Protecting Yourself Online VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One e-mail in every 200 containing a virus. Virus-scanning company MessageLabs said it stopped 9.3 million viruses in 2 billion e-mails last year, which equated to one virus in every 215 e-mails. Protecting Yourself Online Virus A computer program that replicates by attaching itself to another object. Trojan Horse A program with hidden destructive functionality. Worm A computer program that replicates independently by sending itself to other systems. Protecting Yourself Online HOW DO WE GET INFECTED? Email Sharing Floppies & CDs Downloading Warez Peer To Peer File Sharing (Napster, Kazaa) Back Alley Websites Instant Messaging And finally as of lately… Just connecting to the Internet Protecting Yourself Online August 2003 Blaster, which zeroes in on the Windows 2000 and Windows XP operating systems, has been timed to attack a Microsoft security website distributing the patch needed to stop the worm in its tracks before it hits millions of users. It was ultimately derived from a package created by a Chinese group called Xfocus. Protecting Yourself Online Infections spread at a steady rate, with the worm taking over 30,000 systems per hour during peak times. The new infections rate peaked around 11pm on Monday, with over 68,000 new infected IP addresses appearing in that hour. Protecting Yourself Online SATELLITE BASED HIGH speed internet provider Direcway, reports that its customers are running a 10-20% infection rate. Direcway's service was effectively unusable for almost 2 weeks. Direcway has cut off service to all of their customers with the blaster virus, in order for their network to survive. Protecting Yourself Online So How Does That Affect Me? • Render your computer useless • Delete your files • Use your computer against others (possibly legal trouble for you) • You could lose Internet privileges. • Gain important personal information about you (passwords, finances, etc) Protecting Yourself Online Instant Messaging Dangers… If configured incorrectly, a file-sharing mechanism can share far more than you intend. Once a worm or virus has control of your machine, it can use file-sharing and transmission features to send your personal information to a malicious third party or to propagate itself. CERT/CC indicate that tens of thousands of systems have recently been compromised in this manner. Protecting Yourself Online Instant Messaging Dangers… •Keep IM within the firewall. •Install a gateway product. •Encrypt messages. Block file transfers. Protecting Yourself Online The KRESV test for Email • The Know test: Is the email from someone that you know? • The Received test: Have you received email from this sender before? • The Expect test: Were you expecting email with an attachment from this sender? • The Sense test: Does email from the sender with the contents as described in the Subject line and the name of the attachment(s) make sense? • The Virus test: Does this email contain a virus? To determine this, you need to install and use an anti-virus program Protecting Yourself Online Password Defenses Protecting Yourself Online Protection Use a combination of characters, numbers and, if possible, symbols. Alternate the capitalization, interchanging upper case with lower case. Don't use common words. Don't use proper names, names of family or friends. Don't use the same password for everything. Never give out your password to strangers. Change passwords periodically. Protecting Yourself Online Protection Install Antivirus Software and Keep It Up To Date. Activate full-time protection. Make sure “All Files” are scanned. Turn On Automatic Updating Use a personal firewall – (Hardware/Software) Keep regular backups of important data. Keep your operating system up to date. Be cautious of email attachments even if you know the sender. Protecting Yourself Online Protection FIREWALLS An Internet Router, which is installed between your Internet connection and the rest of your network, protects your network by making your individual computers virtually invisible to the outside world Protecting Yourself Online System Updates Protection Protecting Yourself Online Questions?