Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

AP STUDY SESSION 2.
Copyright © 2003 Pearson Education, Inc. Slide 7-1 Created by Cheryl M. Hughes The Web Wizards Guide to XML by Cheryl M. Hughes.
Local Customization Chapter 2. Local Customization 2-2 Objectives Customization Considerations Types of Data Elements Location for Locally Defined Data.
Process a Customer Chapter 2. Process a Customer 2-2 Objectives Understand what defines a Customer Learn how to check for an existing Customer Learn how.
1 Advanced Tools for Account Searches and Portfolios Dawn Gamache Cindy Bylander.
Welcome. © 2008 ADP, Inc. 2 Overview A Look at the Web Site Question and Answer Session Agenda.
Break Time Remaining 10:00.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
PP Test Review Sections 6-1 to 6-6
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
SLP – Endless Possibilities What can SLP do for your school? Everything you need to know about SLP – past, present and future.
Welcome to Instructions and tips for the online application process 1 June 2012.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
Clock will move after 1 minute
Physics for Scientists & Engineers, 3rd Edition
Select a time to count down from the clock above
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Chapter 9: Privacy, Crime, and Security
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Unit 18 Data Security 1.
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Defining Security Issues
Module 13: Ethics and Security in computing Some social issues in computing Division issues, workplace issues, legal issues Division issues, workplace.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
First Look at Security and Privacy Jeremiah Burleson.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Topic 5: Basic Security.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
CSCI-235 Micro-Computer Applications Privacy & Security I.
MIS105 Chapter 14 Security and Privacy. Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe.
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Network and Internet Security and Privacy
Computers: Tools for an Information Age
G061 - Network Security.
Presentation transcript:

Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet

2 Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe the aspects of securing corporate data, including software and data security, disaster recovery plans, and security legislation Describe in general terms how viruses work, the damage they can cause, and procedures used to prevent this damage Explain the threats to personal privacy posed by computers and the Internet. Describe actions you can take to maximize your privacy

3 Security and Privacy Security – data stored on computer must be kept safe Privacy – private data must be kept from prying eyes

4 Computer Crime Hacker – someone who attempts to gain access to computer systems illegally Originally referred to as someone with a high degree of computer expertise Social engineering – a tongue-in-cheek term for con artist actions Persuade people to give away password information Cracker – someone who uses the computer to engage in illegal activity

5 Computer Crime Most commonly reported categories Credit card fraud Data communications fraud Unauthorized access to computer files Unlawful copying of copyrighted software

6 Methods Computer Criminals Use Bomb Data diddling Denial of service attacks Piggybacking Salami technique Scavenging Trapdoor Trojan horse Zapping

7 Bomb Causes a program to trigger damage under certain conditions Usually set to go off at a later date Sometimes planted in commercial software Shareware is more prone to having a bomb planted in it

8 Data Diddling Refers to changing data before or as it enters the system Auditors must verify accuracy of the source data as well as the processing that occurs

9 Denial of Service Attack Hackers bombard a site with more requests than it can possibly handle Prevents legitimate users from accessing the site Hackers can cause attacks to come from many different sites simultaneously

10 Piggybacking An illicit user rides into the system on the back of an authorized user If the user does not exit the system properly, the intruder can continue where the original user has left off Always log out of any system you log into

11 Salami Technique An embezzlement technique where small slices of money are funneled into accounts

12 Scavenging Searching company trash cans and dumpsters for lists of information Thieves will search garbage and recycling bins of individuals looking for bank account numbers, credit card numbers, etc. Shred documents that contain personal information

13 Trapdoor An illicit program left within a completed legitimate program Allows subsequent unauthorized and unknown entry by the perpetrator to make changes to the program

14 Trojan Horse Involves illegal instructions placed in the middle of a legitimate program Program does something useful, but the Trojan horse instructions do something destructive in the background

15 Zapping Refers to a variety of software designed to bypass all security systems

16 White-Hat Hackers Hackers that are paid by a company to break into that companys computer systems Expose security holes and flaws before criminals find them Once exposed, flaws can be fixed

17 Discovery and Prosecution Crimes are often undetected When they are detected, they are often not reported Prosecution is difficult Law enforcement agencies and prosecutors are ill- equipped to handle computer crime Judges and juries often dont understand computer crime Congress passed the Computer Fraud and Abuse Act to increase awareness of computer crime

18 Computer Forensics Uncovering computer-stored information suitable for use as evidence in courts of law Restores files and/or messages that someone has deleted Some experts are available for hire, but most are on the staffs of police departments and law firms

19 Security: Playing It Safe Security – a system of safeguards Protects system and data from deliberate or accidental damage Protects system and data from unauthorized access

20 Controlling Access Four means of controlling who has access to the computer What you have What you know What you do What you are

21 What You Have Requires you to have some device to gain access to the computer Badge, key, or card to give you physical access to the computer room or a locked terminal Debit card with a magnetic strip gives you access to your bank account at an ATM Active badge broadcasts your location by sending out radio signals

22 What You Know Requires you to know something to gain access Password and login name give you access to computer system Cipher locks on doors require you to know the combination to get in

23 What You Do Software can verify scanned and online signatures

24 What You Are Uses biometrics – the science of measuring body characteristics Uses fingerprinting, voice pattern, retinal scan, etc. to identify a person Can combine fingerprinting and reading a smart card to authenticate

25 A Disaster Recovery Plan A method of restoring computer processing operations and data files in the event of major destruction Several approaches Manual services Buying time at a service bureau Consortium Plan should include priorities for restoring programs, plans for notifying employees, and procedures for handling data in a different environment

26 A Consortium A joint venture among firms to support a complete computer facility Used only in the event of a disaster Hot site – a fully equipped computer center Cold site – an empty shell in which a company can install its own computer system

27 Software Security Who owns custom-made software? What prevents a programmer from taking a copy of the program? Answer is well established If the programmer is employed by the company, the software belongs to the company If the programmer is a consultant, ownership of the software should be specified in the contract

28 Data Security Several techniques can be taken to prevent theft or alteration of data Secured waste Internal controls Auditor checks Applicant screening Passwords Built-in software protection

29 Personal Computer Security Physical security of hardware Secure hardware in place with locks and cables Avoid eating, drinking, and smoking around computers

30 Protecting Disk Data Use a surge protector to prevent electrical problems from affecting data files Uninterruptible power supply includes battery backup Provides battery power in the event power is lost Allows users to save work and close files properly Back up files regularly

31 Backing Up Files Back up to tape drive, CD-RW, or DVD-RAM You can use software that automatically backs up at a certain type of day Disk mirroring Makes second copy of everything you put on disk to another hard disk

32 Types of Backup Three types of backup Full backup – copies everything from the hard drive Differential backup – copies all files that have been changed since the last full backup Incremental backup – copies only those files that have been changed since either the last full backup or the last incremental backup Comprehensive backup plan involves periodic full backups, complemented by more frequent incremental or differential backups

33 Computer Pests Worm Virus

34 Worm A program that transfers itself from computer to computer Plants itself as a separate file on the target computers disks Fairly rare SQL Slammer worm disabled many Web servers in January 2003

35 Virus A set of illicit instructions that passes itself on to other files Transmitting a virus Can cause tremendous damage to computer and data files Can be prevented Common computer myths

36 Transmitting a Virus Viral instructions inserted into a game or file Typically distributed via the Web or Users download the file onto their computers Every time the user opens that file, virus is loaded into memory As other files are loaded into memory, they become infected

37 Damage from Viruses Some are benign, but many cause serious damage Some attach themselves to operating systems, where they can affect how the computer works Some delete data files or attempt to reformat your hard disk Macro virus uses a programs own programming language to distribute itself Organizations and individuals spend billions of dollars defending computers against viruses

38 Virus Prevention Antivirus software Detects virus signature Scans hard disk every time you boot the computer Viruses tend to show up on free software or software downloaded from the Internet Use antivirus software to scan files before you load them on your computer Often distributed as attachments Do not open attachments without scanning them or if you do not know the person sending the

39 Virus Myths You cannot get infected by simply being online If you download and execute an infected file, you can get infected Although most viruses are in attachments that must be opened, it is possible to get infected by viewing an You cannot get infected from data If graphics files include a viewer, that program could contain a virus

40 Privacy Where is my data? How is it used? Who sees it? Is anything private anymore? Everything about you is in at least one computer file

41 Privacy: How Did They Get My Data? Loans Charge accounts Orders via mail Magazine subscriptions Tax forms Applications for schools, jobs, clubs Insurance claim Hospital stay Sending checks Fund-raisers Advertisers Warranties Military draft registration Court petition Wed just like a little information about you for our files…

42 Privacy: How Did They Get My Data?

43 Protecting Your Privacy Data you give to organizations is often sold or rented to other organizations Massive databases make it easy and inexpensive to learn almost anything about anybody Legislation exists to protect your privacy

44 Privacy Legislation Fair Credit Reporting Act Freedom of Information Act Federal Privacy Act Video Privacy Protection Act Computer Matching and Privacy Protection Act Health Insurance Portability and Accountability Act

45 Fair Credit Reporting Act Gives you access to your credit information Must be provided free if you have been denied credit Gives you the right to challenge your credit records

46 Freedom of Information Act Allows ordinary citizens to have access to data gathered about them by federal agencies

47 Federal Privacy Act Stipulates there can be no secret personal files Individuals must know what is stored in files about them and how the data will be used Organizations must be able to justify the need to obtain information

48 Video Privacy Protection Act Prevents retailers from disclosing a persons video rental records without a court order

49 Computer Matching and Privacy Protection Act Prevents the government from comparing certain records in an attempt to find a match

50 Health Insurance Portability and Accountability Act Governs the security of health information records Requires employers, health care providers, and insurance companies to take steps to protect employees medical records

51 Security and Privacy Problems on the Internet With so many people on the Internet, how do you keep data secure? Several approaches Using a firewall Encryption Privacy issues Being monitored Junk

52 A Firewall A combination of hardware and software that sits between an organizations network and the Internet All traffic between the two goes through the firewall Protects the organization from unauthorized access Can prevent internal users from accessing inappropriate Internet sites

53 Encryption Scrambling data so that it can only be read by a computer with the appropriate key Encryption key converts the message into an unreadable form Message can be decrypted only by someone with the proper key Private key encryption – senders and receivers share the same key Public key encryption – encryption software generates the key

54 Being Monitored Employers can monitor employees , use of the Internet, and count the number of keystrokes per minute Employees are often unaware they are being monitored Web sites can easily collect information when a user just visits the site Web sites use cookies to store your preferences

55 Cookies A small text file stored on your hard drive File is sent back to the server each time you visit that site Stores preferences, allowing Web site to be customized Stores passwords, allowing you to visit multiple pages within the site without logging in to each one Tracks surfing habits, targeting you for specific types of advertisements

56 Spamming Mass advertising via Can overflow your inbox Bogs down your server, increasing the cost of service Preventing spam

57 Preventing Spam Many ways you can minimize junk Be careful how you give out your address Filtering software allows you to block messages or send them to designated folders Dont register at Web sites without a promise the Web site will not sell your information NEVER respond to spam Anti-spamming legislation is being proposed in many states