Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security. This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed…
Contents
1 Introduction
1.1 Delimitations
1.2 Methods and sources
1.3 Glossary
1.4 Notations
2 Security related terms
2.1 Security related terms
2.2 Abbrevations
3 The Home Computer
3.1 Relevant operating systems
3.2 Case study: Windows XP Home Edition
3.2.1 Initial vulnerabilities
3.2.2 Windows Update
3.2.3 Access control
3.2.4 Hidden file extensions
3.2.5 Email settings
3.2.6 Internet Explorer
3.2.7 Other services and aspects
3.3 Case study: Windows 98 Second Edition
3.3.1 Initial vulnerabilities
3.3.2 Windows Update
3.3.3 Access control
3.3.4 Hidden file extensions
3.3.5 Email settings
3.3.6 Internet Explorer
3.3.7 Other services and aspects
3.4 Recent vulnerabilities
3.4.1 RPC-DCOM: one month from patch to attack
3.4.2 The messenger service
3.4.3 Internet Explorer
3.4.4 Application programs
4 Threats
4.1 Worms
4.1.1 Worm segments
4.1.2 Spreading methods
4.1.3 Famous worms in the computing history
4.1.4 The latest worms in the wild
4.1.5 Worms of the future – the digital armagedon?
4.2 Virushoaxes
4.2.1 The jdbgmgr.exe virus hoax
4.3 Phishing
4.3.1 Phishing scams
4.3.2 An example
4.3.3 Statistics and trends
4.4 Spyware
4.4.1 Adware
4.4.2 Spyware
4.4.3 Phone dialers
4.4.4 Statistics and trends
4.5 Trojanhorses
4.5.1 Malicious actions
4.5.2 Propagation
4.5.3 Protection
4.6 Summary
5 Possible Solutions
5.1 Operating system security
5.1.1 Tips on how to avoid computer worms
5.2 WindowsXPServicePack2
5.3 Memory protection
5.4 Possible phishing solutions
5.5 Backups
6 User Survey
6.1 Background
6.2 Results
6.2.1 Windows
6.2.2 Security software
6.2.3 Internet and email
6.3 Summary
7 Conclusions per threat category
7.1 Default settings
7.2 Security holes
7.3 WindowsUpdate
7.4 Automated worms
7.5 Email worms
7.6 Spyware
7.7 Phishing
7.8 Theusers
8 Summary
Author: Frisk, Ulf,Drocic, Semir
Source: Linköping University
Download URL 2: Visit Now