Challenges We Face On the Internet

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Polling Stations There are four questions posted in the classroom Indicate a “yes” response by placing a tally mark on the white board The results of the.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Threats To A Computer Network
Data Security At Cornell Steve Schuster. Questions I’d like to Answer ► Why do we care about data security? ► What are our biggest challenges at Cornell?
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
IT Security Challenges In Higher Education Steve Schuster Cornell University.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
BUSINESS B1 Information Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
Personal Privacy Rights & Abuses of the Internet Andrew Whalin, Robby Deaver, Manvinder Chohan, Brandon Lott, Erika Wallfred, Shawn McGregor.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 16:Managing Information and Technology. Basic element of computer technology  Hardware: input, store, and organize data  System software: performs.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
Internet Safety. Sexual Predators Sexual Predators Harmful images – disturbing, overly graphic, explicit Harmful images – disturbing, overly graphic,
Computer Skills and Applications Computer Security.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Botnets A collection of compromised machines
Digital Security Identity theft Copyright Laws Plagiarism, and More.
DIGITAL CITIZENSHIP What You Should Know!.
MALWARE Autumn Mattis.
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
Unit 4 IT Security.
Lesson 3 Safe Computing.
CHAPTER 33 Cyberlaw.
COMPUTER CRIME.
Botnets A collection of compromised machines
Lesson 2- Protecting Yourself Online
Philip Nichilo Vincent Carestia
Is your computer being used against you while you sleep?
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Internet Safety for Everyone
Computer Security By: Muhammed Anwar.
Lesson 2- Protecting Yourself Online
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Challenges We Face On the Internet Steve Schuster Cornell University

Questions to be Addressed What is the intent behind security-related incidents and how is this goal achieved? Who is conducting these threats? What are some of the more significant challenges us? Why do we not see more convictions?

What is the Intent? Service disruption Marketing Distribution of copyright material Personal or organizational agendas Harassment Identity theft

Intent -- Service Disruption Definition Cause harm or disruption to computers, networks or the Internet Methods Viruses Worms Denial of service attacks

Intent -- Service Disruption Viruses Typically spread through e-mail Requires human action

Intent -- Service Disruption ISP in New Haven, CT

Intent -- Service Disruption Worms Spread from computer to computer No human action required Denial of service attacks 100’s to 1000’s of computers attacking a single service or site

Intent -- Service Disruption Number of Malicious Programs Detected per Year * Source: http://www.viruslist.com

Intent -- Marketing Definition Methods For the purpose of selling or marketing products Methods Spyware Adware SPAM

Intent -- Marketing Spyware Small applications that are installed on a computer for the purpose of tracking internet usage Speed of computer Speed of network Websites visited Searches made Items purchased Type of credit card used Even experienced Internet users are almost 100 percent likely of getting spyware within 30 days* * McAfee Siteadvisor

Intent -- Marketing Adware Programs that automatically play, display or download advertising material Pop-ups are the best example

Intent -- Marketing SPAM Unsolicited or bulk e-mail messages During December 2005 63 Million mail messages 26.8 Million rejected as SPAM 2.2 Million rejected as viruses

Intent -- Marketing

Intent -- Copyright Distribution Definition Computer compromises that appear to be for the sole purpose of distributing copyright material Some facts About 85% of all computer compromises are for this purpose Automated scripts have been developed to compromise and test computing environment for usefulness Most still use FTP for file transfer

Intent -- Copyright Distribution

Intent -- Pushing an Agenda Definition Actions taken to communicate some agenda Methods SPAM Web defacement

Intent -- Pushing an Agenda

Intent -- Harassment Definition Some facts Probably needs none Typically performed using mail Some are naïve enough to use local mail Most use hotmail, yahoo, msn, etc.

Intent -- Identity Theft Definition Actions taken for the purpose of gaining personally identifiable information Type of data Social security number Bank account numbers Credit card numbers Drivers license numbers Methods Phishing Hacking for databases

Intent -- Identity Theft

Intent -- Identity Theft

Intent -- Identity Theft

Who Does This Stuff? Inquisitive teens On-line businesses Internet “businessmen” Organized crime

Our Biggest Challenges Changing/emerging law Growing social expectations and requirements Our general “openness” can make everyone an easier target Open networks Home users Roaming resources Changing the way data are handled and transmitted Answering institutional questions Complexity due to decentralized IT support complicates the identification of critical or sensitive resources/data Preparing for a legal defense needs to begin now

Some Prosecution Challenges Computer crime is very hard to comprehend Computer analysis is resource intensive and is not always definitive Hiding on the Internet is extremely easy Typically the computer doing the attacking or SPAMing is not at the location of the perpetrator It’s hacked Internet hopping is a major problem The attack does not always come from where it appears to come

?