1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Computer Security and Safety, Ethics and Privacy
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Physical Security Logical/Computer Security What other examples?
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security & Safety
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Living in a Digital World Discovering Computers 2011.
Computer Security and Safety, Ethics, and Privacy
Discovering Computers 2010
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Your Interactive Guide to the Digital World Discovering Computers 2012.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Computer Security, Ethics and Privacy Chapter 11.
Discuss techniques to prevent unauthorized computer access and use
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Chapter 11 Objectives Describe the types of computer security risks
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Discuss techniques to prevent unauthorized computer access and use
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter Nine (Part 1).
Computer Security, Ethics and Privacy
Computer Security, Ethics and Privacy
Presentation transcript:

1 Computer Security and Privacy

2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee Cyberextortionist Cyberterrorist Back doors spoofing Virus Worm Trojan horse Malware Payload Virus signature/virus definition Quarantine Virus hoax Botnets Denial of service attacks

3 Computer Security Risks Computer security risk – any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing. Computer crime – any illegal act involving a computer. Cybercrime – online or Internet-based illegal acts

4 Cyber Crime Categories Hacker – someone who accesses a computer or network illegally. Claims intent is to improve security Cracker – someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.

5  Script kiddie –Often are teenagers that use prewritten hacking and cracking programs to break into computers has the same intent as a cracker does not have the technical skills and background. Corporate spies – are hired to break into a specific computer and steal its proprietary data and information Have excellent computer and network skills Cyber Crime Categories

6 Unethical employees – break into their employers ‘ computers for a variety of reasons 1) To exploit a security weakness; 2) seek financial gains from selling confidential information; 3) disgruntled employees seek revenge Cyberextortionist – someone who uses as a vehicle for extortion. Send a company a threatening message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the company’s network—if they are not paid a sum of money Cyber Crime Categories

7 Cyberterrorist – uses the Internet or network to destroy or damage computers for political reasons. Usually require a team of highly skilled individuals, millions of dollars, and several years of planning Cyber Crime Categories

8 Internet and Network Attacks Attacks that jeopardize security include computer viruses, worms, and Trojan horses; botnets; denial of service attacks; back doors; and spoofing. Virus – a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission Worm –a program that copies itself repeatedly Trojan horse – a program that hides within or looks like a legitimate program.

9 Virus, worms, Trojan horse are classified as malware. Malware (malicious software) – program that act without a user’s knowledge and deliberately alter the computer’s operation Payload – the destructive event or prank the program is intended to deliver. Internet and Network Attacks

10 Symptoms of a computer affected by virus, worm or Trojan horse Screen displays unusual message or image Available memory is less than expected Files become corrupted Unknown programs or files mysteriously appear Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly System properties change

11 Safeguards against viruses, worms, and Trojan horses Don’t start with removable media CDs, DVDs, and USB flash drives Never open an from an unknown source Never open an attachment unless you are expecting the attachment Set macro security level to medium Stay informed about new virus alerts and virus hoaxes.

12 Install antivirus program and update it frequently How antivirus programs work Look for virus signatures/virus definitions—a known specific pattern of virus code. Quarantine infected file Safeguards against viruses, worms, and Trojan horses

13 Network and Internet Security Risks Denial of service attack (DoS) hackers run multiple copies of a program to flood it and shut it down.

14 Back Doors A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network. Spoofing fooling another computer by pretending to send packets from a legitimate source Network and Internet Security Risks

15 Safeguards against DoS Attacks, Back Doors, and IP Spoofing Firewalls allows normal Web browser operations but prevents other types of communication checks incoming data against a list of known sources data rejected if it does not fit a preset profile

16 Intrusion Detection Software Automatically analyzes all network traffic, assesses system vulnerabilities Identifies any unauthorized access (intrusions) Notifies network administrators of suspicious behavior patterns or system breaches Safeguards against DoS Attacks, Back Doors, and IP Spoofing

17 Safeguards Against Unauthorized Access And Use Access control A security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer. Audit trail Records in a file both successful and unsuccessful access attempts. User Name and passwords Longer passwords provide better security

18 Number of Characters Possible CombinationsHumanComputer 1363 minutes seconds 21,3002 hours seconds 347,0003 days.02 seconds 41,700,0003 months1 second 560,000,00010 years30 seconds 103,700,000,000,000, million years59 years Password Protections Average Time to Discover

19 Possessed Objects Any item that you must carry to gain access to a computer or computer facility. (Examples: badges, cards, smart cards & key) Often are used in combination with personal identification numbers. Biometric Devices Authenticates a person’s identify by translating a personal characteristics, such as a fingerprint, into a digital code that is then compared with a digital code stored in the computer to verify a physical or behavioral characteristic Safeguards Against Unauthorized Access And Use

20 Lets Review 1. A back door attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or . Answer Denial of service

21 Lets Review 2.All networked and online computer users should implement a firewall solution. Answer Yes, because a firewall protects a network’s resources from intrusion (software or hardware) by users on another network.

22 Lets Review 3.Computer viruses, worms, and Trojan horses are malware that act with a user’s knowledge. Answer Are classified as malware, but acts without a user’s knowledge and deliberately alters the computer’s operations.

23 Lets Review 4.Shorter passwords provide greater security than longer ones. Answer The longer the password, the more effort required to discover it.

24 Lets Review 5.Updating an antivirus program’s quarantine protects a computer against viruses written since the antivirus program was released. Answer Updating an antivirus program’s signature files protects a computer against viruses written since the antivirus program was release.

25 Theft and Vandalism Hardware Locking doors/windows Install alarm systems Using cables to lock computers to stationary object Install a mini-security system Software piracy —unauthorized and illegal duplication of copyrighted software. License agreement

26 License Agreement Are permitted to Install on only one computer Make one copy of the software as a backup Give or sell the software to another individual, but only is the software is removed from the user’s computer first. Not allowed to: Install the software on a network, such as a school computer lab Give copies to friends and colleagues, while continuing to use the software Export the software Rent or lease the software

27 Theft Information – occurs when someone steals personal or confidential information. Encryption—the process of converting readable data into unreadable characters to prevent unauthorized access. Plaintext--Unencrypted, readable data Ciphertext—is the scrambled (encrypted) data Encryption key—a programmed formula that the recipient of the data uses to decrypt ciphertext.

28 Security Risk System failure – the prolonged malfunction of a computer Safeguards Surge protectors Uninterruptible power supply (UPS) Backup files

29 Let’s Review 1. True or False. An end-user license agreement (EULA) permits users to give copies to friends and colleagues, while continuing to use the software. Answer False, Does not permit users to give copies to friends and colleagues, while continuing to use the software.

30 True or False. Encryption is a process of converting ciphertext into plaintext to prevent authorized access. Let’s Review Answer False. Converting plaintext into ciphertext

31 3. True or False. Mobile users are not susceptible to hardware theft. Let’s Review Answer False. They are susceptible

32 4. True or False. To prevent against data loss caused by a system failure, computer users should restore files regularly. Let’s Review Answer Backup files regularly

33 Did You Know? The penalty for copying software can be up to $250,000, five years in prison, or both?

34 Security Strategies for Protecting Computer Systems and Data Network Sniffer displays network traffic data shows which resources employees use and Web sites they visit can be used to troubleshoot network connections and improve system performance