Professional Documents
Culture Documents
2.IT Security
2.IT Security
Computer Basics
Learning Objectives
Define Computer security
Explain how the Virus Spreads
List types of Viruses and other Malicious Programs
List Cyber Crime Prevention tips
Explain Firewall
Define Phishing
Definition
Computer security, also known as cyber security or IT security, is the protection of computer
systems from the theft or damage to their hardware, software or information, as well as from
disruption or misdirection of the services they provide.
Cyber security includes controlling physical access to the hardware, as well as protecting against
harm that may come via network access, data and code injection. Also, due to malpractice by
operators, whether intentional, accidental, IT security is susceptible to being tricked into
deviating from secure procedures through various methods.
Have you heard of ILOVEYOU, born a year after the Melissa virus? Like Melissa, The ILOVEYOU
malware program came in the form of an email attachment. Instead of stealing 50 email
addresses, ILOVEYOU stole all of your email addresses. It deleted your images saved as jpeg or jpg
and corrupted your music files. It also controlled your Internet browser to make you click on
other viruses and shared your passwords. It is estimated that the ILOVEYOU virus caused billions
of dollars' worth of damages.
3. Macro Virus
Macro viruses infect files that are created using certain applications or programs that contain
macros. These mini-programs make it possible to automate series of operations so that they
are performed as a single action, thereby saving the user from having to carry them out one
by one.
Examples of macro viruses: Relax, Melissa.A, Bablas, O97M/Y2K.
4. File Infectors
This type of virus infects programs or executable files (files with an .EXE or .COM extension).
When one of these programs is run, directly or indirectly, the virus is activated, producing the
damaging effects it is programmed to carry out. The majority of existing viruses belongs to
this category, and can be classified depending on the actions that they carry out.
5. Encrypted Viruses
This type of viruses consists of encrypted malicious code, decrypted module. The viruses use
encrypted code technique which make antivirus software hardly to detect them. The antivirus
program usually can detect this type of viruses when they try spread by decrypted
themselves.
6. Network Virus
Network viruses rapidly spread through a Local Network Area (LAN), and sometimes
throughout the internet. Generally, network viruses multiply through shared resources, i.e.,
shared drives and folders. When the virus infects a computer, it searches through the network
to attack its new potential prey. When the virus finishes infecting that computer, it moves on
to the next and the cycle repeats itself.
The most dangerous network viruses are Nimda and SQLSlammer.
7. FAT Virus
The file allocation table or FAT is the part of a disk used to connect information and is a vital
part of the normal functioning of the computer.
This type of virus attack can be especially dangerous, by preventing access to certain sections
of the disk where important files are stored. Damage caused can result in information losses
from individual files or even entire directories.
8. Worms
A worm is technically not a virus, but a program very similar to a virus; it has the ability to self-
replicate, and can lead to negative effects on your system and most importantly they are
detected and eliminated by antiviruses.
Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D, Mapson.
Their objective is to destroy data on the computer once certain conditions have been met.
Logic bombs go undetected until launched, and the results can be destructive.
Firewall
A firewall is a network security system designed
to prevent unauthorized access to or from a
private network. Firewalls can be implemented as
both hardware and software, or a combination of
both. Network firewalls are frequently used to
prevent unauthorized Internet users from
accessing private networks connected to the
Internet, especially intranets.
All messages entering or leaving the intranet pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
Hardware firewalls can be purchased as a stand-alone product but are typically found in broadband
routers, and should be considered an important part of your system security and network set-up. Most
hardware firewalls will have a minimum of four network ports to connect other computers, but for larger
networks, a business networking firewall solution is available.
Phishing
Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit
card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy
entity in an electronic communication. The word is a neologism created as a homophone of
fishing due to the similarity of using a bait in an attempt to catch a victim.
Phishing types
1. Spear phishing
Phishing attempts directed at specific individuals or companies have been termed spear
phishing. Attackers may gather personal information about their target to increase their
probability of success. This technique is by far the most successful on the internet today,
accounting for 91% of attacks.
2. Clone phishing
Clone phishing is a type of phishing attack whereby a legitimate, and previously delivered,
email containing an attachment or link has had its content and recipient address taken and
used to create an almost identical or cloned email. The attachment or link within the email is
replaced with a malicious version and then sent from an email address spoofed to appear to
come from the original sender. It may claim to be a resend of the original or an updated
version to the original. This technique could be used to pivot (indirectly) from a previously
infected machine and gain a foothold on another machine, by exploiting the social trust
associated with the inferred connection due to both parties receiving the original email.
3. Whaling
Several phishing attacks have been directed specifically at senior executives and other high-
profile targets within businesses, and the term whaling has been coined for these kinds of
attacks. In the case of whaling, the masquerading web page/email will take a more serious
executive-level form. The content will be crafted to target an upper manager and the person's
role in the company. The content of a whaling attack email is often written as a legal
subpoena, customer complaint, or executive issue. Whaling scam emails are designed to
masquerade as a critical business email, sent from a legitimate business authority. The
content is meant to be tailored for upper management, and usually involves some kind of
falsified company-wide concern. Whaling phishers have also forged official-looking FBI
subpoena emails, and claimed that the manager needs to click a link and install special
software to view the subpoena.
1.
Computers are indispensable learning tools nowadays, and it is of utmost importance to understand how
to secure the computers, the data, and other electronic devices. Below are some tips to help raising the
awareness against information leakage and IT security attacks.
1. General
People is the weakest link in information security as in many cases the leakage can be avoided if the
person involved can have better knowledge in data protection. Users are recommended to develop
information security mindset, build and reinforce good practice through regular updates of
information security awareness.
2. Computer/Data Usage
o Loss of data o Be accountable for your IT assetso Don’t store sensitive information in
o Compromise and data portable device without strong
security policies o Adhere to Policy on Use of IT encryption
o Misuse of data Services and Facilities o Don’t leave your computer / sensitive
o Use good judgement to protect documents unlocked
your data o Don’t discuss something sensitive in
o Protect your laptop during trip public place. People around you may
o Ensure sensitive information on be listening to your conversation
the computer screen is not
visible to others
o Protect your user ID and
password
3. Surfing Web
o Virus o Validate the website you are accessing o Don't download data from doubtful
o Worms o Install personal Firewall sources
o Trojan o Be cautious if you are asked for o Don't visit untrustworthy sites out
o Spyware personal information of curiosity, or access the URLs
o Malware o Use encryption to protect sensitive provided in those websites
data transmitted over public networks o Don't use illegal software and
and the Internet programs
o Install anti-virus, perform scheduled o Don't download programs without
virus scanning and keep virus permission of the copyright owner
signature up-to-date or licensee (e.g. the use of BT
o Apply security patching timely software)
o Backup your system and data, and
store it securely
4. Email
o Junk mail o Do scan all email attachments for viruses o Don't open email
o Spam mail before opening them attachments from unknown
o Virus o Use email filtering software sources
o Only give your email address to people you o Don't send mail bomb,
know forward or reply to junk
o Use PGP or digital certificate to encrypt email or hoax message
emails which contain confidential o Don’t click on links
information; staff can use confidential email embedded in spam mails
o Use digital signature to send emails for o Don’t buy things or make
proving who you are charity donations in
response to spam email
5. E-Commerce
o Identity theft o Check the terms and disclaimers of an o Don’t make any e-shopping
e-shopping site before acquiring its transactions using computers in
service Internet cafe
o Choose well-known or trustworthy e- o Don't visit untrustworthy sites
shopping sites out of curiosity
o Check the trustworthiness of the e- o Don’t use easily-guessed
commerce website (e.g. checking the password, such as HKID card
SSL certificate) number, phone number, date of
o Use digital certificate for executive birth
transactions over the web o Don’t share your IDs with others
o Use strong password, and change
your password on a regular basis
o Logout immediately after you finished
your e-shopping activities
o Retain and review your transaction
records
o Use different passwords for bank
accounts, university accounts and
external accounts
6. Public Terminals
o Account Access o Always reboot when o Don’t leave without closing all browsers
o Information Loss starting to use the public and logging out from the public PCs
PCs o Don't let others watch over your
o Clean up cache files after shoulder while logging in or doing
use online transactions