Lecture 8. Cyber Security, Ethics and Trust

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
Unit 18 Data Security 1.
Computer Viruses.
Chapter 14 Computer Security Threats Patricia Roy Manatee Community College, Venice, FL ©2008, Prentice Hall Operating Systems: Internals and Design Principles,
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Viruses & Destructive Programs
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Malicious Logic and Defenses. Malicious Logic Trojan Horse – A Trojan horse is a program with an overt (documented or known) effect and covert (undocumented.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
COMPUTER VIRUSES Computer Technology. What is a Computer Virus? A kind of A kind of Malicious software written intentionallyMalicious software written.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Computer Viruses Author: Alyse Allen.
Security Issues in Information Technology
Chapter Objectives In this chapter, you will learn:
Securing Information Systems
Viruses & Destructive Programs
MALWARE.
Managing Windows Security
Malware and Computer Maintenance
Network Security Basics: Malware and Attacks
3.6 Fundamentals of cyber security
Instructor Materials Chapter 7 Network Security
Lecture 5. Security Threats
COMPUTER VIRUSES Computer Technology.
SEMINAR ON PC SECURITY FROM VIRUSES
Computer Technology Notes 5
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Risk of the Internet At Home
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Computer Security.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Computer Security.
Stay Safe While Using The Internet
HOW DO I KEEP MY COMPUTER SAFE?
Malicious Software Network security Master:Mr jangjou
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Chapter # 3 COMPUTER AND INTERNET CRIME
Malicious Program and Protection
Chapter 14: Protection.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Lecture 8. Cyber Security, Ethics and Trust

Purpose Safety hazards of information and their classification Measures and means of information protection. Enciphering (cryptography) Anti-virus programs

Vocabulary Viruses Worms Trojans Spyware Phishing Adware Riskware Jokes Rootkit Malware firewall Вирусы Черви Трояны Шпионские программы Фишинг Реклама Потенциально опасные программы Шутки Руткит Вредоносные программы брандмауэр

1. Safety hazards of information and their classification Information security (InfoSec), is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. 

Viruses: Boot Sector Virus - targets the boot sector of a hard drive and crucially effects the boot proccess. Network Virus - uniquely created to quickly spread throughout the local area network and generally across the Internet as well. (drives and folders) Macro Virus - infects program files that use macros in the program itself, such as word processors. Polymorphic virus - Type of virus that can change form each time it is executed . It was developed to avoid detection

Viruses: Worms Trojans Spyware Phishing Adware Riskware Jokes Rootkit Spam

Viruses Worms: this type of Malware uses network resources for spreading. Trojans: programs that execute on infected computers unauthorized by user actions; i.e. depending on the conditions delete information on discs, make the system freeze, steal personal information, etc.

Viruses Spyware: software that allows to collect data about a specific user or organization, who are not aware of it. Phishing is a mail delivery whose aim is to get from the user confidential financial information as a rule.

Viruses Logic Bombs - Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc. Stealth - A program that looks harmless, but has harmful code inside. When that software is activated it causes damage to your computer.

Viruses Rootkit - these are utilities used to conceal malicious activity. Jokes - software that does not harm your computer but displays messages that this harm has already been caused, or is going to be caused on some conditions Spam - anonymous, mass undesirable mail correspondence.

A virus is made up of three modes Reproductive Attack Defense

2 Measures and means of information protection Password Protection Software Updates (anti-virus, anti-spyware, etc). Firewall Malware Protection

A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

Cryptography Cryptography (from the Greek Krypto 'hidden' and Grafo 'written') is the study and implementation of techniques to hide information, or to protect it from being read. There are five primary functions of cryptography today: Privacy/confidentiality Authentication Integrity Non-repudiation Key exchange

3 Antivirus software Antivirus software detects, and then prevents, disarms or removes malicious programs or malware, often referred to as 'viruses'.

Best Antivirus Programs 1. 2. 3. 4. 5.

Standards and specifications in the field of information security ISO 27001 - Information security A standard is a document that provides requirements, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. ISO International Standards ensure that products and services are safe, reliable and of good quality. For business, they are strategic tools that reduce costs by minimizing waste and errors, and increasing productivity.  The ISO 27000 family of standards helps organizations keep information assets secure.