Safe Computing
Tom Kelliher, CS 102
Sept. 19, 2005
PowerPoint assignment due Wednesday. E-mail attachment before class.
Quiz Friday -- ask questions Wednesday.
Read 2.6-2.10. Questions on pp. 93-94: 13, 14, 17, and 18.
PowerPoint lab.
- Introduction to safe computing.
Lab.
- Important to control our cyber-selves and secure our PCs.
- Identity theft.
- SPAM. Phishing. (See example.)
- Loss of data through hacking.
- Responsibility to secure PCs. Incrimination?
- On the horizon: RFID technology.
- History of hacking. In the beginning, hacking was a good thing.
Mentality of hackers.
- Acceptable Use Policies/Terms of Service
- No spam.
- No commercial use.
- No illegal activity.
- No excessive use of resources.
- No damage.
- Right to cut you off.
- No re-selling of service.
- Limit on number of nodes in a home network.
Goucher AUP.
- Passwords
- Never reveal.
- Choose good passwords. How to choose?
- How many to use? How often to change? Why?
- Anonymizers and throw-away e-mail addresses as tools.
- Social engineering as a hacker's tool.
- Safe computing:
- Viruses, trojans, worms; what are they?
(Come as disguised executables in e-mail, DOS attacks via ``drones,''
SQL Slammer: three minutes after release was scanning 55 million hosts
per sec. Worldwide damage within 10 minutes.)
Macro viruses, script viruses.
- Prevention: virus scanning software:
- Config to check everything.
- Auto-download updates.
- Be paranoid.
- More prevention: firewall:
- Types of protection: inbound blocking, outbound monitoring.
- Basics of networks: workstations, routers, DNS/IP, ports.
- How they work.
- Is ICF enough? Is the XP SP2 firewall (Windows Firewall)
enough?
ICF is off by default. Windows Firewall is on by default.
- Windows Security Center with SP2: Internet Options (pop-up
blocking, etc.), Automatic Updates, Windows Firewall, all in one
place. Also, check virus scanner for up-to-date signatures.
- Free firewall: Zone Alarm.
Symantec has Norton Personal Firewall.
- Even more prevention: spyware detection:
- What is it?
- Where can it be found -- KaZaA.
- Not yet well understood -- some legitimate software could be
classified as spyware.
- Free, good spyware detection packages: Ad-aware, Spybot,
Microsoft Antispyware.
Thomas P. Kelliher
2005-09-17
Tom Kelliher