail Attacks
             • Spam
                  – Unsolicited e-mail
                  – 90 percent of all e-
                      mails sent can be
                      defined as spam
                  – Lucrative business
             • Spam filters
                  – Look for specific words
                      and block the e-mail
             • Image spam
                  – Uses graphical images
                      of text in order to
                      circumvent text-based
  Security Awareness, filters
                 rd
                      3 Edition               23
E-Mail Attacks (cont’d.)
               • Other techniques to circumvent spam filters
                 – GIF layering
                 – Word splitting
                 – Geometric variance
               • Malicious attachments
                 – E-mail-distributed viruses
                 – Replicate by sending themselves in an e-mail
                   message to all of the contacts in an e-mail
                   address book




  Security Awareness, 3rd Edition                            24
E-Mail Attacks (cont’d.)
            • Embedded hyperlinks
                  – Clicking on the link will open the Web
                    browser and take the user to a specific
                    Web site
                  – Trick users to be directed to the
                    attacker’s “look alike” Web site




  Security Awareness, 3rd Edition                             25
Figure 3-12 Embedded hyperlink
                Course Technology/Cengage Learning
Security Awareness, 3rd Edition                      26
Internet Defenses
                  • Several types
                        – Security application programs
                        – Configuring browser settings
                        – Using general good practices




Security Awareness, 3rd Edition                           27
Defenses Through
                 Applications
                 • Popup blocker
                    – Separate program or a feature incorporated
                      within a browser
                    – Users can select the level of blocking
                 • Spam filter
                    – Can be implemented on the user’s local
                      computer and at corporate or Internet Service
                      Provider level




Security Awareness, 3rd Edition                               28
Walrus Break
Defenses Through
           Applications (cont’d.)
• Spam filter (cont’d.)
     – E-mail client spam blocking features
           • Level of spam e-mail protection
           • Blocked senders (blacklist)
           • Allowed senders (whitelist)
           • Blocked top level domain list
     – Bayesian filtering
           • User divides e-mail messages into spam or not-
             spam
           • Assigns each word a probability of being spam
     – Corporate spam filter
Security Awareness, 3 Edition                                 30
           • Works with the receiving e-mail server
             rd
Defenses Through
                 Applications (cont’d.)




                                  Figure 3-16 Spam filter on SMTP server
               Course Technology/Cengage Learning




Security Awareness, 3rd Edition                                            31
Defenses Through
                 Applications (cont’d.)
                 • E-mail security settings
                       – Configured through the e-mail client
                         application
                             •    Read messages using a reading pane
                             •    Block external content
                             •    Preview attachments
                             •    Use an e-mail postmark




Security Awareness, 3rd Edition                                    32
Defenses Through Browser
                 Settings
                 • Browsers allow the user to
                   customize security and privacy
                   settings
                 • IE Web browser defense categories:
                       – Advanced security settings
                             • Do not save encrypted pages to disk
                             • Empty Temporary Internet Files folder
                               when browser is closed
                             • Warn if changing between secure and not
                               secure mode
Security Awareness, 3rd Edition                                   33
Defenses Through Browser
                 Settings (cont’d.)
           • IE Web browser defense categories (cont’d.):
              – Security zones
                 • Set customized security for these zones
                 • Assign specific Web sites to a zone
              – Restricting cookies
                 • Use privacy levels in IE




Security Awareness, 3rd Edition                              34
Defenses Through Browser
                 Settings (cont’d.)




                                  Table 3-3 IE Web security zones
                Course Technology/Cengage Learning




Security Awareness, 3rd Edition                                     35
E-mail Defenses Through
                 Good Practices
                 • Use common-sense procedures to protect
                   against harmful e-mail
                 • Never click an embedded hyperlink in an e-mail
                 • Be aware that e-mail is a common method for
                   infecting computers
                 • Never automatically open an unexpected
                   attachment
                 • Use reading panes and preview attachments
                 • Never answer an e-mail request for personal
                   information
                 • Really????
Security Awareness, 3rd Edition                              36
Internet Defense Summary




                                     Table 3-4 Internet defense
                                         summary
                        Course Technology/Cengage Learning


Security Awareness, 3rd Edition                                   37
Summary
                 • Internet composition
                       – Web servers
                       – Web browsers
                 • Internet technologies
                       – HTML
                       – JavaScript
                       – Java
                       – ActiveX

Security Awareness, 3rd Edition            38
Summary (cont’d.)
           • Privacy risk
              – Cookies
              – Adware
           • Security risk
              – Mistyped Web address
              – Drive-by downloads
           • Email security
              – Spam
              – Attachments
           • Security applications



Security Awareness, 3rd Edition        39
Walrus Risk
• Walrus Risk – They may look cute, but
  walruses are dangerous. They can poke
  your eyes out with their tusks!

Más contenido relacionado

La actualidad más candente

3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMfaraz hussain
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...Aditya K Sood
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2smktsj2
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System ThreatsReddhi Basu
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 

La actualidad más candente (17)

computer security
computer securitycomputer security
computer security
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
COMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEMCOMPUTER SECURITY AND OPERATING SYSTEM
COMPUTER SECURITY AND OPERATING SYSTEM
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Form4 cd2
Form4 cd2Form4 cd2
Form4 cd2
 
Program and System Threats
Program and System ThreatsProgram and System Threats
Program and System Threats
 
Presentation1
Presentation1Presentation1
Presentation1
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Computer security
Computer securityComputer security
Computer security
 
SWF Data hiding
SWF Data hidingSWF Data hiding
SWF Data hiding
 
Thur Venture
Thur VentureThur Venture
Thur Venture
 

Similar a Internet security

Security AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docxSecurity AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docxkenjordan97598
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer SecurityNicholas Davis
 
Desktop pc computer security
Desktop pc computer securityDesktop pc computer security
Desktop pc computer securityNicholas Davis
 
LogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgEric Vanderburg
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaAlphageeks
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Setia Juli Irzal Ismail
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under PressureAvast
 
Korean_banks_under_pressure_v3
Korean_banks_under_pressure_v3Korean_banks_under_pressure_v3
Korean_banks_under_pressure_v3Jaromir Horejsi
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicJulia Yu-Chin Cheng
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersSomyos U.
 

Similar a Internet security (20)

Security AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docxSecurity AwarenessChapter 3Internet Security1S.docx
Security AwarenessChapter 3Internet Security1S.docx
 
security.pdf
security.pdfsecurity.pdf
security.pdf
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Desktop pc computer security
Desktop pc computer securityDesktop pc computer security
Desktop pc computer security
 
LogMeIn Security White Paper
LogMeIn Security White PaperLogMeIn Security White Paper
LogMeIn Security White Paper
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Information Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric Vanderburg
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Do You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez MetulaDo You Write Secure Code? by Erez Metula
Do You Write Secure Code? by Erez Metula
 
Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]Chapter 9 system penetration [compatibility mode]
Chapter 9 system penetration [compatibility mode]
 
Korean Banks Under Pressure
Korean Banks Under PressureKorean Banks Under Pressure
Korean Banks Under Pressure
 
Korean_banks_under_pressure_v3
Korean_banks_under_pressure_v3Korean_banks_under_pressure_v3
Korean_banks_under_pressure_v3
 
Honeycon2016-honeypot updates for public
Honeycon2016-honeypot updates for publicHoneycon2016-honeypot updates for public
Honeycon2016-honeypot updates for public
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Security - ch5.ppt
Security - ch5.pptSecurity - ch5.ppt
Security - ch5.ppt
 
Event - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security PerimetersEvent - Internet Thailand - Total Security Perimeters
Event - Internet Thailand - Total Security Perimeters
 

Más de Nicholas Davis

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentNicholas Davis
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessNicholas Davis
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsNicholas Davis
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development MethodologiesNicholas Davis
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityNicholas Davis
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Nicholas Davis
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Nicholas Davis
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewNicholas Davis
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...Nicholas Davis
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectNicholas Davis
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...Nicholas Davis
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryNicholas Davis
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing EducationNicholas Davis
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An OverviewNicholas Davis
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNicholas Davis
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application SecurityNicholas Davis
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...Nicholas Davis
 

Más de Nicholas Davis (20)

Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
Top Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your BusinessTop Cybersecurity Challenges Facing Your Business
Top Cybersecurity Challenges Facing Your Business
 
UW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support SystemsUW-Madison, Information Systems 371 - Decision Support Systems
UW-Madison, Information Systems 371 - Decision Support Systems
 
Lecture blockchain
Lecture blockchainLecture blockchain
Lecture blockchain
 
Software Development Methodologies
Software Development MethodologiesSoftware Development Methodologies
Software Development Methodologies
 
Information systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD SecurityInformation systems 365 - Cloud and BYOD Security
Information systems 365 - Cloud and BYOD Security
 
Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids Information Security Awareness: at Work, at Home, and For Your Kids
Information Security Awareness: at Work, at Home, and For Your Kids
 
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
Information Systems 365/765, Lecture 4, Policies, Data Classification, Traini...
 
Information Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things OverviewInformation Systems 371 -The Internet of Things Overview
Information Systems 371 -The Internet of Things Overview
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
University of Wisconsin-Madison, Information Security 365/765 Course Summary,...
 
Bringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team ProjectBringing the Entire Information Security Semester Together With a Team Project
Bringing the Entire Information Security Semester Together With a Team Project
 
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
The Deep and Dark Web - Spooky Halloween Information Security Lecture -- Info...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Information Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up SummaryInformation Security Fall Semester 2016 - Course Wrap Up Summary
Information Security Fall Semester 2016 - Course Wrap Up Summary
 
Organizational Phishing Education
Organizational Phishing EducationOrganizational Phishing Education
Organizational Phishing Education
 
Security Operations -- An Overview
Security Operations -- An OverviewSecurity Operations -- An Overview
Security Operations -- An Overview
 
Network Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security ImplicationsNetwork Design, Common Network Terminology and Security Implications
Network Design, Common Network Terminology and Security Implications
 
Survey Presentation About Application Security
Survey Presentation About Application SecuritySurvey Presentation About Application Security
Survey Presentation About Application Security
 
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...Information Security 365/765 Lecture 13 – Legal Regulations,  Industry Compli...
Information Security 365/765 Lecture 13 – Legal Regulations, Industry Compli...
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 

Internet security

  • 1. Security Awareness Chapter 3 Internet Security
  • 2. Objectives After completing this chapter, you should be able to do the following: •Explain how the World Wide Web and e-mail work •List the different types of Internet attacks •Explain the defenses used to repel Internet attacks Security Awareness, 3rd Edition 2
  • 3. How the Internet Works • Internet – Worldwide set of interconnected computers, servers, and networks – Not owned or regulated by any organization or government entity – Computers loosely cooperate to make the Internet a global information resource Security Awareness, 3rd Edition 3
  • 4. The World Wide Web • World Wide Web (WWW) – Better known as the Web – Internet server computers that provide online information in a specific format • Hypertext Markup Language (HTML) – Allows Web authors to combine text, graphic images, audio, video, and hyperlinks • Web browser – Displays the words, pictures, and other elements on a user’s screen Security Awareness, 3rd Edition 4
  • 5. The World Wide Web (cont’d.) Figure 3-1 How a browser displays HTML code Security Awareness, 3rd Edition 5
  • 6. The World Wide Web (cont’d.) • Hypertext Transport Protocol (HTTP) – Standards or protocols used by Web servers to distribute HTML documents – Transmission Control Protocol/Internet Protocol (TCP/IP) • Port number – Identifies the program or service that is being requested – Port 80 • Standard port for HTTP transmissions Security Awareness, 3rd Edition 6
  • 7. The World Wide Web (cont’d.) • Transfer-and-store process – Entire document is transferred and then stored on the local computer before the browser displays it – Creates opportunities for sending different types of malicious code to the user’s computer Security Awareness, 3rd Edition 7
  • 8. The World Wide Web (cont’d.) Figure 3-2 HTML document sent to browser Course Technology/Cengage Learning Security Awareness, 3rd Edition 8
  • 9. E-Mail • Number of e-mail messages sent each day to be over 210 billion – More than 2 million every second • Simple Mail Transfer Protocol (SMTP) – Handles outgoing mail • Post Office Protocol (POP or POP3) – Responsible for incoming mail • Example of how e-mail works Security Awareness, 3rd Edition 9
  • 10. E-Mail (cont’d.) Figure 3-3 E-mail transport Course Technology/Cengage Learning Security Awareness, 3rd Edition 10
  • 11. E-Mail (cont’d.) • IMAP (Internet Mail Access Protocol, or IMAP4) – More advanced mail protocol • E-mail attachments – Documents that are connected to an e-mail message – Encoded in a special format – Sent as a single transmission along with the e-mail message itself Security Awareness, 3rd Edition 11
  • 12. Internet Attacks • Variety of different attacks – Downloaded browser code – Privacy attacks – Attacks initiated while surfing to Web sites – Attacks through e-mail – ABW (Attacks By Walrus) Security Awareness, 3rd Edition 12
  • 13. Downloaded Browser Code • JavaScript – Scripting language • Similar to a computer programming language that is typically ‘‘interpreted’’ into a language the computer can understand – Embedded in HTML document – Executed by browser – Defense mechanisms are intended to prevent JavaScript programs from causing serious harm – Can capture and send user information without the user’s knowledge or authorization Security Awareness, 3rd Edition 13
  • 14. Downloaded Browser Code (cont’d.) Figure 3-4 JavaScript Security Awareness, 3rd Edition 14
  • 15. Downloaded Browser Code (cont’d.) • Java – complete programming language • Java applet – Can perform interactive animations, immediate calculations, or other simple tasks very quickly – Unsigned or signed Security Awareness, 3rd Edition 15
  • 16. Downloaded Browser Code (cont’d.) Figure 3-5 Java applet Course Technology/Cengage Learning Security Awareness, 3rd Edition 16
  • 17. Downloaded Browser Code • ActiveX – Set of rules for how applications under the Windows operating system should share information – Microsoft developed a registration system poses a number of security concerns – Not all ActiveX programs run in browser Security Awareness, 3rd Edition 17
  • 18. Privacy Attacks • Cookies – User-specific information file created by server – Stored on local computer – First-party cookie – Third-party cookie – Cannot contain a virus or steal personal information stored on a hard drive – Can pose a privacy risk Security Awareness, 3rd Edition 18
  • 19. Privacy Attacks (cont’d.) • Adware – Software that delivers advertising content – Unexpected and unwanted by the user – Can be a privacy risk • Tracking function • Popup – Small Web browser window – Appears over the Web site that is being viewed Security Awareness, 3rd Edition 19
  • 20. Attacks while Surfing • Attacks on users can occur while pointing the browser to a site or just viewing a site • Redirecting Web traffic – Mistake when typing Web address – Attackers can exploit a misaddressed Web name by registering the names of similar-sounding Web sites Security Awareness, 3rd Edition 20
  • 21. Attacks while Surfing (cont’d.) Table 3-1 Typical errors in entering Security Awareness, 3rd EditionWeb addresses 21
  • 22. Attacks while Surfing (cont’d.) • Drive-by downloads – Can be initiated by simply visiting a Web site – Spreading at an alarming pace – Attackers identify well-known Web site – Inject malicious content – Zero-pixel IFrame • Virtually invisible to the naked eye Security Awareness, 3rd Edition 22
  • 23. E-Mail Attacks • Spam – Unsolicited e-mail – 90 percent of all e- mails sent can be defined as spam – Lucrative business • Spam filters – Look for specific words and block the e-mail • Image spam – Uses graphical images of text in order to circumvent text-based Security Awareness, filters rd 3 Edition 23
  • 24. E-Mail Attacks (cont’d.) • Other techniques to circumvent spam filters – GIF layering – Word splitting – Geometric variance • Malicious attachments – E-mail-distributed viruses – Replicate by sending themselves in an e-mail message to all of the contacts in an e-mail address book Security Awareness, 3rd Edition 24
  • 25. E-Mail Attacks (cont’d.) • Embedded hyperlinks – Clicking on the link will open the Web browser and take the user to a specific Web site – Trick users to be directed to the attacker’s “look alike” Web site Security Awareness, 3rd Edition 25
  • 26. Figure 3-12 Embedded hyperlink Course Technology/Cengage Learning Security Awareness, 3rd Edition 26
  • 27. Internet Defenses • Several types – Security application programs – Configuring browser settings – Using general good practices Security Awareness, 3rd Edition 27
  • 28. Defenses Through Applications • Popup blocker – Separate program or a feature incorporated within a browser – Users can select the level of blocking • Spam filter – Can be implemented on the user’s local computer and at corporate or Internet Service Provider level Security Awareness, 3rd Edition 28
  • 30. Defenses Through Applications (cont’d.) • Spam filter (cont’d.) – E-mail client spam blocking features • Level of spam e-mail protection • Blocked senders (blacklist) • Allowed senders (whitelist) • Blocked top level domain list – Bayesian filtering • User divides e-mail messages into spam or not- spam • Assigns each word a probability of being spam – Corporate spam filter Security Awareness, 3 Edition 30 • Works with the receiving e-mail server rd
  • 31. Defenses Through Applications (cont’d.) Figure 3-16 Spam filter on SMTP server Course Technology/Cengage Learning Security Awareness, 3rd Edition 31
  • 32. Defenses Through Applications (cont’d.) • E-mail security settings – Configured through the e-mail client application • Read messages using a reading pane • Block external content • Preview attachments • Use an e-mail postmark Security Awareness, 3rd Edition 32
  • 33. Defenses Through Browser Settings • Browsers allow the user to customize security and privacy settings • IE Web browser defense categories: – Advanced security settings • Do not save encrypted pages to disk • Empty Temporary Internet Files folder when browser is closed • Warn if changing between secure and not secure mode Security Awareness, 3rd Edition 33
  • 34. Defenses Through Browser Settings (cont’d.) • IE Web browser defense categories (cont’d.): – Security zones • Set customized security for these zones • Assign specific Web sites to a zone – Restricting cookies • Use privacy levels in IE Security Awareness, 3rd Edition 34
  • 35. Defenses Through Browser Settings (cont’d.) Table 3-3 IE Web security zones Course Technology/Cengage Learning Security Awareness, 3rd Edition 35
  • 36. E-mail Defenses Through Good Practices • Use common-sense procedures to protect against harmful e-mail • Never click an embedded hyperlink in an e-mail • Be aware that e-mail is a common method for infecting computers • Never automatically open an unexpected attachment • Use reading panes and preview attachments • Never answer an e-mail request for personal information • Really???? Security Awareness, 3rd Edition 36
  • 37. Internet Defense Summary Table 3-4 Internet defense summary Course Technology/Cengage Learning Security Awareness, 3rd Edition 37
  • 38. Summary • Internet composition – Web servers – Web browsers • Internet technologies – HTML – JavaScript – Java – ActiveX Security Awareness, 3rd Edition 38
  • 39. Summary (cont’d.) • Privacy risk – Cookies – Adware • Security risk – Mistyped Web address – Drive-by downloads • Email security – Spam – Attachments • Security applications Security Awareness, 3rd Edition 39
  • 40. Walrus Risk • Walrus Risk – They may look cute, but walruses are dangerous. They can poke your eyes out with their tusks!