Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Today and Tomorrow 12 th Edition Understanding Computers Chapter 9 Network and Internet Security.
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Chapter 9: Network and Internet Security. Overview This chapter covers: – Security concerns stemming from the use of computer networks and the Internet.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
9 Network and Internet Security CHAPTER TODAY AND TOMORROW
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Today and Tomrrow 12 th Edition Understanding Computers Chapter 9 Network and Internet Security.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Network and Internet Security Chapter 9. 2 Why Be Concerned about Network and Internet Security?  Crime: Illegal activity  Computer crime (cybercrime):
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Protecting People and Information: Threats and Safeguards
Cyber Crimes.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Crime & Malpractice AS Module Heathcote Ch. 10.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Types of Electronic Infection
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Protect Your Computer Against Harmful Attacks!
Computer Security, Ethics and Privacy
Computer Security, Ethics and Privacy
HOW DO I KEEP MY COMPUTER SAFE?
How to keep the bad guys out and your data safe
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Network and Internet Security and Privacy

 Explain network and Internet security concerns  Identify online threats

 Computer crime—or cybercrime—includes any illegal act involving a computer.  Cybercrime is a multibillion-dollar business that is often conducted by seasoned criminals.  All computer users should be aware of the security concerns surrounding computer network and Internet use, and they should take appropriate precautions.

 Unauthorized access - whenever an individual gains access to a computer, network, file, or other resource without permission  Unauthorized use involves using a computer resource for unauthorized activities.  Codes of conduct - publish guidelines for acceptable behavior when using a computer as an employee, student, or other users.  Unauthorized access and many types of unauthorized use are criminal offenses in the United States and many other countries.

 Hacking – the act of breaking into a computer or network.  Typically, the motivation for hacking is to  steal data  sabotage a computer system  “hijack” a computer or network for use in an illegal or unethical act, such as generating spam or hosting pornographic Web sites.  Cyberterrorism—where terrorists launch attacks via the Internet.

 Wi-Fi networks are designed to provide wireless access to networks and the internet  Some estimates indicate that 70% of these networks are unsecured.  War driving typically involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to.  Wi-Fi piggybacking refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location

 Some criminals gain unauthorized access to unsecured data, files, messages, VoIP calls, and other content as it is being sent over the Internet.  Proprietary corporate information and sensitive personal information is at risk if it is sent unsecured over the Internet or over a wireless home or corporate network.  A new trend is criminals intercepting unsecured credit and debit card information during the card verification process; that is, intercepting the data from a card in real time as a purchase is being authorized.

 Specific types of access control systems include the following:  Possessed knowledge access system  Possessed object access system  Biometric access system  Another way to control access to a computer or network is to use a firewall  To protect data from being viewed by unauthorized individuals, you can use encryption CMPTR8

 Topics Covered:  Botnets  Computer Viruses and Other Types of Malware  Denial of Service (DoS) Attacks  Data, Program, or Web Site Alteration  Online Theft, Online Fraud, and Other Dot Cons  Theft of Data, Information, and Other Resources  Identity Theft, Phishing, and Pharming  Protecting Against Identity Theft  Online Auction Fraud and Other Internet Scams

 A computer that is controlled by a hacker or other computer criminal is referred to as a bot or zombie computer.  A group of bots that are controlled by one individual and can work together in a coordinated fashion is called a botnet.  According to the FBI, an estimated one million U.S. computers are currently part of a botnet.

 Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent.  Malware is a general term for;  Viruses  Worms  Trojan horses  Sypware  Dishonest addware  Crimeware  Rootkits

 Computer program designed to copy itself into other programs, with the intention of causing mischief or damage  A virus is loaded into a computer's memory and instructs its host program to copy the viral code into any number of other programs and files stored in the computer.  When the program is started or the file is accessed a fatal error occurs usually causing the program to shut down or in rare cases the computer to crash.

 A computer worm is a type of virus that replicates itself, but does not alter any files on your machine.  Worms cause havoc by multiplying so many times that they take up all your computer's available memory or hard disk space.  This can lead to denial of service.

 A Trojan horses is a software programs that masquerade as a regular program, such as games, disk utilities, and even antivirus programs.  A Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data.

 As the name implies, this is software that "spies" on your computer  Spyware can capture information like Web browsing habits, messages, usernames and passwords, and credit card information.  If left unchecked, the software can transmit this data to another person's computer over the Internet.

 As the name implies, this is software that "spies" on your computer  Spyware can capture information like Web browsing habits, messages, usernames and passwords, and credit card information.  If left unchecked, the software can transmit this data to another person's computer over the Internet.

 Install an antivirus program on all of your computers  Never open an attachment unless you are expecting it and it is from a trusted source  If the antivirus program flags an attachment as infected, delete the attachment immediately  Check all downloaded programs for viruses, worms, or Trojan horses

 Identifies and removes computer viruses  Most also protect against worms and Trojan horses  Most anti-virus programs provide more then just virus protection.

 A denial of service (DoS) attack is an act of sabotage that attempts to flood a network server or Web server with so many requests for action that it shuts down or simply cannot handle legitimate requests any longer, causing legitimate users to be denied service.  DoS attacks today are often directed toward popular sites and typically are carried out via multiple computers known as a distributed denial of service (DDoS) attack.

 Another type of computer sabotage occurs when a hacker breaches a computer system to delete or modify  data  programs  Data on Web sites can also be altered by hackers, for instance, individuals sometimes hack into and alter other people’s social networking accounts.

 A booming area of computer crime involves online fraud, theft, scams, and related activities designed to steal money or other resources from individuals or businesses—these are collectively referred to as dot cons.

 Data theft or information theft is the theft of data or information located on or being sent from a computer.  It can be committed by  stealing an actual computer  it can take place over the Internet or a network by an individual gaining unauthorized access to that data by hacking into the computer or by intercepting the data in transit.  Direct theft of money through the internet is a growing issue

 Identity theft occurs when someone obtains enough information about a person to be able to masquerade as that person—usually to buy products or services in that person’s name.

 Skimming involves stealing credit card or debit card numbers by using an illegal device attached to an ATM or credit card reader  Phishing (pronounced fishing)is the use of a spoofed message to trick the recipient into revealing sensitive personal information, such as credit card numbers.  More targeted, personalized phishing schemes are known as spear phishing.  Pharming is another type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

 Disclosing personal information only when it is necessary and only via secure Web pages.  Use security software and keep it up to date  Shred the preapproved credit card offers and other documents containing personal information that frequently arrive in the mail before recycling them.  Never click a link in an message to go to a secure Web site—always type the URL for that site in your browser CMPTR26

 Protect your Social Security number and give it out only when necessary..  Keep a close eye on your credit card bills and credit history.  Ordering a full credit history on yourself a few times a year to check for accounts listed in your name that you did not open and any other problems.  You can also use browser-based antiphishing tools and digital certificates to help guard against identity theft and the phishing and pharming schemes used in conjunction with identity theft. CMPTR27

 Make sure that when you enter the shopping cart are the address changes to secure socket layer  Look for the following logos at the bottom of the home page of the merchants Web site.

 Online auction fraud (sometimes called Internet auction fraud) occurs when an online auction buyer pays for merchandise that is never delivered, or that is delivered but it is not as represented.  The best protection against many dot cons is common sense.