Safe Computing
Tom Kelliher, CS 102
Feb. 9, 2004
PowerPoint assignment due Friday. E-mail attachment before class.
Read 2.6--2.10. Questions on pp. 93--94: 13, 14, 17, and 18.
PowerPoint lab.
- Introduction to safe computing.
Lab.
- Important to control our cyber-selves and secure our PCs.
- Identity theft.
- SPAM.
- Loss of data through hacking.
- Responsibility to secure PCs. Incrimination?
- On the horizon: RFID technology.
- History of hacking. In the beginning, hacking was a good thing.
Mentality of hackers.
- Acceptable Use Policies/Terms of Service
- No spam.
- No commercial use.
- No illegal activity.
- No excessive use of resources.
- No damage.
- Right to cut you off.
- No re-selling of service.
- Limit on number of nodes in a home network.
Goucher AUP.
- Passwords
- Never reveal.
- Choose good passwords. How to choose?
- How many to use? How often to change? Why?
- Anonymizers and throw-away e-mail addresses as tools.
- Social engineering as a hacker's tool.
- Safe computing:
- Viruses, trojans, worms; what are they?
(Come as disguised executables in e-mail, DOS attacks via ``drones,''
SQL Slammer: three minutes after release was scanning 55 million hosts
per sec. Worldwide damage within 10 minutes.)
Macro viruses, script viruses.
- Prevention: virus scanning software:
- Config to check everything.
- Auto-download updates.
- Be paranoid.
- More prevention: firewall:
- Types of protection: inbound blocking, outbound monitoring.
- Basics of networks: workstations, routers, DNS/IP, ports.
- How they work.
- Spyware. In KaZaA.
Spyware is not well understood.
- Is ICF enough?
- Free firewall: Zone Alarm.
Symantec has Norton Personal Firewall.
Thomas P. Kelliher
Sat Feb 7 15:19:22 EST 2004
Tom Kelliher