Académique Documents
Professionnel Documents
Culture Documents
Std XI Chapter 8
Security Principles
During
Confidentiality
Content of the message should be accessed by Sender & Recipient
Integrity
Message/data must arrive exactly as it was sent NO modification done either accidentally or maliciously
Authentication
Receiver must be sure of the senders identity All users must have a user ID & password
Nonrepudiation
A sender must not deny having sent the message to the receiver
For security
Encryption and Decryption are used.
Destructive software
Viruses Malware Spyware Worms Browser Hijackers Spam
Viruses
Viruses
Attacks software such as O.S. application software e-mails data
Types of Viruses
Boot sector virus Macro virus E-mail virus File infector virus (.com, .exe, .sys, .ovl, .prg, .mnu)
Worms
Replicate yourself Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
Replicate yourself
No destruction
Trojan Horse
Is not self replicating main purpose is not make modifications in the target computer Requires interaction with the hacker Reveals confidential info (user ID, pwd) Allows hackers remote access to target system
Browser Hijackers
alters your browser settings redirects home page to rogue search engines With sponsored links as results (hit list) Could also direct the browser to an error page Forces hits
Spam
abuse of e-mail unsolicited mail, bulk e-mail (UBE) Commercial content Use of spam guard Spammers collect e-mail addresses from chatrooms, websites, customer lists, newsgroups, and viruses which harvest users' address books,
Antivirus
protection from virus, worm, trojan horse, malware can be purchased or downloaded
Bull Guard Dr.Web Panda Security PC Tools Protector Plus Rising ZoneAlarm
Preventive Measures
Do not open e-mail attachments Update anti-virus software regularly Delete chain letters, forward, virus alerts and junk mail When Downloading files if unsure of their authenticity, scan them first Backup regularly Do not hide file extensions
Preventive Measures
Do not download files from strangers If you have to then download to a removable disk and scan with antivirus Protect using Internet firewall
To Turn on Firewall
Click start Control Panel Security Center Windows firewall
Lab Exercise
Find names of Trojan Horses Find names of Viruses Find names of Worms Find details of Malware Find details of spyware Find names of Browser Hijackers Anti Virus scanning procedure details