The Need for Information Security(2) Lecture 3. Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing.

Slides:



Advertisements
Similar presentations
Let’s Talk About Cyber Security
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Computer Viruses.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Threats and Attacks Principles of Information Security, 2nd Edition
The Need for Security Chapter 2 Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616),
Our bad neighbor makes us early stirrers, Which is both healthful and good husbandry. -- William Shakespeare (1564–1616), King Henry, in Henry V, act 4,
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Hands-On Ethical Hacking and Network Defense Chapter 3 Network and Computer Attacks.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Unit 2 - Hardware Computer Security.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Hacker Zombie Computer Reflectors Target.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
1 E-Commerce Security Part I – Threats. 2 Objectives Threats to –intellectual property rights –client computers –communication channels between computers.
The Need For Security Our bad neighbor makes us early stirrers,
Chapter 3 Network and Computer Attacks. Objectives After reading this chapter and completing the exercises, you will be able to: Describe the different.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
 a crime committed on a computer network, esp. the Internet.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
CE3031 The Need for Security Slides based on Whitman, M. and Mattord, H., Principles of Information Security; Thomson Course Technology 2003.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
The Need For Security. Slide 2 Business Needs First, Technology Needs Last Information security performs four important functions for an organization:
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
Security and Ethics Safeguards and Codes of Conduct.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Call Us: (Toll Free)
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
1. It means Defending information from unauthorized access, use, disclosure, modification, recording or destruction. Sli de 2.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Information Security Unit - 1.
MALWARE Autumn Mattis.
3.6 Fundamentals of cyber security
CYBER SECURITY...
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Malware CJ
Presentation transcript:

The Need for Information Security(2) Lecture 3

Slide 2 Information Extortion  Information extortion is an attacker or formerly trusted insider stealing information from a computer system and demanding compensation for its return or non-use  Extortion found in credit card number theft

Slide 3 Sabotage or Vandalism  Individual or group who want to deliberately sabotage the operations of a computer system or business, or perform acts of vandalism to either destroy an asset or damage the image of the organization  These threats can range from petty vandalism to organized sabotage  Organizations rely on image so Web defacing can lead to dropping consumer confidence and sales  Rising threat of hacktivist or cyber- activist operations – the most extreme version is cyber-terrorism

Slide 4 Deliberate Acts of Theft  Illegal taking of another’s property - physical, electronic, or intellectual  The value of information suffers when it is copied and taken away without the owner’s knowledge  Physical theft can be controlled - a wide variety of measures used from locked doors to guards or alarm systems  Electronic theft is a more complex problem to manage and control - organizations may not even know it has occurred

Slide 5 Deliberate Software Attacks  When an individual or group designs software to attack systems, they create malicious code/software called malware  Designed to damage, destroy, or deny service to the target systems  Includes:  macro virus  boot virus  worms  Trojan horses  logic bombs  back door or trap door  denial-of-service attacks  polymorphic  hoaxes

Slide 6 Deliberate Software Attacks  Virus is a computer program that attaches itself to an executable file or application.  It can replicate itself, usually through an executable program attached to an .  The keyword is “attaches”. A virus can not stand on its own.  You must prevent viruses from being installed on computers in your organizations.

Slide 7 Deliberate Software Attacks  There is no foolproof method of preventing them from attaching themselves to your computer  Antivirus software compares virus signature files against the programming code of know viruses.  Regularly update virus signature files is crucial.

Slide 8 Deliberate Software Attacks  A worm is a computer program that replicates and propagates itself without having to attach itself to a host.  Cost businesses millions of dollars in damage as a result of lost productivity  Computer downtime and the time spent recovering lost data, reinstalling programming's, operating systems, and hiring or contracting IT personnel.

Slide 9 Deliberate Software Attacks  Trojan Programs disguise themselves as useful computer programs or applications and can install a backdoor or rootkit on a computer.  Backdoors or rootkits are computer programs that give attackers a means of regaining access to the attacked computer later.

Slide 10

Slide 11 Deliberate Software Attacks  Challenges:  Trojan programs that use common ports, such as TCP 80, or UPD 53, are more difficult to detect.  Many software firewalls can recognize port-scanning program or information leaving a questionable port.  However, they prompt user to allow or disallow, and users are not aware.  Educate your network users.  Many Trajan programs use standard ports to conduct their exploits.

Slide 12 Deliberate Software Attacks  Spyware  A Spyware program sends info from the infected computer to the person who initiated the spyware program on your computer  Spyware program can register each keystroke entered.   Adware  Main purpose is to determine a user’s purchasing habits so that Web browsers can display advertisements tailored to that user.  Slow down the computer it’s running on.  Adware sometimes displays a banner that notifies the user of its presence  Both programs can be installed without the user being aware of their presence

Slide 13 Protecting against Deliberate Software Attacks  Educating Your Users  Many U.S. government organizations make security awareness programs mandatory, and many private-sector companies are following their example.  monthly security updates to all employees.  Update virus signature files as soon as possible.  Protect a network by implementing a firewall.  Avoiding Fear Tactics  Your approach to users or potential customers should be promoting awareness rather than instilling fear.  When training users, be sure to build on the knowledge they already have.

Slide 14 Compromises to Intellectual Property  Intellectual property is “the ownership of ideas and control over the tangible or virtual representation of those ideas”  Many organizations are in business to create intellectual property  trade secrets  copyrights  trademarks  patents

Slide 15 Compromises to Intellectual Property  Most common IP breaches involve software piracy  Watchdog organizations investigate:  Software & Information Industry Association (SIIA)  Business Software Alliance (BSA)  Enforcement of copyright has been attempted with technical security mechanisms

Slide 16 Forces of Nature  Forces of nature, force majeure, or acts of God are dangerous because they are unexpected and can occur with very little warning  Can disrupt not only the lives of individuals, but also the storage, transmission, and use of information  Include fire, flood, earthquake, and lightning as well as volcanic eruption and insect infestation  Since it is not possible to avoid many of these threats, management must implement controls to limit damage and also prepare contingency plans for continued operations

Questions