Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
Section C Threats to Data.
E-Commerce: Security LO: Create a leaflet discussing security issues Give examples of security issues Illustrate how businesses/individuals can protect.
POSSIBLE THREATS TO DATA
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Security, Privacy, and Ethics Online Computer Crimes.
FIT3105 Security and Identity Management Lecture 1.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Security Risks for an E-Commerce site and how to protect against them.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Threats to I.T Internet security By Cameron Mundy.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
Internet Security facilities for secure communication.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Any criminal action perpetrated primarily through the use of a computer.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Sample security policy Dr Alexei Vernitski.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 40 Internet Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
– Communication Technology in a Changing World
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
ISNE101 Dr. Ken Cosh Week 13.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

Security

Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term loss of customers –Embarrassment to organisation –Loss of money owed

How is data insecure? Internal –Hardware/Power failure –Damage by smoke/fire –Damage by staff: Deliberate by unhappy staff Alteration of data by staff for fraud Accidental erasure by inexperienced staff External –Theft of Equipment –Hackers –Virus Attack

Physical Security Damage to equipment –Protect from the elements (keep indoors e.g.) –Magnetic media – keep away from magnetic fields –Drinking at computers – ban –Heat – keep away Theft –Keep rooms locked –Bolt to desks –Security tag all equipment –Locate away from the public Fire –Sprinkler/gas systems –Smoke detectors

Hacking E-Commerce sites need to prevent hacking so that the running of their business is undisturbed and more importantly their customers details are not stolen. Definition: Hacking is when someone attempts to enter a computer system with the aim of stealing data, damaging the system or just to show they can.

Viruses ‘Virus’ has become a catch all term to describe any malicious computer program that can cause an unwanted result when run. A virus is a manmade program that causes an unexpected, usually negative, event and is self replicating. It is often disguised as a game or an image with a clever marketing title and attached to an or downloadable file.

A worm is a virus that resides in the active memory of a computer and duplicates itself. It may send copies of itself to other computers, such as through or Internet Relay Chat (IRC) A Trojan is a malicious program that pretends to be a benign application, but purposely does something the user does not expect. Trojans are technically not viruses since they do not replicate but they can be just as destructive.

Prevention Anti virus software must be installed on the web server and all of an e-commerce businesses computers. Not only must it be installed but updated regularly, ideally every day. New viruses are developed all the time and anti virus software must have the latest defences to provide the best protection possible.

Identity Theft DI theft is a new form of crime that the Internet has made more common. It involves a thief who has stolen the personal details of their victim and uses them to apply for services such as credit cards, loans, mortgages under the guise of their victim. Often only detected when the victim receives correspondence requesting payment for the thief's spending.

Often this type of crime is difficult to trace. The type of customer details stored by e- commerce businesses provides enough information to commit identify theft, so it is very important that all e-commerce businesses protect their customers data with every method possible.

Firewall impact on site performance. A firewall builds a protective virtual barrier around a commuter or a network of computers so that only authorised programs can access the data. It sets up a gateway and only allows authorised traffic through the gateway. Incoming data is inspected and, if authorised, let through opened ports.

However if ports are left open. A ‘back door’ becomes available for hackers to enter the system. Security policies can be set to block certain scripts running on the users computer, this is done to prevent hackers attacking the system. When a security policy is decided for a firewall, the administrator must balance the need to high security with the possibility of losing functionality from the website.

Secure Socket Layer (SSL) SSL is a cryptographic protocol that provides secure communication o the Internet. It provides endpoint authentication, meaning that both the server and the client need to be identified and confirm that they are who they say they are. This is done by public key encryption and certificate based authentication.

HTTPS HTTPS is the protocol usually used by websites in the Internet. HTTPS is a secure version of the protocol which uses encryption to protect the data entered on the site. This protocol is usually used when customers are entering their payment details.

RSA Certificates RSA certificates are a method of coding information so that the people at either end are identified by a digital certificate, coupled with a digital signature. These can confirm the identify of the sender or recipient.

Strong passwords It is vital for all commuter users to use strong passwords, especially important for web servers and other eCommerce systems. Both letters and numbers Both capitals and lowercase Symbols such as * or # More than eight characters.

To summarise Identity theft: occurs when a victims details are stolen and someone else pretends to be him or her and applies for financial products and/or makes purchases. A firewall is a piece of software that protects the system from unauthorised access Public Key encryption is a method of coding information so that only the people with the right key at both ends of the communication can decode it.

Certificate based authentication is a method of cryptography which prevents data being read by unauthorised parties. HTTPS stands for Secure Hypertext Transfer Protocol. Encryption is a method of encoding that is difficult to decipher by unauthorised parties. It uses prime numbers. The higher the prime number, the stronger the encryption.

What is a digital signature?