By: Joshua DeLong Computer Security and Privacy.

Slides:



Advertisements
Similar presentations
Ethics, Privacy and Information Security
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Chapter 9: Privacy, Crime, and Security
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
1 Telstra in Confidence Managing Security for our Mobile Technology.
FIT3105 Security and Identity Management Lecture 1.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET SAFETY FOR EVERYONE
BY : Khader Al-Rasheed  An operating system assembled under the model of free and open source software development and distributions.  it’s.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
Unit 19 INTERNET SECURITY
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
You, Me & Technology. Overview Technology –Our relationship with technology Threats –What, Who, When, Where, Why & How Protection –What we can do to protect.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
Introduction to Computer Ethics
Copyright © 2004 Pearson Education, Inc. Slide 5-1 Securing Channels of Communication Secure Sockets Layer (SSL): Most common form of securing channels.
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
1 Protecting Consumers from Themselves Presented by the State Information Security Office & the California Office of Privacy Protection September 13, 2007.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
1 IT Security in the Commonwealth Sam A. Nixon Jr. Chief Information Officer of the Commonwealth Michael Watson Commonwealth Chief Information Security.
Copyright Prentice-Hall, Inc Computers in Society: Today Chapter 10.
By Hyrum Wines  2. Anti-spyware: A spyware is a program which collects private information and sends it to its programmer. Spywares are considered.
Ethics. Ethics are the principles and standards we use to decide how to act.
Small Business Security Keith Slagle April 24, 2007.
Computer and Internet Security By: Steven Siggers Instructor: Dr. Marko Puljic.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
A Quick and Easy Crash Course Internet Safety for Everyone.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
By: Austen Perelman-Hall COSC 101 Presentation.  What is a worm? What is a virus?  What is the Red Worm?  Where did it come from? Causes  Effects.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Windows Tutorial 5 Protecting Your Computer
INTERNET SAFETY FOR EVERYONE
Managing Windows Security
Homeland Security: Computer Protection
E-commerce companies Here the focus is on the different business models for selling online: Business-to-consumer (B2C): when a company sells to an individual;
Network security threats
The Impact Of ICT “Hacking”
Protect Your Computer Against Harmful Attacks!
Internet Safety for Everyone
The Internet of Unsecure Things
Prepared By : Binay Tiwari
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
Internet Safety for Everyone
INTERNET SECURITY.
Presentation transcript:

By: Joshua DeLong Computer Security and Privacy

The need for information Major corporations spend millions of dollars each year to secure their Web sites and networks, yet it seems everyday there are new reports of attacks and vulnerabilities The more people are aware of the dangers and privacy infringements that are obligated to crackers, the safer your computer experience will be.

The Right to Privacy  National Security Agency  Federal Bureau of Investigation  National Infrastructure Protection Center  Microsoft Corporation

Networks and PCs

 Firewalls  Encryption  Security Codes and Passwords  Viruses, worms, hackers, and crackers

Hackers and Crackers A hacker is a person who is very knowledgeable in programming, but do not do anything malicious against other computers. Hackers crave knowledge Created Linux and Unix A cracker is a person who knows enough about programming to get by and illegally breaks-in to computer systems with the intent to do bodily harm. Today’s best beta testers and programmers are hackers and crackers

Thank you Are there any Questions?

Bibliography Meade. “Security Recommendation Guides.” National Security Agency (2001) (Accessed 4 July 2002) Freeh. “Congressional Statement.” FBI Press Room (2000) (Accessed 5 July 2002) Eddy. “Microsoft offers sneak peek.” CNN (1998) (Accessed 5 July 2002) “Internet Security Firewall.” CNET Software Reviews (2002) (Accessed 1 July 2002) “PGP Freeware.” MIT Distribution Site (2002) (Accessed 10 July 2002) “SSL.” Webopedia (2002) (Accessed 4 July 2002) “Access Security Code of Practice.” Consumer Act (1992) (Accessed 15 July 2002) “Latest Virus Threats.” Symantec Security Response (2002) (Accessed 8 July 2002) Raymond. “What’s the difference between a hacker and a cracker?” (2001) (Accessed 17 July 2002) Tycoon. “Preamble” GNU General Public License (1991) (Accessed 28 June 2002)