Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

Practice Work - English III - Security Systems

Hackers - Virus - Antivirus - Advices
by

Andres Cappiello

on 28 January 2015

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Practice Work - English III - Security Systems

[ HACKERS ]
Hacker is a term used by some to mean "a clever programmer" and by others, especially those in popular media, to mean "someone who tries to break into computer systems."
Classification:

Those  who debug or fix security problems.
They had ethical procedures which guarantees to assure and to protect the Information Systems
This use people are used to work for enterprises to find the security failures.
They are also called Tiger Team
Black Hats:
They are also known as CRACKERS
This people shows their informatics’ skills breaking the computer security system, crashing servers, entering to restricted zones, infecting networks or taking power of them.
All of this using their hacking knowledge.
Other Classifications:

Is someone who was contract to investigate the security failures
who is contemplated by the law
They make the rules that others have follow to know about the net security systems
[ HACKERS ]
Definition:
Definition:
Classification:
White Hats:
[ VIRUSES ]
A typical case:
AUTORUN.INF File

[ VIRUSES ]
TWO EXAMPLES ABOUT WHAT NOT TO DO!
TWO EXAMPLES ABOUT WHAT NOT TO DO!
NEVER!!!!
NEVER!!!!
Samurais:
Phreakers:
Their name comes from (Phone Freak)
This people has several knowledge on modular phone as well on mobil
e
ones.
Other Classifications:
Heroes or Criminals???
Heroes or Criminals???
Time to Fight
Time to Fight
Black Hats:
Grey Hats:
Individuals who work both offensively and defensively at various times
Suicide Hat:
Individuals who will aim to bring down critical infraestructure for a "cause" and not worry about facing 30 years in jail for their actions
Grey Hats:
Suicide Hat:
HOW TO HACK ??
1.Get to enter the system that we have pointed as a target.
2.Once you get to access , obtain root privileges
3.Clean all the traces. 
4.Install a Sniffer to get other people logins
HOW TO HACK ??
Techniques:
Packet Sniffers:
Those are programs which can intercept the network traffic.
This kind of programs could be connected to a workstation but also on a router or an Internet Gateway.
It captures login ID’s and user’s passwords, which travels without encryption, and copies credit cards’ numbers
Techniques:
Techniques:
Techniques:
Downloading:
Besides intercepting the network traffic the attacker obtains documents, e-mail messages and other stored information, with the particular aspect that he download all the data in to his own pc.
It’s also committed to spy, and to steal information.

This kind of attacks deactivate or saturate the whole system resources.
It can consume all the memory, or free disk available.
Many ISP’s have been temporary knocked-down, by attacking that explode the TCP protocol.
He saturates all the system with messages that wants to establish a connection.
This message sends a lot of false IP address.
The system answer the call but it don’t have a request so it left all the connections open, and don’t giving response to the real ones.
Jamming:
Jamming:
What is an Antivirus?
Technically a user can’t detect the presence of a spyware until and unless he/she feels that his/her computer is being compromised. Corporate heads and some office heads recommend for spywares like the keyloggers come pre-installed in computers so as to keep a track on the data being used by their employees. Spywares not just do the simple monitoring stuff but it may spy on the very personal and private information of the user like his bank and credit card details etc.
WARNINGS
AND
ADVICES
AntiViruses, AntySpyware & Firewalls :
The cavalry has finally arrived
AntiViruses, AntySpyware & Firewalls :
The cavalry has finally arrived
AUTORUN.INF Viruses are virus that uses the Autorun feature of Windows to spread itself on computers. This virus makes a copy of the autorun.inf file to the root or main directory of all the drives on your PC, internal and / or external disks, to make the virus runs every time the external disks like pendrives or USB drives were inserted or every time you double-click the drives through the Windows Explorer.
AUTORUN.INF Viruses are virus that uses the Autorun feature of Windows to spread itself on computers. This virus makes a copy of the autorun.inf file to the root or main directory of all the drives on your PC, internal and / or external disks, to make the virus runs every time the external disks like pendrives or USB drives were inserted or every time you double-click the drives through the Windows Explorer.
Removing AUTORUN.INF virus manually
Actually this kind of infection is very easy to remove. Simple DOS commands can easily remove this kind of infection.

1. First, boot your system in Safe Mode Command Prompt Only. This can be done by restarting your computer and pressing F8 before the Windows Logo displays. It is important that you start the computer in this mode because all start-up programs are not started on this mode.
2. When you see the black and white environment, type the following commands (commands in BOLD). This commands will be used for analysis of the infection only:TYPE AUTORUN.INF – This shows the content of the file autorun.inf. From the picture below you will see that the name of the virus is SAMPLE-VIRUS.EXE, which the name will usually comes with the line Open or Explore or Shell line of the autorun.inf. This shows that the virus carrier is the file SAMPLE-VIRUS.EXE
3. To remove the infection based on the analysis above type the following command:
ATTRIB -H -R -S C:AUTORUN.INF – unhides the hidden file autorun.inf
DEL C:AUTORUN.INF
Repeat this step to other drives by replacing C: with other letters
@ny Que5t10n?
A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer.
A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program but whose real purpose is, for example, to grant a hacker unauthorized access to a computer.


Use of the machine as part of a botnet (e.g. to perform automated spamming or to distribute Denial-of-service attacks)
Electronic money theft
Data theft (e.g. retrieving passwords or credit card information)
Installation of software
Downloading or uploading of files on the user's computer
Modification or deletion of files
Keystroke logging
Watching the user's screen
Crashing the computer
Anonymizing internet viewing
Operations that could be performed by a hacker on a targeted computer system may include:
To make sure that the carrier will not run during start-up, you need to make sure that it is disabled. Do this using the MSCONFIG tool of windows.
On the same Safemode Command Prompt Mode, type MSCONFIG
This will run the System Configuration Utility. Uncheck the suspicious files. This will disable it from start-up and will not run again.
To make sure that the carrier will not run during start-up, you need to make sure that it is disabled. Do this using the MSCONFIG tool of windows.
On the same Safemode Command Prompt Mode, type MSCONFIG
This will run the System Configuration Utility. Uncheck the suspicious files. This will disable it from start-up and will not run again.
If you can't delete your virus, manually or by a software, try to boot an Operative System from another partition, fixed or removable disk, or just burn a LiveCD.
The Secret:
Another OS won't detect the .EXE &
.INF files as runneables, so you can
erase them safely.
In this case, Linux shows you
the files infected, you just have to
press Delete Key to remove.
We recommend this behaviour before
opening removable disks
Update your Antivirus Database:...
...Maybe tomorrow will be late
Be carefull with all the P2P programs
Most of the shared files are infected:
Movies, MP3 files, pictures, ZIP files
Sometimes you download .exe's files an execute them thinking they're safe, but they aren't.
When you open the file and realize that it didn't do anything you'll know that you're in a big trouble.
A Worm is a standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer.
Robert Morris: The father of the Worms
Robert Morris: The father of the Worms
Morris created this kind of virus in 1998 when he was a student at the Cornell University. According to him, the original purpouse was to measure the Internet size. So he sent the worm from the MIT throught ARPANET, which was the previous version of Internet.
November 2nd is a well-know day on the Network History. At 6 o'clock the virus was released. "Black Thursday" they called to that day. The worm was spread all over the net. The NASA, the Pentagon, Stanford, Berkley and Princeton Universities was infected. Even the MILNET (Military Network).
Many administrators disconnected all their equipments. After a few days researchers could get to isolate the worm. Analizing its code they could create a "vaccine". The worm had got two specific tasks: If the machine wasn't infected, then operate its code, but if the equipment already has the virus, it will infected too. The damages were up to 53000 U$s. Robert Morris was tried and convicted for commit Computer Fraud and Abuse Act. Morris. After appeals he was sentenced to three years probation, 400 hours of community service, and a fine of $10,000
Morris created this kind of virus in 1998 when he was a student at the Cornell University. According to him, the original purpouse was to measure the Internet size. So he sent the worm from the MIT throught ARPANET, which was the previous version of Internet.
November 2nd is a well-know day on the Network History. At 6 o'clock the virus was released. "Black Thursday" they called to that day. The worm was spread all over the net. The NASA, the Pentagon, Stanford, Berkley and Princeton Universities was infected. Even the MILNET (Military Network).
Many administrators disconnected all their equipments. After a few days researchers could get to isolate the worm. Analizing its code they could create a "vaccine". The worm had got two specific tasks: If the machine wasn't infected, then operate its code, but if the equipment already has the virus, it will infected too. The damages were up to 53000 U$s. Robert Morris was tried and convicted for commit Computer Fraud and Abuse Act. Morris. After appeals he was sentenced to three years probation, 400 hours of community service, and a fine of $10,000
A computer virus is a computer program that can replicate itself and spread from one computer to another.
Main behaviour:
*An infected program is executed behind another so the user don't know it.
*The virus code stays in the RAM Memory even the program that has it loaded have finished.
*The virus takes control of the basic services of the system
infecting after that, .exe, .com, .scr files that were called
for their execution.
*Finally the code was appended to the infected program
and saved it on the hard disk

Now, the process is complete.
Thanks for Listen!
Technically a user can’t detect the presence of a spyware until and unless he/she feels that his/her computer is being compromised. Corporate heads and some office heads recommend for spywares like the keyloggers come pre-installed in computers so as to keep a track on the data being used by their employees. Spywares not just do the simple monitoring stuff but it may spy on the very personal and private information of the user like his bank and credit card details etc.
Antivirus or anti-virus software is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, adware, backdoors, malicious BHOs, dialers, fraudtools, hijackers, keyloggers, malicious LSPs, rootkits, spyware, trojan horses and worms. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods.
Antivirus or anti-virus software is software used to prevent, detect and remove malware (of all descriptions), such as: computer viruses, adware, backdoors, malicious BHOs, dialers, fraudtools, hijackers, keyloggers, malicious LSPs, rootkits, spyware, trojan horses and worms. Computer security, including protection from social engineering techniques, is commonly offered in products and services of antivirus software companies. This page discusses the software used for the prevention and removal of malware threats, rather than computer security implemented by software methods.
The Most Wanted:
The Most Wanted:
2011 Statistics:
2011 Statistics:
What is a Firewall
Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions
Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network's firewall builds a bridge between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted.
Many personal computer operating systems include software-based firewalls to protect against threats from the public Internet. Many routers that pass data between networks contain firewall components and, conversely, many firewalls can perform basic routing functions
Full transcript