Presentation on theme: "Cyber Security Sadia Ahmad Jeffrey Au Onika Emanuel March 27, 2012."— Presentation transcript:
Cyber Security Sadia Ahmad Jeffrey Au Onika Emanuel March 27, 2012
What Is It? Definition: “Measures taken to protect a computer or a computer system against unauthorized access or attack Also known as: Information Security Attacks include (but not limited to): ▫Viruses ▫Hacks ▫Identity theft
Why Is It Important? President Barack Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s prosperity in the 21 st century will depend on cyber security.” In 2010, Obama declared an investment of $13 million toward a strategy for cyber security
How You Can Protect Yourself Install Anti-Virus software to protect yourself from crippling bugs ▫Norton, Kapersky, Trend-Micro, and Webroot Report anything suspicious to siteowners ▫Siteowners have the right to kick suspicious users off their websites Don’t store personal information on websites ▫Phone numbers, addresses, social security numbers, credit card numbers
How to Protect cont’d Do not talk to strangers online ▫Not everyone is who they claim to be online Never give your information over the phone ▫Some telemarketing companies don’t admit when they plan on selling your information to websites Never reply to s that look suspicious ▫They may be scams from people asking for money – i.e s that say you’ve won money
How to Protect cont’d Never give out your password Never use the same password for your computer, phones, credit/debit cards, etc. Change your password regularly Change your password if you have had unwanted access Upgrade your software on your computer regularly Enable the firewall on your computer
How to Protect cont’d Monitor your online presence ▫Check your accounts for any suspicious activity Turn off your Bluetooth on your phone ▫Computer hackers may find a way to use it Don’t log onto Wi-Fi hotspots unless you know that it is secure If you see an advertisement with outrageously low selling prices, they are generally untrue
How to Protect cont’d Think twice before clicking on a link ▫It might not be secured or what you think it might be Never save your personal information on a public computer ▫You never know who might be on the computer after you
History of Cyber Security 1983: The FBI tracks down the “414s” ▫The “414s” were a group of young hackers who broke into several U.S. government networks, often only using an Apple II+ computer and modem 1983: Fred Cohen (USC) coins the term “computer virus” ▫A computer program that can “affect other computer programs by modifying them in such a way as to include a possibly evolved copy of itself”
History cont’d 1986: One of the first PC viruses ever created was released by programmers in Pakistan ▫This virus was named “The Brain” 1991: Phillip Zimmerman released “Pretty Good Privacy,” a free, powerful data-encryption tool ▫The U.S. government began a three-year criminal investigation on Zimmerman, alleging he broke U.S. encryption laws after his program spread rapidly around the globe (The government later dropped the charges).
History cont’d 1991: Symantec released Norton Anti-Virus software 1994: Inexperienced users dutifully forwarded an warning people not to open any message with the phrase “Good Times” in the subject line. ▫The missive, which warns of a virus with the power to erase a recipient’s hard drive, demonstrates the self-replicating power of virus hoaxes that continue to circulate in different forms today.
History cont’d 1995: Microsoft Corp. released Windows 95 – Anti-Virus companies worry that the operating system will be resistant to viruses. ▫Later that year, evolved “macro” viruses started appearing to be able to corrupt the new Windows system 1997: Kapersky Lab was founded by Natalia and Eugene Kapsersky
History cont’d 2000: The "I Love You" virus infects millions of computers virtually overnight, using a method similar to the Melissa virus. The virus also sends passwords and usernames stored on infected computers back to the virus's author. ▫Authorities traced the virus to a young Filipino computer student who got away free because the Philippines had no laws against hacking and spreading computer viruses. ▫This spurs the creation of the European Union's global Cybercrime Treaty.