1 00:00:00,460 --> 00:00:06,720 The next myth no one would want to attack your system. 2 00:00:06,770 --> 00:00:09,130 It's hard to determine the origin of this myth. 3 00:00:09,890 --> 00:00:15,950 In all probability you're letting a real world experience influence your perception a virtual security 4 00:00:18,130 --> 00:00:21,310 you know that there are some districts who can walk safely through at night. 5 00:00:22,090 --> 00:00:26,450 And you assume that your business computer network is very much like this safe well-lit area. 6 00:00:28,220 --> 00:00:34,870 You don't have any low lives living in it and everything has always been all right geographical distance 7 00:00:34,870 --> 00:00:36,840 is not a factor in the internet though. 8 00:00:39,340 --> 00:00:43,780 Even if your neighborhood seems to live far from any threat it doesn't mean it'll be so in the next 9 00:00:43,780 --> 00:00:44,750 10 seconds. 10 00:00:46,300 --> 00:00:49,510 Ten seconds is a long time in the virtual computer systems world. 11 00:00:50,890 --> 00:00:54,780 Where there are no boundaries or distance your neighbors can change very quickly. 12 00:00:55,900 --> 00:01:01,640 Computer systems can be targeted with a number of different attack techniques. 13 00:01:01,730 --> 00:01:08,340 The less sophisticated types of attacks are launched by so-called script kids people who rely on resources 14 00:01:08,340 --> 00:01:10,260 found on the internet for their exploits 15 00:01:13,270 --> 00:01:18,330 they launch codes and tools developed by other people to have fun watching the results of their juvenile 16 00:01:18,330 --> 00:01:19,120 actions. 17 00:01:22,260 --> 00:01:27,530 These results could include computer hangs and gaining connection or control over targeted computers. 18 00:01:29,400 --> 00:01:31,710 This is however only a small chunk of threats 19 00:01:34,530 --> 00:01:37,610 script kids attacked blindly. 20 00:01:37,640 --> 00:01:39,910 If you're done name has a popular name. 21 00:01:40,130 --> 00:01:42,170 It's enough to make you a potential target. 22 00:01:43,360 --> 00:01:50,510 Attacks that are targeted at specific systems are a much more serious threat if you consider your network 23 00:01:50,510 --> 00:01:52,580 resources less valuable. 24 00:01:52,640 --> 00:01:59,230 You probably won't be a direct target for big criminal groups targeted intrusions use computer systems 25 00:01:59,250 --> 00:02:04,890 indirectly zombie networks or bot nets to avoid detection and further exploits. 26 00:02:06,580 --> 00:02:08,730 This is a concern for all computers. 27 00:02:10,030 --> 00:02:14,950 If your device is connected to the Internet there's a possibility it will become a zombie computer. 28 00:02:16,080 --> 00:02:19,610 You won't be attacked because someone is itching to see your holiday photos. 29 00:02:20,720 --> 00:02:25,310 You'll be attacked because your neutral computer can be used to send information or launch an attack 30 00:02:25,310 --> 00:02:26,800 on a specific target. 31 00:02:29,170 --> 00:02:33,030 There's always a risk that a spammer or attacker will want to exploit your system. 32 00:02:35,780 --> 00:02:42,180 Another mis it's possible to successfully protect users from malicious and unwanted software 33 00:02:44,860 --> 00:02:49,930 computer system administrators should set up a system in a way that protects users from running unwanted 34 00:02:49,930 --> 00:02:53,370 software. 35 00:02:53,370 --> 00:02:54,830 How can this be achieved. 36 00:02:55,990 --> 00:02:58,890 You can only protect users through anti-virus software. 37 00:03:00,070 --> 00:03:06,110 The drawback is that any viruses only detect a small portion of threats. 38 00:03:06,140 --> 00:03:11,510 There's still a high risk that an unaware user will launch on his computer a malware file compiled for 39 00:03:11,510 --> 00:03:14,750 specific needs. 40 00:03:14,770 --> 00:03:19,470 This doesn't require knowing how to use an assembler or 16 years of coding experience. 41 00:03:22,710 --> 00:03:28,100 All you need for this is to read a few articles on the Internet and choose a pre-made tool. 42 00:03:28,250 --> 00:03:35,500 If administrators restrict security wise and blocked access to all software this would essentially replicate 43 00:03:35,500 --> 00:03:39,690 the scenario from the first Miss. 44 00:03:39,710 --> 00:03:46,560 The system would be more secure but would also be less functional and you can't afford to decline the 45 00:03:46,560 --> 00:03:47,430 functionality 46 00:03:51,110 --> 00:03:57,820 firewalls protect computers from all remote attacks is another of our myths. 47 00:03:57,860 --> 00:04:00,800 You can see in the bottom part of the slide how a firewall looks. 48 00:04:00,800 --> 00:04:08,660 From the standpoint of your computer system the picture shows names of protocols and the wrongs we are 49 00:04:08,660 --> 00:04:11,850 interested in two of them. 50 00:04:11,930 --> 00:04:19,640 The first from the bottom is you BP abbreviated from Universal firewall bypass protocol which is slang 51 00:04:19,640 --> 00:04:26,170 for HTP the HGJ protocol has a secure variance as well. 52 00:04:27,320 --> 00:04:33,410 TTP is also known as TTP secure. 53 00:04:33,440 --> 00:04:35,880 Why are they represented in this way in the picture. 54 00:04:37,970 --> 00:04:44,660 The majority of firewalls filter traffic based on port numbers or sessions and both methods are completely 55 00:04:44,660 --> 00:04:45,680 ineffective. 56 00:04:46,810 --> 00:04:56,140 It's easy to set up protocols other than HTP through port 80 or peer to peer applications do it. 57 00:04:56,150 --> 00:05:06,620 That's why port 80 is open by default on firewalls port 443 a secure version of port 80 is a curiosity. 58 00:05:06,670 --> 00:05:11,350 It allows you to pass all sorts of data through firewalls. 59 00:05:11,360 --> 00:05:17,300 This works both ways as will discover in following modules and also disables the monitoring of traffic 60 00:05:20,950 --> 00:05:24,750 administrators won't pay any attention to it because the data will be encrypted. 61 00:05:24,910 --> 00:05:32,250 And as a result unreadable the data will all look the same whether it's encrypted credentials of lawful 62 00:05:32,250 --> 00:05:39,670 users who visit a bank page or if it's a remotely downloaded customer database Farwell's have long ceased 63 00:05:39,670 --> 00:05:42,870 to be an effective protection measure against remote attacks. 64 00:05:45,540 --> 00:05:46,390 They're still important. 65 00:05:46,390 --> 00:05:50,480 However although they can't fully be relied upon. 66 00:05:50,680 --> 00:05:52,830 They still play their part in the protection scheme.