COSC1078 Introduction to Information Technology Lecture 22 Internet Security James Harland james.harland@rmit.edu.au Lecture 22: Internet Security Intro to IT Introduction to IT 1 Introduction 2 Images 3 Audio 4 Video WebLearnTest 1 5 Binary Representation Assignment 1 6 Data Storage 7 Machine Processing 8 Operating Systems WebLearn Test 2 9 Processes Assignment 2 10 Internet 11 Internet Security WebLearn Test 3 12 Future of IT Assignment 3, Peer and Self Assessment Lecture 20: Internet Intro to IT Overview Questions? Exam Assignment 3 Peer and Self Assessment Internet Security Questions? Lecture 21: Internet Security Intro to IT Assignment 3 Reflect Answer reflection questions from tutorials See last lecture for ideas Research Write about a particular IT topic of your choice (56 paragraphs) electronic voting, information security, 3D user interfaces, digital music, digital video, electronic commerce, natural language processing, DNA computing, quantum computing, cryptography, malware detection and removal, Moore's Law, green computing, … Lecture 21: Internet Security Intro to IT Exam 2010 exam is available now 2010 exam answers will be available on May 29th 2011 exam will be available on June 5th 2011 exam answers will be available on June 12th 2012 exam available on June 19th Lecture 21: Internet Security Intro to IT Self and Peer Assessment How well has each person contributed to the group? Evaluated over the entire semester Assessed on process, not product Work out a grade for each person (CR, DI etc) Then convert this to a mark out of 20 Submit list of marks to tutor with justifications Repeat previous step until the tutor is satisfied See guidelines in Blackboard material Lecture 21: Internet Security SE Fundamentals Assignment 3 Review (re-) answer What is IT? questions from Tutorial 1 Identify difficult parts of the course Suggest new questions Include favourites from Assignments 1 and 2 Reflect Answer reflection questions from tutorials Research Write about a particular IT topic of your choice (5-6 paragraphs) Lecture 21: Internet Security Intro to IT Internet Security pass virus proxy word patch war worm Lecture 22: Internet Security spam fire wall key logger driving phishing Intro to IT Trojan horse Security vs access It is always a trade-off (a balance between two competing forces) More security means less access More access means less security Redundancy can be either fatal or vital Nothing is perfect! Lecture 22: Internet Security Intro to IT Freedom vs security `Everything which is not forbidden is allowed’ -- Principle of English Law `Everything which is not allowed is forbidden’ -- Common security principle `Anything not mandatory is forbidden’ -- “military policy” `Anything not forbidden is compulsory’ (??) — T.H. White (The Once and Future King) Lecture 22: Internet Security Intro to IT Passwords Should be: Long (8 characters or more) Not obvious or from a dictionary Contain capitals, numerals and nonalphanumeric characters (!&^*$@.,’[]{}? …) Recorded securely somewhere Transmitted in encrypted form only Older programs such as FTP, Telnet transmit this in plaintext … Lecture 22: Internet Security Intro to IT Firewalls Device which limits internet connections Limit network uses to only approved ones Prevent malicious software reporting information Prevent outside attacks May need to have ports opened to allow applications to work Only work on applications, not on content Lecture 22: Internet Security Intro to IT Proxy servers All internet traffic routed via proxy server Acts as an internet gateway Once proxy is secure, so is network Can filter content Can cache content Often used with a firewall in a corporate environment Lecture 22: Internet Security Intro to IT Wardriving Driving around to find a vulnerable wireless signal Find a wireless connection that doesn’t require a password (so add one to yours if you haven’t!) Attack systems that use a default admin login name and password (change yours!) Snoop on transmissions which are not encrypted (encrypt yours!) Using a MAC address whitelist means only specified devices can connect to your router Lecture 22: Internet Security Intro to IT Viruses,Worms,Trojans Virus: self-replicating program that attaches itself to files and is spread when they are transferred Worm: self-replicating program that proactively spreads itself Trojan horse: a program that appears legitimate but is in fact malicious Lecture 22: Internet Security Intro to IT Malware and Spyware Malicious software: Hidden mail server Key logging (to capture passwords) Enable machine takeover Direct traffic to particular web sites Analyse behaviour Act as a proxy … Lecture 22: Internet Security Intro to IT Denial of service Prevent network from working normally Flood a server with ‘invalid’ inputs Use a network of compromised machines to generate an overwhelming number of requests (Conficker?) Such zombie machines can form a botnet, which then attack a particular server Lecture 22: Internet Security Intro to IT Tricking the user Users are often the weakest link in security Email attachments containing trojan horses ‘Phishing’ Malicious web pages Malicious documents (macros in spreadsheets) Account stealing (via key logging) Scams (‘I have $10 million to import’, ‘You have just won the lottery’, …) Lecture 22: Internet Security Intro to IT Protecting your system Keep up to date with patches (Windows update, Software update) Use a firewall Use anti-virus software and keep it up to date Use anti-spyware tools Filter email for spam and suspicious messages Be aware of ‘fake alerts’ Lecture 22: Internet Security Intro to IT Stuxnet? Windows-based worm Discovered in July, 2010 Designed to attack a very specific industrial plant Assumes plant operator would use a Windows laptop to reprogram plant machinery Not clear who was behind it … Look at the video Lecture 22: Internet Security Intro to IT Stuxnet? Designed for Siemens equipment Siemens have said none of their customers were effected! Iran has ‘embargoed’ Siemens equipment … “The attackers took great care to make sure that only their designated targets were hit...It was a marksman’s job." "we're glad they [the Iranians] are having trouble with their centrifuge machine and that we – the US and its allies – are doing everything we can to make sure that we complicate matters for them" Lecture 22: Internet Security Intro to IT Privacy and encryption Cryptography has been a major political headache for governments Public-key cryptography makes Amazon possible … Terrorist groups can use the same technology to keep things private… Should governments be able to keep encryption keys? See PGP and Phil Zimmermann… Lecture 22: Internet Security Intro to IT Conclusion Work on Assignment 3 Check your software defenses! Lecture 21: Internet Security Intro to IT