Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
Thank you to IT Training at Indiana University Computer Malware.
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Crime and Security in the Networked Economy Part 4.
Everything your business needs to know but probably doesn’t.
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Chapter 4: File Management, Virus Protection, and Backup
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
R. Stewart Fayetteville High School VIRUSES Computer Technology Day 21.
®® Microsoft Windows 7 for Power Users Tutorial 10 Backing Up and Restoring Files.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 9 Optimizing and Protecting Hard Drives.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Lecture 8: Files and Viruses Tonga Institute of Higher Education IT 141: Information Systems.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Computer Concepts – Illustrated 8th edition
Study of Computer Virus Worms Sampath Yerramalla 04/17/02.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
1 Higher Computing Topic 8: Supporting Software Updated
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
VIRUSES Computer Technology M. Guymon Pleasant Grove High School Spring 2003 Modified by M. Corbett Lehi Junior High School Spring 2006.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
信息处理技术 Technology of Information Processing 潘晟旻 Instructor: Pan Shengmin 潘晟旻 Computer Center. Kun Ming University of Science & Technology.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
We are here to help you… Fight something like this Brownies !
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
Computer security By Isabelle Cooper.
VIRUS.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
 Stealth viruses Use certain techniques to avoid detection.  Macro Viruses Infects the macros within a document or template.  Polymorphic viruses Encrypt.
COMPUTER VIRUSES Computer Technology. Computer Virus Set of program instructions that attaches itself to a file, reproduces itself, and/or spreads to.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter 6 Protecting Your Files
Chapter Objectives In this chapter, you will learn:
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
Computer Technology Day 21
Viruses.
Presentation transcript:

Data Security Unit F

Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict Access Use Antivirus Software

Objectives Introduce Data Backup Examine Backup Procedures Explore Backup Hardware and Media Explore Backup Strategies Explore Backup Software

What Can Go Wrong Operator errors –Direct source input device (scanners) Software errors Power Failures –Power spike –Power surge –UPS (Uninterruptible Power Supply) –Surge strip vs. power strip –Unplug during storm

Data Security Issues Hardware failure: data loss possible MTBF: mean time between failures is a reliability measurement Physical damage from smoke, fire, water, breakage, theft Data vandalism like viruses and hackers

How You Can Protect Yourself Data security are the techniques that provide protection for your data Risk management is the process of weighing threats to computer data vs. the amount of expendable data and the cost of protecting crucial data Disaster Recover Centers provide emergency computing facilities

Computer Virus A set of program instructions that attaches itself to a file, reproduces itself and spreads to other files.

Computer Virus – It’s a CRIME!! Trigger event (payload) often keyed to specific date Can be classified by types of files they infect: –File virus (games) –Boot sector virus (system files) –Macro virus (applications)

Trojan Horse A computer program that seems to perform one function while actually doing something else. Good at stealing passwords

Worms Designed to spread from computer to computer Travels within and TCP/IP packets Love Bug Some flood network with useless traffic causing Denial of Service attacks

How Viruses Spread Shared files attachments –Usually have.exe extensions –Cannot infect you if you don’t open them –Two extension filenames highly suspect messages –HTML format can spread them Web site downloads Macro viruses in attachments or files on disk

Virus Symptoms Vulgar/annoying messages displayed on computer Unusual visual or sound effects Difficulty saving files or files disappear Computer very slow Computer reboots unexpectedly Executable files increase in size unaccountably Computer sends out s on its own

Restricting User Access Physically –Restrict access to computer area –Keep backup disks in locked vault –Keep offices locked –Keep computer case locked Restrict data access to authorized users –Passwords –User rights

Restricting User Access Personal identification –Something a person carries (badge) –Something a person knows (IDs and passwords) –Some unique physical trait (biometrics) Fingerprint Scanner Retinal Scanner

Antivirus Software A set of utility programs that looks for and eradicates a wide spectrum of problems, such as viruses, Trojan horses and worms.

Antivirus Protection Methods File length Checksum Virus signature

Viruses Escape By: Multi-partite viruses infect multiple target types Polymorphic viruses mutate by changing signature Stealth viruses remove their signatures Retro viruses attack antivirus software

Other Virus Issues Keep antivirus software running full-time in background Easier to keep virus out than to eradicate it Keep your software updated with new versions Not 100% reliable

Virus Hoaxes containing dire warnings Strategy to avoid the virus Recommends ing friends Usually have long list of people in To: and CC: boxes Recommends dangerous procedure for eradicating virus

Data Backup Backup: copy one or more files in case the original files become damaged Restore: copy the backup files back onto a hard disk Full vs. partial backups Software files vs. data files Keep all data files in My Documents

Important Files to Backup Internet connection data folders address book Favorite URLs Downloads Windows Registry

Backup Procedures Full backup: all files Differential backup: only files added/changed since last full backup Incremental backup: only files added/changed since any backup

Backup Hardware and Media Tape Drives: best for PCs –Inexpensive –Can hold entire hard drive –1 GB in minutes Floppy disks, Zip disks Writable CDs and DVDs: slower than tape Second hard disk drive: least reliable Remote storage on network for a fee

Backup Strategies Run up-to-date antivirus software before backing up Create a boot disk –Recovery CD from computer manufacturer –Windows Startup Disk –Rescue disk created from antivirus software

Backup Strategies Decide on storage medium Make rotating sets of backups Test backups Store backups in safe place 123

Backup Software Copy Disk utility via operating system Backup software from –Windows, Accessories, System Tools –Supplied with backup devices Keep original backup software CD

TechTalk: Securing a LAN Password protection Personal firewall software that analyzes and controls incoming/outgoing packets Network address translation (NAT): using private IP addresses within LAN

TechTalk: Securing a LAN DOCSIS (Data Over Cable Service Interface Specification) filters packets to certain ports Disable file and print sharing Shut down the computer when not in use

Issue: Is It a Crime?

Data Security End