1 of 10

Slide Notes

DownloadGo Live

Computer Security: Firewalls

Published on Nov 24, 2015

Denise Welch Computer Security Presentation - Discussion Board Week 2

PRESENTATION OUTLINE

Computer Security: Firewalls

Denise Welch
Photo by Mourner

Overview of Internet Threats

  • Many threat types
  • Theft: identity, files, login information, money, account information - keyloggers, spyware, phishing, trojans
  • Proxy Infection / Bot: cause computer to execute code which may be damaging to host computer or others - botnet, DDOS, trojan

Overview of Internet Threats

  • Scareware: trick user into purchasing items otherwise unwanted or unneeded - spyware, adware, rootkit, spam, rogue security software
  • Other: mousetrapping (preventing user from leaving website), SQL injection (hacks into websites), dropper (can lead to proxy infection or botnet)
Photo by .hj barraza

Cost of Internet Crime

  • 2005 to 2007: 215 million records compromised with $197 cost per document loss
  • US has most fraudulent sites in world, with 25% of all known sites
  • Phishing cost $3.2 billion in 2007

Cost of Internet Crime

  • Average annualized cost of cyber crime is approximately $12.7M today
  • Time required to address and fix problems increased 33% year-on-year
  • Over 50% of crimes related to denial of service, malicious insiders, or malicious code downloads
Photo by HckySo

What are Firewalls?

  • Designed to reduce unauthorized access to files
  • Filters incoming data and searches for malicioius code, applications
  • Can reduce likelihood of virus infection, can't prevent it; antivirus software is recommended in addition to firewalls
  • Hardware and software options
Photo by silverfuture

How Firewalls Work: Methods

  • Packet Filtering: Compares packets of incoming data against security rules
  • Stateful Inspection: Inspects portions of incoming packets for malicious content
  • Proxy Service: No direct contact between computer of interest and websites, hides/disguises where client sends requests from

Hardware Firewalls

  • Infrastructure to intercept internet traffic; e.g., routers
  • "Physical" barrier to malware, phishing by preventing traffic from certain domains
  • Host computer does not "see" blocked sites or packets, and is protected

Software Firewalls

  • Installed on host computer
  • Investigates packets from internet and blocks threats
  • Blocks programs or local installations from downloading and installing software or information without user knowledge

Bibliography (See Notes)

  • Computer Security
  • Top 10 Internet Threats
  • 28 Types of Computer Security Threats and Risks
  • HP Security Memo
  • What is a Firewall
  • Security Awareness
  • What you should know about firewalls
1. "Computer Security." Encyclopedia of Management. 2009. Retrieved September 05, 2015 from Encyclopedia.com: http://www.encyclopedia.com/doc/1G2-3273100049.html
2. "Top 10 Internet Threats." Norman A.S. Retrieved September 05, 2015 from http://www.norman.com/home_and_small_office/security_center/internet_securi...
3. "28 Types of Computer Security Threats and Risks." ITS Security Column, MMInc Digital LLC. 2015. Retrieved September 05, 2015 from http://www.itscolumn.com/2012/03/28-types-of-computer-security-threats-and-...
4. Rawlinson, Kristi. "Annual Study Reveals Average Cost of Cyber Crime Escalates 96 Percent to $12.7 Million per Organization." HP Computers Electronic Press Release. October 15, 2014. Retrieved September 05, 2015 from http://www8.hp.com/us/en/hp-news/press-release.html?id=1815969#.VezAqflViko
5. “What is a Firewall?” Indiana University. 2015. Retrieved September 05, 2015 from https://kb.iu.edu/d/aoru
6. “Security Awareness.” Information Technology Services at the University of Texas at Austin. October 5, 2010. Retrieved September 05, 2015 from http://www.utexas.edu/its/secure/articles/firewalls.php
7. Desmond, Michael. “What you should know about firewalls.” PC World. November 25, 2004. Retrieved September 05, 2015 from http://www.pcworld.com/article/117557/article.html