1.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
The Internet = A World of Opportunities Look whats at your fingertips A way to communicate with friends, family, colleagues Access to information and.
How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Let’s Talk About Cyber Security
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Security at Home The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Click here to start. NextPrevious Threat Trends in Australia One in five children (10 to 17 years old) receive unwanted sexual solicitations online Identity.
The Internet.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
The Internet = A World of Opportunities
Steve Riley Sr. Security Strategist Microsoft Trustworthy Computing Group SEC303.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Threats to I.T Internet security By Cameron Mundy.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber crime & Security Prepared by : Rughani Zarana.
Staying Safe Online Keep your Information Secure.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, + colleagues.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Types of Electronic Infection
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
What is Spam? d min.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Protect Your Computer Against Harmful Attacks!
Presentation transcript:

1

Outline : Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information Steps to protect computer Ethical Impact Case study Statistics about Internet Crime survey conclusion References 2

Introduction What is Computer Security ? Computer security is a branch of computer technology known as information security as applied to computers and networks. computer security means the protection of computing systems and the data that they store or access 3

Network Security Devices, tools, techniques and methodologies used to secure the network. The basic component of network security is : Firewall . Encryption and Decryption : changing plaintext into ciphertext using key (Encryption). Changing ciphertext back to plaintext using key (Decryption). Two types of encryption : (Symmetric Encryption, Asymmetric Encryption) . 4

Symmetric Cipher Model 5

Public-Key Cryptography 6

Basic Components of CS computer security involves providing appropriate levels of assurance of Availability of computing services and data/information stored in computing systems Confidentiality of data/information stored in computing systems Integrity of computing systems and data/information stored therein 7

Online Security Versus Online Safety Security: We must secure our computers with technology in the same way that we secure the doors to our offices Safety: We must act in ways that protect us against the risks and threats that come with Internet use 8

Risks and Threats To Computer Security are : Virus Worm Trojan Horse Spyware Hacking Phishing Spoofing Denial of Service 9

Viruses/Worms Trojan Horses Spyware Software programs designed to invade your computer, and copy, damage or delete your data Trojan Horses Viruses that pretend to be programs that help you while destroying your data and damaging your computer Spyware Software that secretly watches and records your online activities or send you endless pop-up ads 10

Did You Know … All of these types of attacks are man-made and intentional. There is no “natural” or “random” virus. All of these ride the Internet services you invite in! Internet services like : ( E-Mail, Peer To Peer Sharing, Online Gaming, Instant Messaging, Video and Audio Streaming ) 11

Viruses a program or piece of code that is loaded onto your computer (without your knowledge and against your wishes), that (generally) replicates itself and (generally) delivers a payload. File Infector Virus : attaches itself to a file on the computer and is executed when that application is opened. ( 1972 ) 12

Worms A self-replicating computer program that uses networks to copy itself to other computers without user intervention. infection by passively receiving object that gets itself executed. Stand-alone. ( 1978 ) 13

Trojan Horses Hidden part of some otherwise useful software. Generally, trojans do not replicate. Today often on a Web page (Active-X, plugin) ( 1983 ) 14

Spyware Application installed, usually without the user’s knowledge, intercepting or taking partial control for the author’s personal gain Estimates as high as 90% of Internet connected computers are infected with spyware. Unlike a virus does not self-replicate. 15

Spyware symptoms Sluggish PC performance An increase in pop-up ads Mysterious new toolbars you can’t delete Unexplained changes to homepage settings Puzzling search results Frequent computer crashes 16

How does PC get infected ? Through CDs, DVDs, Floppy Disk, and Flash Memory Accepting without reading Opening e-mail attachments Not running the latest updates Pirating software, music, movies No anti-virus spyware scanner 17

Steps To Protect Information Practice Internet behavior that lowers your risk Manage your business information carefully Use technology to reduce nuisances Raise the alarm when appropriate 18

Delete Spam without Opening It Never reply to spam Technology can help you identify spam so you can delete it Many Internet providers delete it for you 19

Use Strong Passwords Keep passwords private and create ones that are hard to “crack” Never share your passwords with friends or be tricked into giving them away 20

Steps To Protect Computer Turn on an Internet firewall Keep your operating system up to date Install and maintain antivirus software Install and maintain antispyware software 21

Turn on an Internet Firewall An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet 22

Keep Your System Updated Install all security updates as soon as they are available Automatic updates provide the best protection 23

Install Antivirus Software Antivirus software can detect and destroy computer viruses before they can cause damage Just like flu shots, for antivirus software to be effective, you must keep it up to date Don’t let it expire 24

Example 25

Install & Maintain Antispyware Software Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information 26

Other Ways to Protect Your PC - Back up your files regularly - Read website privacy statements - Install Spyware Blaster - Practice safe E-mail - Close pop-ups using red “X” - Update your Application - Lock your screen 27

Back Up Your Files Save to CD or DVD Use a Web-based backup service 28

Practice Safe E-Mail Don’t open e-mail attachments unless you know what they contain and who sent them Attachment ends with a .exe, .com, .bat, do not open the attachment unless you know for a fact that it is clean. Don’t open, forward, or reply to suspicious e-mails Delete spam 29

Close Pop-ups Using Red “X” Always use the red “X” in the corner of a pop-up screen Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC 30

Install Spyware Blaster Spyware Blaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs. 31

Lock Your Screen Locking your laptop or workstation while away from it is good security sense. Use a password to start up or wake-up your computer. 32

Update Your Application It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities. 33

Ethical Impact Question: should schools offer a course that teaches students how to hack systems, why? Violating intellectual property : By Software piracy (cracking). Hacking others’ devices and stolen their effort . Computer security reduce this violating. 34

Ethical Impact(cont) Many people used a cracked SW and claim that they want to test it before they buy it (is that true , why ?) Other people said : why we have to pay money while these cracked SW is free? ( is that true , why ?) 35

Ethical Impact(cont) Violating privacy : hacking other computers will violate the privacy and making hacker see what he is not suppose to see . 36

Case Study (1) : About Phishing example of a phishing published in the Washington Post (2004 ). Story of William Jackson from Katy, Texas. Jackson received e-mail from what appeared to be ( PayPal ) payment offices. The e-mail warned him that his account would be suspended until he updated it with financial information. The e-mail provided a link for Jackson to the website where he could update his information. He entered in credit card numbers, bank numbers, social security numbers and other personal identification information. The website ended up being fraudulent and Jackson lost several hundred dollars. William Jackson could have lost much more money as a result of the Phishing website he had entered. 37

Case Study (2) : About Spyware In March ( 2005 ), British police foiled a plot to steal £220 million from ( Sumitomo Mitsui Bank ) in London. Cybercriminals had compromised the bank’s computer systems and secretly deployed a keylogger program that was perhaps part of a Trojan horse. The spyware relayed password and access information to the criminals, who intended to transfer the funds electronically. A man in Israel was arrested after allegedly trying to transfer £13.9 million into an Israeli account. 38

Statistics about Internet Crime This statistic is done in USA, that include many types of crime, such as auction fraud, spam, credit card fraud and so on. 39

Survey 40

Survey(cont) 41

Survey(cont) 42

Survey(cont) 43

Conclusion Now that you have completed this web quest on Computer Security you are now aware of the possible security treats to computer systems. Not only that, but you are now better able to protect your computers as well as recommend security measures to others 44

References http://en.wikipedia.org/wiki/Computer_security http://www.clearwisdom.net/emh/articles/2008/7/23/99177.html http://its.ucsc.edu/security_awareness/intro.pdf http://nurseweb.ucsf.edu/public/07fa-computer-security.ppt http://www.acsac.org/secshelf/book001/02.pdf 45

Thank You For Listening Any Question ? 46