Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Threats and Attacks Principles of Information Security, 2nd Edition
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Issues Raised by ICT.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
IT security By Tilly Gerlack.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
Security, Social and Legal Issues Regarding Software and Internet.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Securing Information Systems
Security, Social and Legal Issues Regarding Software and Internet
Hotspot Shield Protect Your Online Identity
3.6 Fundamentals of cyber security
CYBER SECURITY...
IT Security  .
Security, Social and Legal Issues Regarding Software and Internet
Understanding the Need for Security Measures
Securing Information Systems
Understanding the Need for Security Measures
Computer Security.
WJEC GCSE Computer Science
Presentation transcript:

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.

McGraw-Hill Technology Education Chapter 14A Understanding the Need for Security Measures

14A-3 Basic Security Concepts Threats –Anything that can harm a computer –Vulnerabilities are weaknesses in security –Security attempts to neutralize threats

14A-4 Basic Security Concepts Degrees of harm –Level of potential damage –Include all parts of system Potential data loss Loss of privacy Inability to use hardware Inability to use software

14A-5 Basic Security Concepts Countermeasures –Steps taken to block a threat –Protect the data from theft –Protect the system from theft

14A-6 Threats To Users Identity Theft –Impersonation by private information Thief can ‘become’ the victim –Reported incidents rising –Methods of stealing information Shoulder surfing Snagging Dumpster diving Social engineering High-tech methods

14A-7 Threats To Users Loss of privacy –Personal information is stored electronically –Purchases are stored in a database Data is sold to other companies –Public records on the Internet –Internet use is monitored and logged –None of these techniques are illegal

14A-8 Threats to Users Cookies –Files delivered from a web site –Originally improved a site’s function –Cookies now track history and passwords –Browsers include cookie blocking tools

14A-9 Threats to Users Spyware –Software downloaded to a computer –Designed to record personal information –Typically undesired software –Hides from users –Several programs exist to eliminate

14A-10 Threats to Users Web bugs –Small programs embedded in gif images –Gets around cookie blocking tools –Companies use to track usage –Blocked with spyware killers

14A-11 Threats to Users Spam –Unsolicited commercial –Networks and PCs need a spam blocker Stop spam before reaching the inbox –Spammers acquire addresses using many methods –CAN-SPAM Act passed in 2003

14A-12 Threats to Hardware Affect the operation or reliability Power-related threats –Power fluctuations Power spikes or browns out –Power loss –Countermeasures Surge suppressors Line conditioners Uninterruptible power supplies Generators

14A-13 Threats to Hardware Theft and vandalism –Thieves steal the entire computer –Accidental or intentional damage –Countermeasures Keep the PC in a secure area Lock the computer to a desk Do not eat near the computer Watch equipment Chase away loiterers Handle equipment with care

14A-14 Threats to Hardware Natural disasters –Disasters differ by location –Typically result in total loss –Disaster planning Plan for recovery List potential disasters Plan for all eventualities Practice all plans

14A-15 Threats to Data The most serious threat –Data is the reason for computers –Data is very difficult to replace –Protection is difficult Data is intangible

14A-16 Threats to Data Viruses –Software that distributes and installs itself –Ranges from annoying to catastrophic –Countermeasures Anti-virus software Popup blockers Do not open unknown

14A-17 Threats to Data Trojan horses –Program that poses as beneficial software –User willingly installs the software –Countermeasures Anti-virus software Spyware blocker

14A-18 Threats to Data Cybercrime –Using a computer in an illegal act –Fraud and theft are common acts

14A-19 Threats to Data Internet fraud –Most common cybercrime –Fraudulent website –Have names similar to legitimate sites

14A-20 Threats to Data Hacking –Using a computer to enter another network –Cost users $1.3 trillion in 2003 –Hackers motivation Recreational hacking Financial hackers Grudge hacking –Hacking methods Sniffing Social engineering Spoofing

14A-21 Threats to Data Distributed denial of service attack –Attempt to stop a public server –Hackers plant the code on computers –Code is simultaneously launched –Too many requests stops the server

14A-22 Threats to Data Cyber terrorism –Attacks made at a nations information –Targets include power plants –Threat first realized in 1996 –Organizations combat cyber terrorism Computer Emergency Response Team (CERT) Department of Homeland Security

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14A End of Chapter