1. Trang chủ
  2. » Công Nghệ Thông Tin

HackerProof: Your Guide to PC Security

104 426 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề HackerProof: Your Guide to PC Security
Tác giả Matt Smith
Người hướng dẫn Justin Pot
Trường học MakeUseOf
Chuyên ngành Computer Security
Thể loại Guide
Định dạng
Số trang 104
Dung lượng 3,66 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

This guide provides an objective, detailed, but easily understood walkthrough of PC security. By the end of this guide you will know exactly what PC security means and, more importantly, what you need to do to keep your PC secure.

Trang 2

HackerProof: Your

Guide to PC Security

By Matt Smith, http://smidgenpc.com

Edited by Justin Pot

This manual is the intellectual property of

MakeUseOf It must only be published in its

original form Using parts or republishing alteredparts of this guide is prohibited without permissionfrom MakeUseOf.com

Think you’ve got what it takes to write a manualfor MakeUseOf.com? We’re always willing tohear a pitch! Send your ideas to

justinpot@makeuseof.com; you might earn up to

$400

Trang 3

Table of Contents

Intro to PC Security

The Malware Gallery

Innocent Civilizations: The Security of OperatingSystems

Good Security Habits

Methods of Protection

Choosing Security Software

Prepare for the Worst - and Backup!

Recovering from Malware

Conclusion

MakeUseOf

Trang 4

Intro to PC Security

What is PC Security?

The terms “PC security” or “computer security”are vague in the extreme They tell you very little,like most general terms

This is because PC security is an incrediblydiverse field On the one hand you have

professional and academic researchers whocarefully try to find and fix security issues across abroad range of devices On other hand, there isalso a community of inventive computer nerds whoare technically amateurs (in the literal sense of theword – they’re unpaid and unsupported by anyrecognized institution or company) but are highlyskilled and capable of providing useful input oftheir own

PC security is linked to computer security as awhole, including issues like network security and

Internet security The vast majority of the threatsthat may attack your computer are able to survive

Trang 5

only because of the Internet and, in some cases, thesurvival of a security threat is directly linked to asecurity flaw in some high-end piece of serverhardware However, the average PC user has nocontrol over this.

This means that PC security – defined as protection

of the personal computer you own – has a fortressmentality It is your responsibility to protect yourfortress from whatever might exist in the unknownbeyond its walls This mentality is expressed in theterms used by companies that want to sell you PCsecurity software Words like “firewall” “blocker”and “shield” are easy to find in advertisements of

PC security software

These words are supposed to clarify the purpose

of PC security, but this isn’t always the case Theinformation received from a company that sellssecurity software is likely to be biased in favour oftheir product, as well, further confusing issues.This guide provides an objective, detailed, buteasily understood walkthrough of PC security Bythe end of this guide you will know exactly what

Trang 6

PC security means and, more importantly, what youneed to do to keep your PC secure.

A Brief History of Computer Viruses

Computer viruses haven’t always been a majorthreat The earliest viruses, which spread

themselves in the 1970s via the first Internet

networks (such as ARPANET), were relativelymundane programs that sometimes did nothingmore than display a message on a computer

terminal

Viruses did not start to gain notice as a serioussecurity threat until the mid and late 1980s Thisperiod saw a number of firsts in the field of

computer viruses, such as the Brain virus, widelyconsidered as the first IBM PC compatible virus.This virus was capable of infecting the boot sector

of MS-DOS computers, slowing them down orrendering them unusable

Trang 7

Once the earliest malware became known thenumber of viruses quickly ramped up as savvynerds saw the opportunity to engage in a bit ofonline vandalism and prove their technical

knowledge to their peers Media attention towardsviruses became common in the early 90s, and thefirst major virus scare occurred surrounding theMichelangelo computer virus Like hundreds ofcomputer viruses after it, Michelangelo set off a

Trang 8

media panic and millions across the globe worriedthat their data would soon be erased This panicproved misplaced, but put a media spotlight onmalware that has yet to fade.

The proliferation of e-mail in the late 1990s wrotethe next chapter in malware This standard form ofcommunication was, and still is, a popular methodthrough which malware can reproduce Emails areeasy to send and attached viruses are easy todisguise The popularity of email also coincidedwith a trend that proved even more important in theevolution of malware – the rise of the personalcomputers While enterprise networks are usuallystaffed by a team of people paid to watch overtheir security, personal computers are used by

Trang 9

average people who have no training in the field.Without the rise of personal computers many of thesecurity threats that rose in the new millenniawould not possible Worms would have fewertargets, trojans would be detected quickly, andnew threats like phishing would be pointless.Personal computers give those who want to writemalicious software a field full of easy targets.The key, of course, is to ensure you’re not one ofthem.

Trang 10

The Malware Gallery

The Traditional Virus or Trojan

Malware, through most of history, have spread by

Trang 11

user error; that is to say, the PC user takes somekind of action to trigger a virus into action Theclassic example of this is opening an email

attachment The virus, disguised as an image file orsome other common file type, springs into actiononce the user opens the file Opening the file mayresult in an error, or the file may open as usual,fooling the user into thinking nothing is wrong Inany case, the virus required the action of the user

in order to spread Reproduction is made possiblenot because of a security flaw in a program’s codebut instead through deception

In the late 1990s this type of malware, more

commonly called a virus, was by far the mostthreatening Most people were new to email anddidn’t know that opening an attachment could infecttheir computer Email service was far less

sophisticated: there were no effective spam filterscapable of keeping virus-containing spam emailsout of inboxes, nor were there any effective

antivirus solutions that automatically scannedemailed attachments In recent years, technologicaladvancements on both of these fronts have made it

Trang 12

less effective to send a virus via email, but thereare still millions of people who don’t have

security software and don’t mind opening emailattachments

As email viruses are now a (relatively) wellknown threat, virus design has become morecreative Viruses can now “hide” in file types mostpeople consider secure, such as Excel

spreadsheets and PDF files It is even possible for

a virus to infect your PC through your web

browser if you visit a webpage containing such avirus

Some PC users boast that avoiding a virus issimply a matter of common sense – if you don’tdownload files from unknown sources and don’tdownload email attachments you’ll be fine Idisagree with this view While many threats can beavoided with caution, viruses with new methods ofreproduction and infection are being developedconstantly

Trojans

Trang 13

Trojans, while different from a virus in its

payload, can infect PCs through the same methodslisted above While a virus attempts to run

malicious code on your PC, a Trojan attempts tomake it possible for a third party to access some orall of your computer’s functions Trojans can infectcomputers through almost any method a virus canuse Indeed, both viruses and Trojans are oftenlumped together as malware, as some securitythreats have traits associated with both a virus and

a Trojan

Worms

Trang 14

The term “worm” describes a method of virusinfection and reproduction rather than the payloadwhich is delivered This method of infection isunique and dangerous however, so it deserves itsown category.

A worm is malware that is capable of infecting acomputer without the user taking any action(besides that of turning on their computer andconnecting to the Internet) Unlike more traditional

Trang 15

malware, which usually tries to hide in an infected

file, worms infect computers through network

vulnerabilities

The stereotypical worm spreads by spamming

copies of itself to random I.P addresses Each

copy has instructions to attack a specific network

vulnerability When a randomly targeted PC with

the vulnerability is found, the worm uses the

network vulnerability to gain access into the PC

and deliver its payload Once that occurs, the

worm then uses the newly infected PC to spam

more random I.P addresses, beginning the process

all over again

Exponential growth is the key here The SQL

Slammer worm, released in January 2003, used

this method to infect approximately 75,000

computers within 10 minutes of its initial release

(http://www.wired.com/wired/archive/11.07/slammer.html

As with many PC security threats, however, the

term “worm” covers a wide range of malware

threats Some worms spread by using flaws in

email security in order to automatically spam

Trang 16

themselves via email once they infect a system.

Others have an extremely targeted payload

Stuxnet, a recent computer worm, was found to

have code that many believed was designed

specifically to attack Iran’s nuclear research

program

(http://www.schneier.com/blog/archives/2010/10/stuxnet.html

)

While this worm is estimated to have infected

thousands of computers, its actual payload is

designed to only take effect once the worm

encounters a specific type of network – the type

Trang 17

Iran uses for uranium production No matter whothe target was, the sophistication of Stuxnet

provides a great example of how an automaticallyreproducing worm can infect systems without itsusers having the slightest clue

Trang 18

The term rootkit is used mainly as a means ofdescribing a specific type of payload Rootkits caninfect systems and reproduce themselves using anynumber of tactics They may operate like worms orthey may hide themselves in seemingly legitimatefiles.

Sony, for example, found itself in hot water whensecurity experts discovered that some music CDsdistributed by Sony were shipping with a rootkitthat was able to give itself administrative access

on Windows PC’s, hide itself from most virusscans, and transmit data to a remote location Thiswas, apparently, part of a misguided copy

protection scheme

In many ways a rootkit’s payload seeks to achievethe same goals as a regular virus or Trojan Thepayload may attempt to delete or corrupt files, or itmight attempt to log your keystrokes, or it may try

to find your passwords and then transmit them to athird party These are all things that a virus orTrojan may attempt to do, but rootkits are far moreeffective at disguising themselves while they’re

Trang 19

doing their work Rootkits actually subvert the

operating system, using security flaws in the

operating system to disguise itself as a critical

system file or, in severe cases, write itself into

critical system files, making removal impossible

without damaging the operating system

(http://www.wired.com/politics/security/commentary/securitymatters/2005/11/69601

The good news is that rootkits are harder to code

than most other types of malware The deeper a

rootkit wishes to plunge into a PC’s operating

system, the more difficult the rootkit will be to

create, as any bugs in the rootkit’s code could

crash a targeted PC or alter antivirus software

This might be bad for the PC, but it defeats the

point of trying to hide the rootkit in the first place

Phishing and Pharming

Trang 20

The world of malware in the 1990s looks quaintcompared to today Back then, malware was oftenwritten by hackers who wanted to display theirtalents and gain notoriety among their peers Thedamage done was severe, but often limited to thecomputers infected Modern malware, however, isoften nothing more than a tool used by criminalsseeking to steal personal information This

information can then be used to hijack credit cards,create false identifications, and perform all sorts

of illegal activities that can have a severe impact

on the life of the victim

Phishing and Pharming are techniques that best

Trang 21

illustrate the criminal element of PC securitythreats These threats as significant, but they don’ttechnically attack your PC at all Instead they useyour PC to deceive you and steal important

information

Both of these terms are closely related Pharming

is a technique used to redirect a person to a boguswebsite Phishing is the act of harvesting privateinformation by posing as a trustworthy entity Thetechniques often go hand- and-hand: a pharmingtechnique sends a person to a bogus website which

is then used to “phish” private information from theperson

Trang 22

The classic example of this sort of attack beginswith an email that appears to be sent from yourbank The email states that there has been a

suspected security breach of your bank’s onlineservers and you need to change your username andpassword You are provided a link to what

appears to be your bank’s website The page, onceopened in your browser, asks you to confirm yourexisting username and password and then type in anew username and password You do so, and the

Trang 23

website thanks you for your cooperation Youdon’t realize anything is wrong until you try to loginto your bank’s website the next day by followingthe bookmark in your browser.

Malware – The Catch All

While the rogues above are widely recognized asserious problems with definite characteristics, it isstill difficult to categorize threats because theecosystem of security threats is diverse and

constantly changing This is why the term malware

is used so frequently: it is the perfect catch-all foranything that is trying to do harm to your computer

or trying to use your computer to do harm to you.Now that you know about some of the most

common PC security threats, you may be

wondering what you can do about them The bestplace to begin that discussion is with operatingsystems

Trang 24

Innocent Civilizations: The Security of Operating Systems

The operating system that you are using has asignificant impact on the malware threats that youneed to be aware of and the methods you can use tocounter-act them Malware is, in most cases,programmed to take advantage of a particularexploit in a particular operating system Malwarecoded to take advantage of a network vulnerability

in Windows can’t infect OS X computers becausethe networking code is much different Likewise, avirus that attempts to delete driver files found on aWindows XP computer won’t have any effect on a

Linux machine because the drivers are completelydifferent

I think it is accurate to say that the operating systemyou choose has a bigger impact on your PC’soverall security than any other single variable.With that in mind, let’s take a quick look at somecommon operating systems and how they handlesecurity

Trang 25

Windows XP

Introduced in 2001, Windows XP quickly becameMicrosoft’s most critically acclaimed operatingsystem It was loved for its relatively simpleinterface, which offered improvements but

remained familiar to users of Windows 95, 98 and

ME It also proved relatively slim for a newWindows operating system, and it remains capable

of running on older machines that can’t handlenewer Windows operating systems

Trang 26

At the time of its release, Windows XP introducedsome notable security improvements over previousWindows operating systems It closed up somesecurity holes that made it easy to mess withWindows systems by using blank network accounts

or certification errors Windows XP’s securityreceived a big addition in Windows XP ServicePack 2 with the introduction of Windows SecurityCenter, which made it easier for users to find out iftheir Windows XP computer was protected byanti-malware software and had the appropriatesecurity updates installed

However, Windows XP is a nearly ten year oldoperating system, and over the years it has beenattacked relentlessly by hackers The popularity ofWindows XP makes it an obvious choice formalware seeking to infect as many computers aspossible In addition, Windows XP simply doesnot have access to a number of improved securityfeatures that are standard in Windows 7

Overall, Windows XP is the worst common

operating system currently available from the

Trang 27

standpoint of security It lacks new security

features, is well understood by those codingmalware, and is frequently attacked

Windows 7

The latest operating system from Microsoft,

Windows 7 is a refinement of the heavily criticizedWindows Vista (the information in this section

Trang 28

mostly applies to Vista, as well) Windows 7 isnot as easy to run as Windows XP, but it offers awealth of new features, including features relating

to security

For example, User Account Control is a newfeature that was introduced in Vista and alsoincluded in Windows 7 When it first arrived,UAC was commonly mocked in the media – Appleeven made an advertisement about it That’s an oddmove because OS X has similar functionality, andbecause UAC is very important when it comes tosecurity It protects your PC by ensuring thatprograms cannot gain elevated access privilege toyour system without permission Prior to UAC,malware could easily do this without the user everknowing the wiser

Trang 29

Microsoft has also made improvements that furtherrefines Window’s ability to convey importantsecurity information to users The Security Center

is now called the Windows Action Center, and itdoes a better job than ever before of automaticallyobtaining important updates and notifying userswhen action needs to be taken This is crucial,because known security exploits that are notpatched are a liability no matter the operatingsystem you prefer

Windows 7 also benefits from an attitude towards

Trang 30

security that is far more reasonable than the

attitude Microsoft had during the creation ofWindows XP This is readily apparent when youcompare the number of security exploits Microsofthas had to patch during the first year of XP’srelease with the first year of Vista’s release.Windows XP had 65 vulnerabilities corrected,while Windows Vista had just 36 vulnerabilitiespatched

Unfortunately, Windows 7 remains heavily

targeted by malware because of its popularity.Windows is still the operating system used by most

of the world, so it makes sense of malware totarget it For this reason, Windows 7 users stillface numerous security threats

Mac OS X

Trang 31

Mac OS X still feels modern, but is at its core arather old operating system The first version wasreleased in 2001, making it just as old as Windows

XP Apple, however, takes a far different approach

to updates than Microsoft While the folks atRedmond usually focus on big releases, bringingout new operating systems every five or six years

on average, the Apple crew had updated OS Xeight times since the operating system’s initialrelease

Those releases usually contain a few securityupdates, and Apple has earned a reputation foroffering security that is far beyond that of

Windows This reputation, however, tends to fall

Trang 32

apart upon closer examination Malware targeting

OS X does exist, and Apple has to patch securityflaws with about the same frequency of Microsoft

A 2004 report from a security company known asSecunia discovered that in the previous year Mac

OS X was subject to 36 vulnerabilities, only tenless than Windows XP – however, a higher

percentage of OS X vulnerabilities could beexploited via the Internet

(x-security-myth-exposed/)

http://news.techworld.com/security/1798/mac-os-More recently, Apple was forced to release anumber of major security patches, the most recent

of which addressed 134 vulnerabilities

(massive-mac-os-x-security-update/2010-11-12)

Trang 33

http://www.fiercecio.com/story/apple-releases-This is not to say that Mac OS X is not secure Oneadvantage, which carries over from OS X’s UNIXheritage, is the need to sign in as “root” to makechanges to important files and settings (Window’sUAC is essentially an attempt to emulate this).However, an unfortunate number of users seem tobelieve that OS X is immune to security threats due

to its relative obscurity While there is a degree oftruth to this, security threats for OS X computers

do exist and can be just as damaging as those thattarget Windows The security of Mac OS X is alsohampered by a slim selection of security suites

Trang 34

Most PC owners will never use a computerrunning Linux With that said, Linux is moreaccessible now than it has ever been in the past.Free Linux variants, like Ubuntu and Jolicloud,offer a graphical user interface that is robust andprovides the basic functionality you expect from a

PC, such as the ability to read your email andbrowse the web

Linux, like OS X, requires that users sign in on a

“root” account to make changes to important filesand settings Linux also benefits greatly fromsecurity by the way of obscurity The Linux user

Trang 35

base is small and, to make matters worse formalware, the user base does not cling to a

particular variant of Linux Although the underlyingcode is often the same, there are subtle changes todifferent variants of Linux – and many advancedLinux users go so far as to code in their owncustom features This makes attacking Linux usersin-mass a difficult and also pointless proposition

If you’re looking to harvest credit card numbers,targeting Linux is not the way to go

The niche nature of desktop Linux makes talkingabout its security difficult Security vulnerabilities

do indeed exist on Linux systems, and these

vulnerabilities are not always patched as quickly

as vulnerabilities found on Windows

(Source/Linux-vs-Windows-Which-Is-More-Secure/) However, Linux operating systems areactually impacted by security threats less

http://www.eweek.com/c/a/Linux-and-Open-frequently, and the threats are often less severe

A Summary – Which is Best?

Trang 36

Overall, Mac OS X and Linux are clearly superior

to Windows if security is measured by the

frequency with which users are impacted bysecurity threats This does not mean that Microsoft

is asleep at the wheel It is simply the reality of ourworld Windows is by far the most popular

operating system and, as a result, malware isusually coded to target Windows PCs

On the other hand, Windows computers haveaccess to superior antivirus suites and the

Windows Action Center in Windows 7 has nopeer This means that Windows users are arguablymore likely to be aware of a security issue when itarises, but trying to quantify this is impossible.Still, whatever the reasons, it’s impossible to getaway from the fact that Windows users are morelikely to be impacted by malware than users of OS

X or Linux

Trang 37

Good Security Habits

Avoiding the Email Inbox of Doom

Ah, email Once upon a time it was the primarymethod of reproduction for most malware A viruswas attached to an email, disguised as a coolprogram or a document, and then sent on its merryway Open the email and – bam! – you’re infected

At the time this sort of deception seemed like thepinnacle of trickery Today, such simple means ofmalware reproduction and infection seem quaint –

it would be nice to go back to a world whereavoiding email attachments protected your

computer from the majority of threats

Spam filters and automatic antivirus protection hasmade it much harder for malware to spread

effectively via email, and most users now knowbetter than to open an attachment from an unknown

Trang 38

source (and if you didn’t know better – now youdo!)

However, malware has compensated by usingautomated methods of reproduction that disguisethe malware email as something that looks

trustworthy For example, malware that infectsyour parent’s computer may then send an emailfrom them to you with the header “Photos from arecent vacation.” If your parent weren’t on

vacation, you would probably catch on to thetrickery However, everyone’s parents go onvacation sometimes – and if yours just came backfrom an international trip you may open the

attachment

The rule of thumb is this – if the attachment issomething that you did not already know wassupposed to be sent to you, confirm with the senderbefore opening it Alternatively, you can scan the

Trang 39

file with your anti-malware application of choice.

Be warned, however, that no security software candetect every security threat

Although malware is always an issue, phishing isundoubtedly the threat that is currently the mostdevious and difficult to detect Always be waryabout unexpected emails that are supposedly fromyour bank, employer, or any other institution Nolegitimate institution will ever ask you to enteryour username and password by presenting youwith a link sent via email!

In fact, it is a good idea to never directly open anylink supposedly sent to you from an institution Ifyour bank is contacting you to give you yourmonthly e-statement, for example, this informationshould be accessible by going to the bank’s mainpage and then logging into your account

Using Caution for Safe Surfing

Trang 40

Web surfing has always presented some securitythreats, a fact that many users forget As withemail, it’s often assumed that you’ll be perfectlyprotected if you simply avoid opening files fromunknown sources Being scrupulous about the filesyou download is, of course, an extremely goodidea But this alone is not enough to properlysafeguard your PC.

Most of the security exploits you’ll need to worryabout exist because of a security problem witheither your web browser or an important plugin,such as Java or Adobe Flash Products like Flashmake it very easy for web developers to create

Ngày đăng: 19/03/2014, 17:28

TỪ KHÓA LIÊN QUAN