Presentation is loading. Please wait.

Presentation is loading. Please wait.

By: Joshua DeLong Computer Security and Privacy.

Similar presentations


Presentation on theme: "By: Joshua DeLong Computer Security and Privacy."— Presentation transcript:

1 By: Joshua DeLong hype8912@cox.net Computer Security and Privacy

2 The need for information Major corporations spend millions of dollars each year to secure their Web sites and networks, yet it seems everyday there are new reports of attacks and vulnerabilities The more people are aware of the dangers and privacy infringements that are obligated to crackers, the safer your computer experience will be.

3 The Right to Privacy  National Security Agency  Federal Bureau of Investigation  National Infrastructure Protection Center  Microsoft Corporation

4 Networks and PCs

5  Firewalls  Encryption  Security Codes and Passwords  Viruses, worms, hackers, and crackers

6 Hackers and Crackers A hacker is a person who is very knowledgeable in programming, but do not do anything malicious against other computers. Hackers crave knowledge Created Linux and Unix A cracker is a person who knows enough about programming to get by and illegally breaks-in to computer systems with the intent to do bodily harm. Today’s best beta testers and programmers are hackers and crackers

7 Thank you Are there any Questions?

8 Bibliography Meade. “Security Recommendation Guides.” National Security Agency (2001) http://www.nsa.gov (Accessed 4 July 2002) Freeh. “Congressional Statement.” FBI Press Room (2000) http://www.fbi.gov (Accessed 5 July 2002) Eddy. “Microsoft offers sneak peek.” CNN (1998) http://www.cnn.com (Accessed 5 July 2002) “Internet Security Firewall.” CNET Software Reviews (2002) http://www.cnet.com (Accessed 1 July 2002) “PGP Freeware.” MIT Distribution Site (2002) http://web.mit.edu (Accessed 10 July 2002) “SSL.” Webopedia (2002) http://www.webopedia.com (Accessed 4 July 2002) “Access Security Code of Practice.” Consumer Act (1992) http://www.consumer.act.gov.au (Accessed 15 July 2002) “Latest Virus Threats.” Symantec Security Response (2002) http://www.norton.com (Accessed 8 July 2002) Raymond. “What’s the difference between a hacker and a cracker?” (2001) http://www.softlab.ntua.gru (Accessed 17 July 2002) Tycoon. “Preamble” GNU General Public License (1991) http://www.linux.org (Accessed 28 June 2002)


Download ppt "By: Joshua DeLong Computer Security and Privacy."

Similar presentations


Ads by Google