Computer Security.

Slides:



Advertisements
Similar presentations
CIS 105 Concepts and Terminology Unit 11 CIS 105 Survey of Computer Information Systems Essential Concepts and Terminology Study Unit 11.
Advertisements

CSCI-235 Micro-Computer in Science Privacy & Security.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
Lecturer: Fadwa Tlaelan
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Slides created by Bob Koziel Hagerstown Community College.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Security and Privacy: Computers and the Internet.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
Computers Are Your Future
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer crimes.
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
CSCI-235 Micro-Computer Applications Privacy & Security I.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Security, Social and Legal Issues Regarding Software and Internet
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Computer Security Elaine Munn Introduction to Computer Security.
Computer Technology Notes 5
Scams, Identity Theft, and Viruses Kelly & Caitlin
Who Uses Encryption? Module 7 Section 3.
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
Privacy, Crime, and Security
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
Computer Security.
Securing your system, protecting your digital data and devices.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Computer Security

Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime carried out over the Internet Cyberlaw tracks and combats computer related crime

Computer Crime and Cybercrime Types of Computer Crime Identity Theft Computer Viruses More Rogue Programs Fraud and Theft Forgery Blackmail

Identity Theft Identity theft is one of the fastest growing crimes in the United States and Canada Identity theft occurs when enough information about an individual is obtained to open a credit card account in their name and charge items to that account Examples of information needed are name, address, social security number, and other personal information

Computer Viruses A Computer virus is a hidden code within a program that may damage or destroy the infected files. Viruses replicate and attach themselves to programs in the system There are more than 20,000 different computer viruses with the number growing daily

How Virus Infections Spread

Types of Viruses File Infectors Attach themselves to program files Spread to other programs on the hard drive when the program is executed Are the most common type of virus Boot Sector Viruses Attach themselves to the boot sector of a hard drive Execute each time the computer is started May lead to the destruction of all data

Types of Viruses Macro Viruses Take advantage of the automatic command capabilities created by macros Attach themselves to the data files in word processing, spreadsheet, and database programs Spread when the data files are exchanged between users

More Rogue Programs Time Bombs Also called logic bombs Harmless until a certain event or circumstance activates the program Worms Resemble a virus Spread from one computer to another over computer network. Control and use the resources of infected computers to attack other networked computers

More Rogue Programs Denial of Service Attack (DoS) Also called Syn flooding Overload an Internet server with a large number of requests Trojan Horses cover up themselves as useful programs Contain hidden instructions to perform malicious tasks May erase data or cause other damage

Fraud and Theft Salami Shaving Programmer alters a program to take a small amount of money out of an account Data Diddling Data is altered to hide theft Insiders modify data by altering accounts

Forgery and Blackmail Forgery Internet data can appear to be coming from one source when its really coming from another Forged e-mail and Web pages Blackmail Confronting publicity fears have been used to blackmail financial institutions

Meet the Attackers Hackers Computer hobbyists Find weaknesses and loopholes in computer systems Rarely destructive Adhere to the hacker’s code of ethics Crackers Also called black hats Obsessed with entering secure computer systems Leave calling cards on the systems they enter

Meet the Attackers Virus Authors Usually teenage males Push the boundaries of antivirus software Create viruses that are very damaging Cyber Gangs Group of hackers and crackers working together to coordinate attacks on the Internet

More Attackers Swindlers Use the Internet to scam money from people Typically create bogus work at home opportunities, illegal pyramid scheme, chain letters, get rich quick scheme, etc.

More Attackers Shills Use Internet auctions Secret operatives who bid on a seller’s item to drive up the bid Cyberstalkers and Sexual Predators Using the Internet to repeatedly harass or threaten Children are at risk from sexual predators

Encryption Encryption is the coding and scrambling process by which a message is made unreadable except by the intended recipient Encryption is needed for electronic commerce The potential for encryption's misuse troubles law enforcement officials

Encryption Basics A readable message is called plaintext I LOVE YOU An encryption key is a formula used to make plaintext unreadable The coded message is called ciphertext An encryption technique called rot-13 is used in chat rooms and Usenet discussions I LOVE YOU V YBIR LBH

Encryption Basics Symmetric key encryption are encryption techniques that use the same key to encrypt and decrypt a message Strong encryption refers to encryption methods that are used by banks and military agencies and are nearly impossible to break

The Problem of Key Interception Rot-13 is not a secure encryption system Symmetric key encryption systems are vulnerable to key interception, or having their key stolen

Public Key Encryption Public key encryption uses two different keys Public key is the encryption key Private key is the decryption key They are used in e-commerce transactions A secure channel for information is provided when the keys are used

Digital Signatures and Certificates Public key can be used to implement digital signature Digital signatures are a technique used to guarantee that a message has not been tampered with Digital certificates are a technique used to validate one’s identity Secure Electronic Transactions (SET) are online shopping security standards used to protect merchants and customers from credit card fraud

Summary Many websites collect and store information about Web users Cookies and GUIDs are used to collect data Computer crime and cybercrime Identity theft Computer viruses Rogue programs Forgery Blackmail

Summary Computer criminals Crackers Cybergangs Virus authors Swindlers Shills Cyberstalkers Encryption refers to coding or scrambling data Thank you.