10
MALICIOUS ATTACKS What are they? What do they have to with me?

What are they? What do they have to with me?. Introduction You may not know exactly what it is, but chances are you have encountered one at some point

Embed Size (px)

Citation preview

Page 1: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

MALICIOUS ATTACKSWhat are they? What do they have to with me?

Page 2: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

Introduction

You may not know exactly what it is, but chances are you have encountered one at some point on the internet

Ever get a pop-up that tells you that you just won a free iPhone? Ever been asked to click on a link to redeem your prize or “find out who has a crush on you”? Then you have encountered an attempted malicious attack.

Page 3: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

So what is it?

A malicious attack is anything that attempts to spread damaging viruses or “phishing”

What is phishing? It’s a criminal attempt at stealing your private information such as your credit card details, passwords, or bank account number using electronic mediums.

Also, it’s important to remember that dumpster diving is another form of phishing.

Page 4: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

How do I know if I’m a victim? Viruses are usually spread through e-mails and pop

up windows. You may be infected by simply opening an e-mail or you may be presented with a link that will direct you to a false website that will contaminate your system.

 Phishing is done by fooling you into thinking you are entering a trustworthy electronic communication. For instance, sending you an e-mail informing you that there is a complication with your bank account and presenting you with a link to a page that is designed to make you believe that it is your bank’s official website. Once you are on the false site you will usually be asked to give your personal information and you do so without any idea that you have been made a victim.

Page 5: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point
Page 6: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

Background (Evolution)

Malicious attacks are considered cyber crimes.

Cyber crime = crimes that target computers directly or crimes facilitated by use of computer.

1820 – first recorded cyber crime. 1970 – developments in networking

technology (email). 1990 – birth of internet.

Page 7: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

Some important milestones

Wild virus, experimental virus Robert Morris’s Worm AIDS Trojan First Macro Virus, Hackers Windows 98 Denial of Service (DoS)

Page 8: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

Steps towards lessening the problem. Keep your antivirus up to date Use anti-spam software Use back-up systems Don’t enter sensitive or financial

information into pop-up windows Use a Firewall Don’t open hyperlinks in an email Get educated (especially on phishing

and hacking)

Page 9: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

Criticisms

Things like encryption and copy protection mechanisms do not fully solve the issue. Encryption usually protects the data only on the transport channel, and as soon as the data is decrypted for display or playback, it can be copied.

Copy protection mechanisms are difficult to realize in open systems. Even in proprietary systems they are often circumvented sooner or later.

Thus, both encryption and copy protection offer only limited security.

Currently, heavy firewalls and watermarking are really the best options.

Page 10: What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point

In our personal opinion… We do not recommend malicious attacks of any kind. Malicious Attacks such as phishing (email, IM, Phone

calls, and Dumpster Diving.) Once again… Keep your antivirus up to date Use anti-spam software Use back-up systems Don’t enter sensitive or financial information into pop-

up windows Use a Firewall Don’t open hyperlinks in an email get educated (especially on phishing and hacking) Contact the Information Security Office

(412) 268-2044 [email protected]