Presentation is loading. Please wait.

Presentation is loading. Please wait.

DIYTP 2009. What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.

Similar presentations


Presentation on theme: "DIYTP 2009. What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity."— Presentation transcript:

1 DIYTP 2009

2 What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity  Stalking  Stealing information  Child Pornography

3 Cybercrime Components  Computers  Cell Phones  PDA’s  Game Consoles

4 High-Profile Cybercrime- related Cases  TJ Maxx data breach  45 million credit and debit card numbers stolen  Kwame Kilpatrick  Cell phone text messages  BTK Serial Killer  Kevin Mitnick

5 Computer Security  Confidentiality  Only those authorized to view information  Integrity  Information is correct and hasn’t been altered by unauthorized users or software  Availability  Data is accessible to authorized users

6 Computer Security Figure 1.0 – CIA Triangle

7 Computer Security - Threats  Malware  Software that has a malicious purpose  Viruses  Trojan horse  Spyware

8 Computer Security - Threats  Intrusions  Any attempt to gain unauthorized access to a system  Cracking  Hacking  Social Engineering  War-driving

9 Computer Security - Threats  Denial-of-Service (DOS)  Prevention of legitimate access to systems  Also Distributed-Denial-of-Service (DDoS)  Different types:  Ping-of-Death  Teardrop  Smurf  SYN

10 Computer Security - Threats Figure 1.1 – DoS and DDoS Models

11 Computer Security - Terminology  People  Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.

12 Computer Security - Terminology  Script Kiddies  Someone that calls themselves a ‘hacker’ but really isn’t  Ethical Hacker  Someone hired to hack a system to find vulnerabilities and report on them.  Also called a ‘sneaker’

13 Computer Security - Terminology  Security Devices  Firewall  Barrier between network and the outside world.  Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests.  Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.

14 Computer Security - Terminology  Activities  Phreaking  Breaking into telephone systems (used in conjunction with war-dialing)  Authentication  Determines whether credentials are authorized to access a resource  Auditing  Reviewing logs, records, or procedures for compliance with standards

15 Computer Security - Careers  Information Security Analyst US National Average Salary Figure 1.2 – Median salary courtesy cbsalary.com

16 Computer Security - Certifications  Entry-level  Security+ http://www.comptia.org/certifications/listed/security.a spx http://www.comptia.org/certifications/listed/security.a spx  CIW Security Analyst www.ciwcertified.comwww.ciwcertified.com  Intermediate  MSCE Security http://www.microsoft.com/learning/en/us/certification /mcse.aspx#tab3 http://www.microsoft.com/learning/en/us/certification /mcse.aspx#tab3  Professional  CISSP www.isc2.orgwww.isc2.org  SANS www.sans.orgwww.sans.org

17 Computer Security - Education  Community-college  Washtenaw Community College  Computer Systems Security http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APCSS http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APCSS  Computer Forensics http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APDRAD http://www4.wccnet.edu/academicinfo/creditofferin gs/programs/degree.php?code=APDRAD

18 Computer Security - Education  4-Year College  Eastern Michigan University  Information Assurance  Applied  Network  Cryptography  Management  http://www.emich.edu/ia/undergraduate.html http://www.emich.edu/ia/undergraduate.html

19


Download ppt "DIYTP 2009. What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity."

Similar presentations


Ads by Google