Lorenzo Biasiolo 3°AI INFORMATION SECURITY.

Slides:



Advertisements
Similar presentations
Phishing Scams use spoofed s and websites as lures to prompt people to voluntarily hand over sensitive information Phishing s may contain.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
BUSINESS PLUG-IN B6 Information Security.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security+ Guide to Network Security Fundamentals
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
P HI SH I NG !. WHAT IS PHISHING ? In computer security phishing is trying to acquire important information such as; passwords, usernames and credit card.
BUSINESS B1 Information Security.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
C8- Securing Information Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Information Security What is Information Security?
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Topic 5: Basic Security.
Prevent Data Breaches and PII from Walking Out the Door Jim Farrell, Senior Vice President Products Archive Systems 9/18/2015.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer threats, Attacks and Assets upasana pandit T.E comp.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Internet safety. Dangers of a poor password How people guess your password Your partner, child, or pet's name, possibly followed by a 0 or 1 The last.
UNIT-4 Computer Security Classification 2 Online Security Issues Overview Computer security – The protection of assets from unauthorized access, use,
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Internet Security TEAMS March 18 th, ISP:Internet Service Provider.
Network security Vlasov Illia
how to prevent them from being successful
Lesson 3 Safe Computing.
National Cyber Security Month
CS 450/650 Fundamentals of Integrated Computer Security
Lecture 14: Business Information Systems - ICT Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Information Security 101 Richard Davis, Rob Laltrello.
Phishing is a form of social engineering that attempts to steal sensitive information.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Threat Landscape for Data Security
Unit 1.6 Systems security Lesson 2
Prepared By : Binay Tiwari
INFORMATION SYSTEMS SECURITY and CONTROL
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Security.
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
What is Phishing? Pronounced “Fishing”
Test 3 review FTP & Cybersecurity
Spear Phishing Awareness
Security in mobile technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
A Model For Network Security
Presentation transcript:

Lorenzo Biasiolo 3°AI INFORMATION SECURITY

What does computer security mean? The term computer security means that computer science branch that deals with the analysis of threats, vulnerabilities and risks associated with information assets to protect them from possible attacks that could cause damage.

What do they offer to customers? Cyber asset protection is achieved through technical and organizational measures to ensure: integrity property confidentiality properties availability of properties

How important has security become? The interest in the security of computer systems has grown in recent years, proportionally with their spread and their role in society. Many ex-crackers are computer security company executives today.

How to have a secure system The computer system must be able to prevent the direct or indirect alteration of information, either by unauthorized individuals, or due to accidents.

Attacks by unauthorized users The cyber attack protection is obtained by acting on several levels: the first at the physical level the second at the logical level

Accidental events To prevent  accidental events, there are no general solutions, but a first remedy is doing a regular backup of your system.

Data availability Achieving availability depends on several factors that interfere between user and system, such as: basic software robustness, reliability of equipment and the environments in which they are placed.

Most common hazards These are some of the most famous types of dangers in computer science:

Phishing Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details directly from users. Phishing is typically carried out by email trap or instant messaging, and it often directs users to enter details at a fake website whose looks are almost identical to the legitimate one.

Backdoor A backdoor in a computer system is a cryptosystem or an algorithm, or any secret method of bypassing normal authentication or security controls. They may exist for a different number of reason. They may have been added by an authorized subject to allow a legitimate access or by an attacker for malicious reasons.

End