Sei sulla pagina 1di 54

4.

lecture
Technical informatics

Last lecture
Operating systems
History development, task, versions
Mobile OS

Info-communication
Solutions
Applications

Outline

System sw, applications, utilities


Virus/malware protection
Firewalls
Encryption and e-signs
Archivers
Office applications
LibreOffice
PDF

Software types
System sw: operating software
Application software
For a particular area, task

Utility programs
Secure operation
Additional help for the user

Computer security
Before 1980
No network
Computers operated by experts

After 1990
Computers on networks
Not only expert users

After 2005
Every device is connected
Wide range of users/applications

Damage
Why do they attack?
Data
Passwords, codes (phishing)
Resource

EU: over 22 billion /year


Hacker Cracker, Government

Viruses
Computer viruses are programs
deliberately designed to interfere
with computer operation, record,
corrupt, or delete data, or spread
themselves to other computers
and throughout the Internet, often
slowing things down and causing
other problems in the process.

Worms
A worm is a specific type of
virus that propagates itself
across many computers,
usually by creating copies of
itself in each computers
memory.

Trojans
A Trojan Horse, similar to its Greek
mythological counterpart, often
presents itself as one form while it
is actually another.

Spywares
Spyware refers to software that
performs certain tasks on the
computer, typically without the
users consent. This may include
giving advertising or collecting
personal information (e.g.
passwords) about the user.

Malware

Other unwanted
applications
Adware (<>spyware)
Financing software
Uncareful installing
Java and the ask toolbar
Zonealarm and the Firefox browser

Botnet - zombies
DoS Denial of Service, DDoS
Distributed DoS
Infection and sending SPAMs within
seconds
Difficult identification (detecting
origin IP)
Unequal computer security (by
government)
Mobile phone botnet

SPAM
Unsolicited, unwanted, irrelevant or
inappropriate messages, especially
for commercial advertising in mass
quantities (junk mail)
50-90% of emails
2005: 50+ billion USD
Protection/filtering
By the service provider
At home

Phishing
Acquiring sensitive information
(passwords, credit card numbers etc.)
Fake web sites (e.g. PayPal)
VoIP phishing
How to protect?
Reporting phising
Browser settings
Cautious behaviour

How can our computer be


infected?
WEB
E-mail
Copying data
CD-ROM, Pen-drive

How to protect?
Virusbuster, antispyware
Software updates (SP, patches)
Software settings (e.g. mails,
browsers)
Firewall
Passwords
Alternative methods

Back-up!

Antivirus software
Utility program, runs in the background
Shield

Parameters
Virus-library, clearing rate, reaction speed,
platform dependency, heuristic search,
price, trial version

NOD32 (ESET), VirusBuster, Norton


Antivirus (Symantec), Virusscan (McAfee)

Antivirus functions I.
(example)

Integrated control panel


Virus and spyware protection
Firewall
SPAM filter
Botnet protection
Memory protecion
Exploit blocking
Social media scanner

Antivirus functions II.


(example)

Steel protection
Phising protection
Idle scanning
Energy saving mode
Cloud-based protection
Protecting external drives
Parental surveillance

Antispyware
Recognizing and destroying
spyware
Ad-Aware (Lavasoft), Spykiller
(TrustSoft), McAffee
Antispyware
MS AntiSpyware
Windows Defender (Vista)

Firewalls
A firewall is a program or
hardware device that filters the
information coming through the
Internet connection into private
network or computer system .
Software/hardware firewalls

Firewall

Firewall settings

Firewall messages

Windows (7) protection

Mobile security
Viruses
Cabir bluetooth
Smart phones

Phising
Licenses, regulations; iPhone
jailbreak
No efficient antivirus software

Mobile platform security


Open/closed application, platform
and hardware
Level of platform fragmentation
What is modified by Android
supplier?

Blackberry
40% of financing service poviders use
Blacberry
Server at RIM
Data encryption on the device
Direct connection between group
members
Fast messaging
Exception: governmental control (e.g.
counterterrorist activities)

Encryption
Encryption is a mathematical
process that modifies information
in a way that makes it
unreadable until the exact same
process is reversed.
Algorithm (cipher) + key
Encrypted data storage
EFS (NTFS)
TrueCrypt, BitLocker

Encryption methods
Symmetric key
Advantage: simple, fast
Shortcoming: shared secret key

Asymmetric key
Public key, private key
Safe but slow

Combination of symmetric and


asymetric methods (pl. SSL, SSH)

SSL
Secure Socket Layer
Safe transfer protocol
Communication between
webservers and clients
Supported by the new web-based
mail systems, in order to keep ebusiness safe; https://...
Communication channel
encryption, not verification

E-sign
Verification not encryption:
Signing the documents/data with
a digital signature assures that it
comes from the sender and hasn't
been altered or corrupted since it
was created and signed.

Browser/mail client security


settings

Compression and archiver


utilities
Reducing the number of bits for
storing data
Lossy data compression
Images, video

Lossless data compression


Pl. text

DOS: arj, rar


Windows: winzip, winrar

OFFICE
Office applications for Windows
(even for Windows Phone and 8)
and Mac OS
MS versions: standard, home,
student, professional etc.

Office desktop applications


Word, Excel, PowerPoint, Outlook, Access

Microsoft Access database manager


Microsoft InfoPath an application to design rich XML-based forms
Microsoft OneNote note-taking software for use with both tablet and conventional PCs
Microsoft Project project management software to keep track of events and to create
network charts and Gantt charts (not bundled in any Office suite)
Microsoft Publisher desktop publishing software mostly used for designing brochures,
labels, calendars, greeting cards, business cards, newsletters, and postcards.
Microsoft SharePoint Workspace (formerly known as Groove) a proprietary peer-topeer collaboration software leveled at businesses
Microsoft Visio diagram and flowcharting software (not bundled in any Office suite)
Microsoft Office InterConnect business-relationship database available only in Japan
Microsoft Office Picture Manager basic photo management software (similar to
Google's Picasa or Adobe's Photoshop Elements), replaced Microsoft Photo Editor

Office environment

Office 2010
Environment
32/64 bit versions (add-ons!)
Web Apps
Multiuser mode: multiple users working
on the same documents
www.live.com

Multimedia support in powerpoint,


links from web

Office365
Monthly subscription, continuous network
connection
All MS Office applications, always updated
5 computers (Windows and Mac) + 5
(Windows OS) tablet/smart phone
Storage on OneDrive, synchronized devices
Win 7 and Mac OS X 10.6 and newer versions
Premium version
1TB storage space/user
60 international Skype minutes

Google docs, spreadsheet


Drive (2012 April), 15GB (100GB/$5), HTML, PDF,
TXT etc.

LibreOffice
www.libreoffice.org:
LibreOffice is the power-packed free, libre and
open source personal productivity suite for
Windows, Macintosh and GNU/Linux, that
gives you six feature-rich applications for all
your document production and data
processing needs: Writer, Calc, Impress, Draw,
Math and Base.Support and documentation is
free from our large, dedicated community of
users, contributors and developers.

LibreOffice applications

Writer
Calc
Impress
Draw
Math
Base

Advantages - shortcomings
Free, multiplatform, multilingual
Reliable
OpenOffice
LibreOffice v4.4.1

Standardized software package


Environment, databases
Market penetration

LibreOffice environment

PDF (Portable Document Format)


Adobe
Recent version: Adobe Acrobat XI
Acrobat for mobile platforms
Different solutions (standard/pro)
Adobe Creative Cloud
Main features

Convert PDFs to other formats


Edit PDF documents
Create and analyze forms
Create PDF files
Merge and combine files
Simplify reviews and approvals
Protect PDF files
Prepare files consistently
Work with new cloud services

PDF, fonts, application fields

Standard
Multiplatform
Vector + raster, saves format, search in pdf
documents
Compression, authorization
Even fonts can be stored in PDF
Application fields
Printing, publishing
Internet

Control questions
What is a computer virus/worm/trojan?
How can we protect computers against
viruses?
How can we use firewalls?
What kind of archivers do you know?
What encryption methods do you know?
What does an Office suite contain?
Whats the difference between MS Office and
LibreOffice?
What are the main advantages of using PDF?

References

http://www.microsoft.com/hun/athome/security/viruses/virus101.m
spx
http://www.microsoft.com/hun/biztonsag/7fogas1.mspx
http://www.microsoft.com/hun/security/protect/spyware.mspx
http://www.microsoft.com/hun/security/protect/firewall.mspx
http://ecdlweb.uw.hu/m7-15.html
http://facesreklam.hu/help/grafikai_formatumok.htm
http://www.hvgpress.hu/index.php?
option=com_generic_editor&Itemid=185
http://www.iesz.hu/index.php?word_id=97
http://www.cert.hu/ismert/11felhasznalo/hcs_hun.html?
a=mod#intro
http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
http://www.libreoffice.org/
http://www.x2net.com/webcompiler/authenticode.htm
http://www.adobe.com

Thanks for your attention!

Potrebbero piacerti anche