Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.

Slides:



Advertisements
Similar presentations
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
 A viruses is a program that can harm or track your computer. E.g. browser hijacker.  When a viruses accesses the computer it can accesses the HDD and.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
Information Systems Design and Development Security Precautions Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Common Methods Used to Commit Computer Crimes
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Protection from Internet Theft By James Seegars

What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer file or network) illegally or without authorization.

Who are the Hackers Stereotype – Anti-social, creepy, maybe (Fat), person in the basement of their parents house, usually very intelligent or good with computers Truth – Anybody can be hackers now.

How Does one Hack? This can be answered in a variety of different ways. – Spyware- is a software that aids in gathering of information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge.

Hacking Cont. Vulnerability scanner – A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses. Hackers also commonly use port scanners. Port scanner- Software that probes a server or host for open ports.

Still Cont. Password cracking – Process of getting passwords from data that has been stored in or transmitted by a computer system. – Can also be done by just guessing passwords.

Packet Sniffer A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.

Rootkit A rootkit is designed to conceal a attack of a computer's security, and can represent any of a set of programs which work to take control of an operating system from its owners. Usually, a rootkit will hide its installation and attempt to stop its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the owner to detect the program on the system by looking at process tables.

Social Engineering This is when hackers use alternative methods to get into systems. By ing spyware by masquerading as a customer or any variety of thing to get information on the system.

Trojans I’m not talking bout the condoms either. It’s usually a virus that looks like one thing but is something else. Try to open up a backdoor to systems.

Viruses We all now what these are. At least I hope.

Worms Similar to a virus but doesn't attach itself to any program to replicate. It also goes through entire networks.

Key logger Well kind of self explanatory. It is a program like a virus or trojan that installs itself on a computer and records key strokes for later uses.

What can we do to stop this? Update your computer regularly along with your virus protection(Norton etc). Don’t download unsafe programs or open from people you don’t know. Have a firewall on your computer. Check your firewall and make sure there have not been any attacks on your computer or network.

Identity Theft This happens when you get hacked and they get important info(Solcial Security Number, Address, Phone Number etc.) When this happens 1 of 2 things happened – 1) you got hacked and information about you was stolen and they used that to steal your identity. – 2) Or a company that has your information got hacked and they are at fault for you losing credit or money.

Things that help Have a company that can protect from identity theft (Lifelock etc.)

Problem with hackers If they are good enough and actually want in your system, they can get in. It’s impossible to make a perfect system that will protect you completely from hackers. All you can do is make it harder for them to get at you.

References Record Data Breaches in (2008). Information Management Journal, 42(2), 16. Gilman, N. N. (2009). Hacking goes pro [engineering security]. Engineering & Technology ( ), 4(3), doi: /et The Cybersecurity Risk. (2012). Communications of the ACM, 55(6), doi: / Sturdevant, C. (2005). Best defense is good offense. Eweek, 22(12), Hacking Attacks - Prevention. (n.d.). High Traffic Web Hosting | Dedicated Hosting | Dedicated Servers | Web Hosting | Reseller Hosting | Managed Hosting | Remote Backup Storage | Server Security // Crucial Paradigm. Retrieved May 8, 2013, from optimization/hackingattacks- prevention.php