Professional Documents
Culture Documents
lecture
Technical informatics
Last lecture
Operating systems
History development, task, versions
Mobile OS
Info-communication
Solutions
Applications
Outline
Software types
System sw: operating software
Application software
For a particular area, task
Utility programs
Secure operation
Additional help for the user
Computer security
Before 1980
No network
Computers operated by experts
After 1990
Computers on networks
Not only expert users
After 2005
Every device is connected
Wide range of users/applications
Damage
Why do they attack?
Data
Passwords, codes (phishing)
Resource
Viruses
Computer viruses are programs
deliberately designed to interfere
with computer operation, record,
corrupt, or delete data, or spread
themselves to other computers
and throughout the Internet, often
slowing things down and causing
other problems in the process.
Worms
A worm is a specific type of
virus that propagates itself
across many computers,
usually by creating copies of
itself in each computers
memory.
Trojans
A Trojan Horse, similar to its Greek
mythological counterpart, often
presents itself as one form while it
is actually another.
Spywares
Spyware refers to software that
performs certain tasks on the
computer, typically without the
users consent. This may include
giving advertising or collecting
personal information (e.g.
passwords) about the user.
Malware
Other unwanted
applications
Adware (<>spyware)
Financing software
Uncareful installing
Java and the ask toolbar
Zonealarm and the Firefox browser
Botnet - zombies
DoS Denial of Service, DDoS
Distributed DoS
Infection and sending SPAMs within
seconds
Difficult identification (detecting
origin IP)
Unequal computer security (by
government)
Mobile phone botnet
SPAM
Unsolicited, unwanted, irrelevant or
inappropriate messages, especially
for commercial advertising in mass
quantities (junk mail)
50-90% of emails
2005: 50+ billion USD
Protection/filtering
By the service provider
At home
Phishing
Acquiring sensitive information
(passwords, credit card numbers etc.)
Fake web sites (e.g. PayPal)
VoIP phishing
How to protect?
Reporting phising
Browser settings
Cautious behaviour
How to protect?
Virusbuster, antispyware
Software updates (SP, patches)
Software settings (e.g. mails,
browsers)
Firewall
Passwords
Alternative methods
Back-up!
Antivirus software
Utility program, runs in the background
Shield
Parameters
Virus-library, clearing rate, reaction speed,
platform dependency, heuristic search,
price, trial version
Antivirus functions I.
(example)
Steel protection
Phising protection
Idle scanning
Energy saving mode
Cloud-based protection
Protecting external drives
Parental surveillance
Antispyware
Recognizing and destroying
spyware
Ad-Aware (Lavasoft), Spykiller
(TrustSoft), McAffee
Antispyware
MS AntiSpyware
Windows Defender (Vista)
Firewalls
A firewall is a program or
hardware device that filters the
information coming through the
Internet connection into private
network or computer system .
Software/hardware firewalls
Firewall
Firewall settings
Firewall messages
Mobile security
Viruses
Cabir bluetooth
Smart phones
Phising
Licenses, regulations; iPhone
jailbreak
No efficient antivirus software
Blackberry
40% of financing service poviders use
Blacberry
Server at RIM
Data encryption on the device
Direct connection between group
members
Fast messaging
Exception: governmental control (e.g.
counterterrorist activities)
Encryption
Encryption is a mathematical
process that modifies information
in a way that makes it
unreadable until the exact same
process is reversed.
Algorithm (cipher) + key
Encrypted data storage
EFS (NTFS)
TrueCrypt, BitLocker
Encryption methods
Symmetric key
Advantage: simple, fast
Shortcoming: shared secret key
Asymmetric key
Public key, private key
Safe but slow
SSL
Secure Socket Layer
Safe transfer protocol
Communication between
webservers and clients
Supported by the new web-based
mail systems, in order to keep ebusiness safe; https://...
Communication channel
encryption, not verification
E-sign
Verification not encryption:
Signing the documents/data with
a digital signature assures that it
comes from the sender and hasn't
been altered or corrupted since it
was created and signed.
OFFICE
Office applications for Windows
(even for Windows Phone and 8)
and Mac OS
MS versions: standard, home,
student, professional etc.
Office environment
Office 2010
Environment
32/64 bit versions (add-ons!)
Web Apps
Multiuser mode: multiple users working
on the same documents
www.live.com
Office365
Monthly subscription, continuous network
connection
All MS Office applications, always updated
5 computers (Windows and Mac) + 5
(Windows OS) tablet/smart phone
Storage on OneDrive, synchronized devices
Win 7 and Mac OS X 10.6 and newer versions
Premium version
1TB storage space/user
60 international Skype minutes
LibreOffice
www.libreoffice.org:
LibreOffice is the power-packed free, libre and
open source personal productivity suite for
Windows, Macintosh and GNU/Linux, that
gives you six feature-rich applications for all
your document production and data
processing needs: Writer, Calc, Impress, Draw,
Math and Base.Support and documentation is
free from our large, dedicated community of
users, contributors and developers.
LibreOffice applications
Writer
Calc
Impress
Draw
Math
Base
Advantages - shortcomings
Free, multiplatform, multilingual
Reliable
OpenOffice
LibreOffice v4.4.1
LibreOffice environment
Standard
Multiplatform
Vector + raster, saves format, search in pdf
documents
Compression, authorization
Even fonts can be stored in PDF
Application fields
Printing, publishing
Internet
Control questions
What is a computer virus/worm/trojan?
How can we protect computers against
viruses?
How can we use firewalls?
What kind of archivers do you know?
What encryption methods do you know?
What does an Office suite contain?
Whats the difference between MS Office and
LibreOffice?
What are the main advantages of using PDF?
References
http://www.microsoft.com/hun/athome/security/viruses/virus101.m
spx
http://www.microsoft.com/hun/biztonsag/7fogas1.mspx
http://www.microsoft.com/hun/security/protect/spyware.mspx
http://www.microsoft.com/hun/security/protect/firewall.mspx
http://ecdlweb.uw.hu/m7-15.html
http://facesreklam.hu/help/grafikai_formatumok.htm
http://www.hvgpress.hu/index.php?
option=com_generic_editor&Itemid=185
http://www.iesz.hu/index.php?word_id=97
http://www.cert.hu/ismert/11felhasznalo/hcs_hun.html?
a=mod#intro
http://www.webopedia.com/DidYouKnow/Internet/2004/virus.asp
http://www.libreoffice.org/
http://www.x2net.com/webcompiler/authenticode.htm
http://www.adobe.com