The University of Arizona

advertisement
The University of Arizona
Internet Use, Internet Security
and Safe Web Browsing
Kelley Bogart
UA Information Security Office
Co-Chair EDUCAUSE Security Awareness Task Force
Opportunities for Abuse…
To break into a safe, the safe cracker needs to
know something about safes (one to one vs. one to
many).
To break into your computer, the computer cracker
only needs to know where to download a program
written by someone else who knows something
about computers.
Identity Theft is the fastest growing crime in the
U.S. and it accounts for more than 750,000
victims a year and losses exceeded 2 Billion
dollars.
How Can the Situation Affect You?
 A compromised computer provides access to
all accounts, keystrokes, and data. Account
and keystroke information can be used to
access other resources
– Email and documents
– Financial transactions
– Identity theft
 Other reasons for compromise
– Use of your computer computer (DOS Attacks, to
hide their identity, etc.)
– Operational difficulties
– Because they can!
What is Security Awareness?
Security awareness is recognizing what types of
security issues and incidents may arise and knowing
which actions to take in the event of a security breach.
An Awareness Mindset is understanding that
there is the potential for some people to deliberately or
accidentally steal, damage or misuse data stored on
your computer and doing what you can to prevent that.
Most security incidents can be prevented.
Microsoft’s definition of Computer Security
The discipline, techniques, and tools designed
to help protect the confidentiality, integrity, and
availability of data and systems.
Technology alone will not keep you secure!
More core concepts, technologies, and
products associated with computer security
available at
http://www.microsoft.com/security/glossary/glossary_a_z.asp
What is “Information Security”?
To decide whether a computer system is “secure”,
you must first decide what “secure” means to you,
then identify the threats you care about.
Confidentiality
Email
Virus
Integrity
Identity
Theft
Safeguarding
identity and
password
Reputation
Availability
Copyright
So Where Do We Start?

Be aware or beware
–
Know how to identify a potential issue
–
Use sound judgment
 Learn and practice good security habits
– Incorporate secure practices into your everyday
routine
– Encourage others to do so as well

Report anything unusual
– Notify the appropriate contacts if you become
aware of a suspected security incident
In the World of the Internet, Some
of the Most Popular Features







World Wide Web
E-mail
Usenet newsgroups
Chat rooms Instant messaging
Listservs
Video-conferencing
Multiple User Dungeons (MUDs)
Where Do Intruders Come From?
Anywhere - at any time - intruders can attack, often
hiding their identity. Ironically, the Internet, which was
originally designed to promote unrestricted sharing of
academic information, has become a global
communications system where sensitive data is
potentially available to anyone with a connection.
So who are these threat agents?





Teenage pranksters
Hacker junkies
Disgruntled former employees
Terrorists or criminals
Foreign intelligence agents
The Intruders Toolkit
How easy is it to hack?
The unsophisticated hacker can search the
Internet, find and download exploitable tools,
and then "point and click" to start a hack.
According to NIST (National Institute of
Standards and Technology), hackers post 30-40
new tools to Internet hacking sites every month.
Tools Intruders Use for Access &
Exploitation of Your Computer
Vulnerability Scanning: Internet hackers constantly
scan networks to try and identify where systems are
vulnerable.
Pre-Attack Probes is another name for this type of
scanning.
Password Cracker: Intruders use a program that
automatically keeps trying to log in to a system using
a series of easily Guessed passwords, or using a
dictionary as a source of guesses.
Tools Intruders Use for Access &
Exploitation of Your Computer
Network Spoofing: Intruders set up a program that
impersonates the sign-on routine for another system.
When you attempt to log in to the system, the
intruder's program collects your password, and then
returns a message that the system is unavailable.
These programs can collect hundreds of valid
passwords.
Virus: A program that "infects" computer files, usually
executable programs, by inserting a copy of itself into
the file. Copies are usually executed when the
"infected" file is loaded into memory, allowing the virus
to infect other files.
Tools Intruders Use for Access &
Exploitation of Your Computer
Worms: An independent computer program that
reproduces by copying itself from one system to
another across a network. Often triggered when
someone opens an infected email attachment, the
worm program can send replicas to everyone listed in
the person's mail directory. Worm infections clog
network traffic and may eventually shut down email
servers and can also damage your files.
Logic bombs: A form of sabotage in which a
programmer inserts code that causes the program to
perform a destructive action when some triggering
event occurs.
Tools Intruders Use for Access &
Exploitation of Your Computer
Sniffer: A program that intercepts routed data and
examines each Packet (information is transmitted in
chunks called 'packets') in Search of specified
information such as passwords or credit card
Numbers transmitted in clear text.
Trojan horse: A Trojan horse usually masquerades as
a useful program that a user would wish to execute,
like a game or screen saver. However the program
conceals a harmful code. The Trojan horse program
may actually collect information such as passwords.
How Do You Know If Your Computer
Is Infected or Is Under Attack?
You May Experience..
 A long delay starting up your computer or decline in
system performance.
 You have corrupted, inaccessible, or missing files.
 You can't access your hard drive or data disks.
 Your computer has suddenly run out of memory.
 You have lost control of your computer.
You May See...
 a blue screen, strange items like graphics, odd
messages, unexplained files or system error
messages on your monitor.
On the other hand... you might not experience any symptoms and
be totally unaware that your machine has been compromised
The Consequences of
Letting Your Guard Down
Case Study
Dr. Porter installed a powerful new operating
system on his computer and connected it to
the Internet before applying the necessary
patches. His machine was hacked within 30
minutes. The hacker inserted software that
corrupted his hard disk. He lost years of
scientific work, his historical email archives,
and a research manuscript.
How much of his life and institutional data was on that computer?
When was the last time I backed-up my data?
The Consequences of
Letting Your Guard Down
Someone is running up your credit card account.
It's the same card you used to set up automatic
billing for that slightly questionable Internet
company.
 Where have I been on the Internet and what type of
personal information have I given out?
 Was it O.K. to give my Social Security Number and
my credit card number?
 Am I at risk for identity theft?
The Consequences of
Letting Your Guard Down
You downloaded a the latest really cool
screensaver from a random web page you came
across and later found out that simultaneously a
second devious program installed itself on
YOUR computer for the purpose of collecting
YOUR passwords.
 What have they got access to, and what have they
done?
 When and how this program get installed on my
computer?
 Will I be able to recognize what has been done?
Anyone Can Become Prey
Be aware that there are hackers out there that
don’t care who you are or what you are doing,
you are simply a target to them.
Be mindful that some people will use ploys to
lure you to their sites in order to compromise
your systems or to get credit card numbers to
steal your money.
Visiting Internet Sites
Web surfing feels both safe and anonymous.
It's not!
Be cautious, careful and aware
about installing screen savers, games, or programs from
questionable Internet sources is risky. You don't know
what software code might be hidden within them.
about providing personal, sensitive information to an
Internet site. Find out what the organization's security
and privacy policies are, they could be collecting your
information, sharing, or selling it to other sources.
Be cautious, careful and aware (continued)
 using the auto complete function on browsers
(usernames and associated passwords).
 about using public access computers. You have no
idea how they are secured, who used it before you
and what they might have done or installed on it.
 you can get viruses from Internet Relay Chat and
Instant Messenger-type services.
Be cautious, careful and aware (continued)
 active content, such as ActiveX controls and Java
applets, introduces the possibility that Web browsing
will introduce viruses or other malicious software into
the user's system.
 A variety of security risks in the PC and MAC
versions of Internet Explorer and Netscape browsers
that involve the JavaScript, Java and ActiveX
subsystems.
- These risks can be removed by turning off those
features.
Tips For Safeguarding Your
Privacy Online
Practice Heads Up Computing
Refers to an attitude you bring to
computer use.
Your Account Is Only As
Secure As It’s Password

Create passwords with nonsensical
combinations of upper and lower case letters,
numbers and symbols, for example tY8%uX.

Use the first or last letters in a favorite line of
poetry. Intermingle these letters with numbers
and punctuation marks.
"Mary had a little lamb" becomes m*ha2ll
Your Account Is Only As
Secure As Its Password

Change your password often.

Don't let others watch you log in.

Don’t print your password on a post-it note
and attach it to your video monitor. If you
must write down or record your password,
take steps to secure or disguise the
information.
Check Your Web Browsers
Settings
 We’ve come a long way from the days when
browsers hid their cookie activity and gave
users no options. Now you may accept or
reject all cookies, or you may allow only
those cookies generated by the website you
are visiting.
– Be aware that when you use cookie management
options, you might delete cookies for websites
you trust. You may want to set a security level for
trusted websites while blocking cookie activity for
all others.
Shop Around
Investigate new services before using
them.
 Post a question about a new service in a
dependable forum or newsgroup.
 Use a search engine such as
http://groups.google.com to find archived
discussions and newsgroup postings
about the service that you are
considering. Bad reputations get around
quickly in cyberspace. If others have had
negative experiences with a service, you
should get the message.
Start Up Software
Be cautious of "start-up" software that registers
you as a product user and makes an initial
connection to the service for you. Typically,
these programs require you to provide financial
account data or other personal information,
and then upload This information automatically
to the service. These programs may be able to
access records in your computer without your
knowledge.
– Contact the service for alternative
subscription methods
Public Postings
Public postings made on the Internet are often
archived and saved for posterity. It is possible to
search and discover the postings an individual has
made to Usenet newsgroups. (See
http://groups.google.com.) Ask yourself if you want
an employer, family member, or a marketer to be
able to link you to your public postings.
–Use a pseudonym and a nondescriptive e-mail
address when you participate in public forums.
–Consider obtaining an e-mail address from one of
the free web-based e-mail services.
–Create a non- identifying e-mail address and use
it when you participate in newsgroups and other
public forums.
Your online biography, if you create one, maybe
searched system-wide or remotely "fingered" by
anyone.
– If for any reason you need to safeguard your
identity, don't create an online "bio."
– Ask your ISP to remove you from its online
directory.
If you publish information on a personal web
page, note that marketers and others may
collect your address, phone number, e-mail
address and other information that you provide.
– If you are concerned about your personal privacy,
be discreet in your personal web site.
Be aware of the possible social dangers of being
online: harassment, stalking, being "flamed“
(emotional verbal attacks), or "spamming" (being
sent unsolicited messages). Women can be
vulnerable if their e-mail addresses are
recognizable as women's names.
–Consider using gender-neutral e-mail
addresses and pseudonyms.
If your children are online users,
–teach them about appropriate online privacy
behavior.
–Caution them against revealing information
about themselves and your family.
Safe Web Browsers for Family
• BOUNCE http://www.bouncefilterware.com
• KiddoNet http://www.kiddonet.com
Delete?????
The "delete" command does not make your email
messages disappear. They can still be retrieved
from back-up systems. Software utility programs
can retrieve deleted messages from your hard
drive.
– Use a file erasing program such as the freeware
program at http://cleanup.stevengould.org or the
cleanup features of general utility software such as
Norton's CleanSweep
(http://www.symantec.com/sabu/ncs/)
– Refer to the U of A Procedure, Disposal of
Computer Hard Drives at
http://security.arizona.edu/guidelinesetc.html
Use only secure web sites when you transmit
sensitive personal information over the
Internet. When you provide your credit card
account number to a shopping site, for
example, be sure that the transmission is
secure.
– Look for the locked padlock at the bottom right of
the screen.
– Also make sure the web address has the letter ‘s’
after http in the address bar at the top of the page
or “shtml” at the end of the URL. For additional
online shopping tips, read the Privacy
RightsClearinghouse’s e-commerce guide at
www.privacyrights.org/fs/fs23-shopping.htm
Privileges and Responsibilities
 Use of you U of A computer account is a
privilege granted by the University so you
can do academic work, communicate with
faculty and students, and take advantage of
both University of Arizona's online resources
and the Internet at large.
 Along with the freedom of using U of A’s
network resources come some
responsibilities.
Privilege and Responsibilities
 You are responsible to comply with University
of Arizona’s policies and State and Federal
law when using U of A’s resources.
 It is also your responsibility to read and
understand UA’s policy on Acceptable Use of
computer and network, which you can find at
http://security.arizona.edu/uaacceptableuse.html
 Many university services have their own
policies that you will be responsible for if you
are to use them, so be sure to read all
policies!
Summary
 Common sense, some simple rules and a
few pieces of technology can help protect
your computer systems from
unauthorized use
 Important to remember that by protecting
your own computer system, you're also
doing your part to protect computers
throughout the university
Resources at the
University of Arizona
 Kerio Firewall
https://sitelicense.arizona.edu/kerio/kerio.shtml
 Sophos Anti Virus
https://sitelicense.arizona.edu/sophos/sophos.html
 VPN client software
https://sitelicense.arizona.edu/vpn/vpn.shtml
 Policies, Procedures and Guidelines
http://security.arizona.edu/guidelinesetc.html
 Security Awareness
http://security.arizona.edu/awareness.html
University Information Security Office
Bob Lancaster




University Information Security Officer
Co-Director – CCIT, Telecommunications
Lancaster@arizona.edu
621-4482
Security Incident Response Team (SIRT)


sirt@arizona.edu
626-0100
Kelley Bogart



Information Security Office Coordinator
Bogartk@u.arizona.edu
626-8232
Download