MIS650 Introduction.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Introduction and Overview of Digital Crime and Digital Terrorism
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Security in Banking Emmanuel van de Geer Senior Architect Governance, Risk,
Social Issues in the United Kingdom
Chapter 10 Crimes Against Property. How has our society developed techniques or habits that have lowered the number of property related crimes?
JEANNETTE SENIOR HIGH SCHOOL Crime in America. The Nature of Crimes Crime – Something one does or fails to do in violation of a law Crimes are behaviors.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Information Warfare Theory of Information Warfare
Lecture 1: Overview modified from slides of Lawrie Brown.
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Chapter 1 Introduction to Security
Presented By: Vinay Kumar.  At the time of invention, Internet was just accessible to a small group of pioneers who wanted to make the network work.
Reliability and Security. Security How big a problem is security? Perfect security is unattainable Security in the context of a socio- technical system.
Threats and Attacks Principles of Information Security, 2nd Edition
CYBER CRIME AND SECURITY TRENDS
Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore
Author: Andy Reedftp://topsurf.co.uk/reed FdSc IT/Computer Networking & IT(e-commerce) Communications Network Management An Introduction to Security.
Computer Crime and Information Technology Security
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Fundamentals of Information Systems Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Cyber crime & Security Prepared by : Rughani Zarana.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
Cosc 4765 Security?. This system is secure. This will make your network secure We have secure e-commerce. What does that mean? Secure from what or whom?
Unethical use of Computers and Networks
Information Warfare Playgrounds to Battlegrounds.
Security Management Practices General overview of good security management processes. Introduces topics used in several other sections.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Securing the Network.
Chapter 10: Crimes Against Property
“The act of gaining unauthorized access to computer systems (cracking) should not be criminalized assuming that there is no damage.” Dan Garrison Megan.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Threat Modeling and Risk Management John R Durrett January 2003 Primarily from Building Secure Linux Servers ( ) and Secrets and Lies ( )
Aksana Chornenkaya, Sherin Hassan, & Meagan Moore.
Larry J. Siegel Valerie Bell University of Cincinnati, Cincinnati, OH Chapter Twelve Enterprise Crime: White-Collar Crime, Cyber.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Essentials Of Business Law Chapter 3 Criminal Law Copyright © 2007 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin.
Why Cryptography is Harder Than It Looks
Chap1: Is there a Security Problem in Computing?.
Information Warfare Playgrounds to Battlegrounds.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Computer crimes.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Crime Any act that is labeled as such by those in authority, is prohibited by law, and is punishable by the gov’t.
July 1, 2004Computer Security: Art and Science © Matt Bishop Slide #1-1 Chapter 1: Introduction Components of computer security Threats Policies.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Computer Security Threats
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
Crimes Against Property Chapter 10. Arson and Vandalism Malicious burning of property Crime whether you own building or not May lead to other more, serious.
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Cyber crime and security issues
S ECURE E-S YSTEMS AS A COMPETITIVE ADVANTAGE IN A GLOBAL MARKETS By Cade Zvavanjanja Cybersecurity Strategist By Cade Zvavanjanja Cybersecurity Strategist.
Information Warfare Summary. Information Security Information Assurance Information Warfare Information Dominance.
Computer Security Incidents
Financial Institutions – Cyber Risk
Threats By Dr. Shadi Masadeh.
E-BANKING RISK MANAGEMENT
Cyber Crimes Chunlian QU 9/18/2018.
Five Unethical Uses of Computers
Policy Matters: Innovation, Balkanization and the Government’s Role
Computer Security Incidents
Strategic threat assessment
Ethical Hacking ‘Ethical hacking’ is the branch of computer science that involves cybersecurity and preventing cyberattacks. Ethical hackers are not malicious.
CCP 420: FRAUD DETECTION AND MANAGEMENT
Section Outline Crimes Against People Murder Manslaughter
Chapter 1 Key Security Terms.
Presentation transcript:

MIS650 Introduction

Is the world a safe place? Cultural assumptions regarding Trust Optimism versus pessimism Ethics

Security Trade-offs Security is not an isolated good. It is intertwined with other activities, e.g. transactions Security involves costs. Understanding those costs is key.

Security Concepts Security is about preventing adverse consequences from the intentional and unwarranted actions of others. From the view of the defender Attacks Attackers Countermeasures Aimed at Assets Role of Technology?

Types of Attack What’s the same Theft Embezzlement Vandalism Exploitation Fraud Extortion Threat of harm Privacy violations

Types of Attack What’s different Automation Class Breaks Action at a distance Propagation of techniques

Attack Types Schneier’s classification By attacker motive Criminal attacks Privacy violations Publicity attacks Legal attacks By attacker motive Financial or other gain To damage others

Adversaries Those classified as criminals Hackers Lone Criminals Malicious Insiders Organized Crime Terrorists

Adversaries Those with claims of legitimacy Industrial spies The press The police National Intelligence Organizations Infowarriors