Introduction to Computer Science
This material covers essential aspects of computer science security and privacy, including cybercrime, cybersecurity, malware, social engineering, and methods for protection against cyberattacks. Explore common IT security concerns, methods of attack, malware types, wireless device security, EHR concerns, security safeguards for health applications, and ethical online behavior. Learn about hackers' methods such as packet sniffers and software attacks, and understand the risks associated with malware. Discover preventive measures and tools to enhance cybersecurity.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Introduction to Computer Science Security and Privacy Lecture b This material (Comp 4 Unit 7) was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0
Security and Privacy Learning Objectives - 1 Define cybercrime and cybersecurity (Lecture a) List common information technology (IT) security and privacy concerns (Lecture a) List hardware components that are usually attacked by the hackers (Lecture a) Explain some of the common methods of attack (Lecture b) 2
Security and Privacy Learning Objectives - 2 Describe common types of malware (Lecture b) Explain social engineering methods used by cybercriminals (Lecture b) Describe methods and tools available for protection against cyberattacks (Lecture c) Describe practices designed to minimize the risk of successful cyberattack (Lecture d) 3
Security and Privacy Learning Objectives - 3 Address specifics of wireless device security (Lecture d) Explain security and privacy concerns associated with EHRs (Lecture e) Describe security safeguards used for health care applications (Lecture e) Provide the basics of ethical behavior online (Lecture e) 4
Some of the Hackers Methods Packet sniffers can intercept Internet traffic Internet traffic consists of data packets , which can be sniffed Usernames, passwords, sensitive information Software attacks e.g. Trojans, Viruses, Worms, Rootkits Guess at usernames and passwords Social Engineering Phishing, hoaxes 5
Malware - 1 Malware, short for malicious software, is any software used to disrupt computer operations, gather sensitive information, gain access to private computer systems, or display unwanted advertising (Wikipedia, 2016) 6
Malware - 2 Types of malware include: Trojan Horses Viruses Macro Viruses Worms Rootkits Adware Spyware Ransomware Scareware 7
Trojan Horse - 1 Name comes from the analogy with the Trojan Horse from Greek mythology Malware program that is usually disguised as useful and harmless software User tricked into installing it Misleading description or ad Trojan is injected into otherwise legitimate software 8
Trojan Horse - 2 Trojan Horse can Have an immediate or delayed effect Destroy and/or steal sensitive data Install other unwanted software Display unsolicited advertisements Transmit passwords, key strokes, etc. back to the attacker. 9
Viruses - 1 A program that, when executed, replicates itself into Other computer programs Operating system files Data files Boot sector of the hard drive Attached drive (external HDD, flash drive, etc.) 10
Viruses - 2 Computer can get infected with a virus from: Another computer in the same network Infected external drive Email attachment 11
Viruses - 3 A virus can Reformat your hard drive Corrupt data Access private information Spam your contacts Log your keystrokes Consume infected computer s resources: CPU time or hard disk space 12
Viruses - 4 A virus can Display advertisement and redirect web browsers In extreme cases, render the computer useless Majority of viruses target computers running Microsoft Windows Removal may involve formatting the hard disk and reinstalling the operating system or restoring from a virus-free backup 13
Macro Viruses - 1 Macro language is a special-purpose command language used to automate sequences within an application such as a spreadsheet or word processor www.yourdictionary.com Microsoft Office applications commonly use macros written in the Visual Basic for Applications (VBA) macro language 14
Macro Viruses - 2 Macro viruses target Microsoft Office applications Written in a macro language such as VBA (Visual Basic for Applications) Take advantage of MS Office applications allowing for macro programs to be embedded in documents, spreadsheets, or even email Activated when user opens a file in which the macro virus resides Don t even click on email from unknown sender 15
Worms Standalone malware program Uses a computer network to propagate Install a backdoor on the computer making it a bot computer under full control of a hacker o Networks of bots referred to as botnets o Commonly used for sending junk email or attacking other computers or websites May cause significant harm to a network by consuming bandwidth 16
Backdoor Example (Turkcebilgi, n.d., GNU FDL) 17
Rootkits - 1 Malware that actively conceals its actions and presence Concealment occurs through: Removing evidence of original attack and activity that led to rootkit installation Gaining control of the system Installing additional malicious tools to widen scope of the attack Hiding files, processes, network connections 18
Rootkits - 2 Removal Can be complicated May require o Reformatting the hard drive o Reinstalling the operating system o Reinstalling all application software 19
Adware - 1 Downloads and displays unsolicited ads Redirects searches to certain advertising websites Collects information used for targeted marketing without the user's knowledge Types and frequency of websites user visits User s web searches Usually downloaded and installed without user s knowledge 20
Adware - 2 Computer can get infected by: Visiting an infected website Adware embedded in legitimate applications Hacker technologies Adware that operates without user s consent is considered malicious 21
Spyware - 1 Covertly collects information and transmits. Common targets: User logins (usernames, passwords) Bank or credit account information Email contacts and addresses Keystrokes (also called keylogger) User s surfing habits 22
Spyware - 2 Can assert control over a computer Change computer and software settings Install additional software Can result in Slow Internet connection speed Unusual web browser behavior 23
Ransomware - 1 Restricts access to files by: Locking the system Encryption Attacker demands payment to remove the restriction User may have to reformat the hard drive and reinstall the operating system and application software 24
Ransomware - 2 Some ransomware displays fake warnings from law enforcement claiming: Computer has been used for illegal activity Stores inappropriate material, such as pornography Runs a non-genuine version of Microsoft Windows 25
Scareware Pop-up messages claiming computer is infected The pop-ups cannot be closed In some cases scareware makes computer files inaccessible Manipulates users to purchase fake security software frequently malware (FBI, 2011, PD-US) 26
Personal Information Attacks - 1 Phishing fishing for sensitive information Attempt to trick user into revealing personal information Typical phishing email appears asking to login for verification purposes do NOT respond Email link brings user to site that looks like real web site of impersonated institution Remember: no reputable organization will ever ask you to verify your log in credentials 27
Personal Information Attacks - 2 Immediately report the phishing attempt to the organization being impersonated Some email programs move suspicious email to a quarantined Junk folder Removing email from the Junk folder also takes it out of quarantine 28
False Information - 1 Hoax Attempt to convince user of something false Usually come in form of an email o IRS official notice o Request to send money to facilitate inheritance processing o Request contributions Exercise common sense Search for email s text, include the word hoax 29
False Information - 2 Uncloak a hoax Use trusted Internet sites to detect hoaxes o Snopes.com - http://www.snopes.com/ o Urban Legends Online - http://urbanlegendsonline.com/ Never forward email chains without verifying their source 30
Security and Privacy Summary Lecture b Explored some of the common methods of attack used by computer hackers Described common types of malware Explained some of the social engineering methods used by cybercriminals 31
Security and Privacy References Lecture b References Macro language - computer definition. (n.d.). Retrieved July 10, 2016, from http://www.yourdictionary.com/macro-language Malware. (n.d.). In Wikipedia. Retrieved July 10, 2016, from https://en.wikipedia.org/wiki/Malware Images Slide 17: Screenshot of Beast 2.07 malware. (n.d.). Turkcebilgi. Retrieved from https://www.turkcebilgi.com/k t c l_yaz l m_(malware) [Turkish]. This file is licensed through the GNU Free Documentation License. Slide 26: Scareware image. (2011, June 22). In Scareware Distributors Targeted. Federal Bureau of Investigation. Retrieved April 18, 2016, from https://www.fbi.gov/news/stories/scareware-distributors-targeted. 32
Introduction to Computer Science Security and Privacy Lecture b This material was developed by Oregon Health & Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number 90WT0001. 33