Computer Security Fundamentals

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Cyber Safety Assessment Review
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Security, Privacy, and Ethics Online Computer Crimes.
Hands-On Ethical Hacking and Network Defense
Chapter 10 Privacy and Security McGraw-Hill
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Computer Security Fundamentals
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Jobs for Montana's Graduates B12L2PP1.  If you apply for a job, chances are you will be asked to sign a consent form for a background check.  Employers,
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
Chapter 2 Modern Private Security
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
6-1 McGraw-Hill/IrwinCopyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. fundamentals of Human Resource Management 3 rd edition by.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
Computer Ethics.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web 1 Component 4/Unit 2Health IT Workforce Curriculum.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
Unit 2 Lesson 2.05 Social Networking Ethics & Responsibility.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Assessing a Target System Source: Chapter 3 Computer Security Fundamentals Chuck Easttom Prentice Hall, 2006.
 Facebook is a public social network, and employers think they have the right to view the information on Facebook.  One signs the ‘fine print’ allowing.
Computer Security Fundamentals by Chuck Easttom Chapter 11 Network Scanning and Vulnerability Scanning.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Online Journalism in Agricultural Communication Agricultural Communication and Leadership.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Monitoring Employees on Networks
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
RACIAL DISPARITIES IN THE LAW Created by: Cathi, Nicole, Eunice and Jeanell.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Copyright © 2014 by the McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin FUNDAMENTALS OF HUMAN RESOURCE MANAGEMENT 5 TH EDITION BY R.A.
Copyright © 2008 by John Wiley & Sons, Inc. All rights reserved CHAPTER 9 Applications, Interviews, and Background Checks.
Computer Security Fundamentals
Creating your online identity
Chapter 2 Modern Private Security
Add video notes to lecture
Learn how to protect yourself against common attacks
Legal and Ethical Responsibilities
IT Security  .
You and the Legal System
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
How to build a good reputation online
FERPA Family Educational Rights and Privacy Act of 1974
Digital Footprints & Cyber Security Written by:
Technology, Careers, and Job Hunting
Lesson 2- Protecting Yourself Online
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web Lecture 4 This material was developed by Oregon.
Warrior Wednesday DIGITAL CITIZENSHIP.
The Art of Deception.
BCT 2.00 Analyze Technology Issues
Family Educational Rights & Privacy Act (FERPA)
Computer Security Fundamentals
Behind the Machine “The Good, The Bad, and the Ugly”
The Health Insurance Portability and Accountability Act
Freedom of Information Act
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Lesson 2- Protecting Yourself Online
Presentation transcript:

Computer Security Fundamentals by Chuck Easttom Chapter 13 Cyber Detective

Chapter 13 Objectives Find contact information on the web Locate court records on the web Locate criminal records on the web Use Usenet newsgroups to gather information We no longer live all our lives in the small towns where we were born. People move into and out of our lives constantly. Corporate moves, job losses, educational opportunities, and many other reasons cause a constant shifting in our neighbors and co-workers. Our busy lives do not allow us to know people as well as we used to. Information gathering is a way to protect ourselves, both personally and on the job. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction Preceding chapters have examined these topics: Identity theft Hacking Investigating potential employees © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction (cont.) Identity theft Criminals use a small amount of information to garner more. Look at Internet techniques for finding additional information. Security personnel need to know how this is done to defend against it. Any small bit of information about you can be turned into another bit that, combined with another, can result in a social engineering coup! Each of these steps is just one brick at a time in the wall. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction (cont.) Hacking Investigating potential employees Obtain information to social engineer or to guess passwords. Investigating potential employees Calling references may not be enough. Hiring a private detective may be impractical. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction (cont.) Network administrators in particular must be investigated. The network cannot keep out the person who set it up. Information about his past from a source other than supplied references may affect the hiring decision. Remember that 80% of security policy violations are perpetrated by network techs. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction (cont.) The Internet is a valuable investigative tool. Useful for finding out about potential employees, babysitters, and so forth. Much of the information is free. States have court records online. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Introduction (cont.) Information is a two-edged sword. An innocent person may use it for legitimate investigations. A less scrupulous person may use it for identity theft or stalking. Invasion of privacy has ethical, moral, and legal ramifications. Practice searches on your own name unless you have written consent. Be careful. Have consent before you search a potential hire, business partner, babysitter, and so forth. Their refusal will tell you something! © 2016 Pearson, Inc. Chapter 13 Cyber Detective

General Searches Search to find addresses, phone numbers, or e-mail addresses www.yahoo.com www.infobel.com www.smartpages.com www.theultimates.com/white www.bigfoot.com www.whowhere.com www.switchboard.com © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Court Records and Criminal Checks Sex offender registries www.fbi.gov/hq/cid/cac/registry.htm You may not be able to base employment decisions on certain information. Check with an attorney first. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Court Records and Criminal Checks (cont.) Civil court records Civil issues, as well as crimes, may make a person unsuitable for a particular job. No centralized Web site for these issues. Many states and Federal courts offer online records, for example: www.oscn.net/applications/oscn/casesearch.asp © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Court Records and Criminal Checks (cont.) Other resources The National Center for State Courts www.ncsconline.org/ The Law School at Emory University www.law.emory.edu/FEDCTS/ Public record finder www.freeprf.com/ © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Court Records and Criminal Checks (cont.) Other resources Pacer www.pacer.psc.uscourts.gov/ The Boost www.theboost.net/court_records/ State public access ctl.ncsc.dni.us/publicaccess/ © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Court Records and Criminal Checks (cont.) Other resources Prison searches www.ancestorhunt.com/prison_search.htm Federal prison records www.bop.gov Public records www.searchsystems.net/ United Kingdom public records www.pro.gov.uk © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Usenet Newsgroups on many subjects. Use Google “Groups” option. Anyone can post anything . Search for potential employees. Can be an important investigative tool. Information must be verified elsewhere. Be careful. Take what you find with a grain of salt. Use it to verify other information you may have, or look for more information to verify what you find here. Anyone can say anything on Usenet, whether true or false. Also, keep in mind that many people post to Usenet under pseudonyms—you may be more successful gathering information about companies than data about individuals. © 2016 Pearson, Inc. Chapter 13 Cyber Detective

Summary The Internet is a valuable investigative resource To hackers and identity thieves To employers of network administrators as well as babysitters Periodically check your own identity to see what information is available. Keep on top of your own identity in this way. © 2016 Pearson, Inc. Chapter 13 Cyber Detective