© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.

Slides:



Advertisements
Similar presentations
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security+ Guide to Network Security Fundamentals
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Viruses & Destructive Programs
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Data Security GCSE ICT.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Information Systems
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter 13 Security Strategies and Systems. Security Issues The Internet has opened up many new frontiers for everyone, including con artists and computer.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Computer Concepts – Illustrated 8th edition
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
VIRUS.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Security and Ethics Safeguards and Codes of Conduct.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Any criminal action perpetrated primarily through the use of a computer.
 Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive viruses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
UNIT 19 Data Security 2.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security, Ethics and Privacy
Computer Security, Ethics and Privacy
Presentation transcript:

© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies

© Paradigm Publishing Inc. 8-2 Presentation Overview Risk Assessment Network and Internet Security Risks Computer Viruses Hardware and Software Security Risks Security Strategies for Protecting Computer Systems and DataSecurity Strategies for Protecting Computer Systems and Data

© Paradigm Publishing Inc. 8-3 Risk Assessment Why is risk assessment important when defining security strategies?

© Paradigm Publishing Inc. 8-4 Risk Assessment Why is risk assessment important when defining security strategies? Organizations need to assess the level of security risk they face in order to develop an effective security strategy. They must determine the level of

© Paradigm Publishing Inc. 8-5 Risk Assessment Why is risk assessment important when defining security strategies? Organizations need to assess the level of security risk they face in order to develop an effective security strategy. They must determine the level of threat – the severity of a security breach

© Paradigm Publishing Inc. 8-6 Risk Assessment Why is risk assessment important when defining security strategies? Organizations need to assess the level of security risk they face in order to develop an effective security strategy. They must determine the level of threat – severity of a security breach vulnerability – likelihood of a security breach of systems or data

© Paradigm Publishing Inc. 8-7 Risk Assessment The higher the level of vulnerability and threat, the higher the level of risk.

© Paradigm Publishing Inc. 8-8 Network and Internet Security Risks What are the security risks on networks and the Internet?

© Paradigm Publishing Inc. 8-9 Network and Internet Security Risks What are the security risks on networks and the Internet? – Hacker – individual who breaks into security systems, motivated by curiosity of the challenge

© Paradigm Publishing Inc Network and Internet Security Risks What are the security risks on networks and the Internet? – Hacker – individual who breaks into security systems, motivated by curiosity of the challenge – Cracker – a hacker with malicious or criminal intent

© Paradigm Publishing Inc Network and Internet Security Risks What are the security risks on networks and the Internet? – Hacker – individual who breaks into security systems, motivated by curiosity of the challenge – Cracker – a hacker with malicious or criminal intent – Cyberwar – online attacks between countries

© Paradigm Publishing Inc Network and Internet Security Risks Percentage of unauthorized use of computer networks Source: 2005 CSI/FBI Computer Crime and Security Survey, Documents/2005CSISurvey.pdfhttp://

© Paradigm Publishing Inc Network and Internet Security Risks Unauthorized Access

© Paradigm Publishing Inc Network and Internet Security Risks Unauthorized Access – User IDs and passwords – hackers gain entry by finding a working user ID and password

© Paradigm Publishing Inc Network and Internet Security Risks Unauthorized Access – User IDs and passwords – hackers gain entry by finding a working user ID and password – System backdoors – a test user ID and password that provides the highest level of authorization

© Paradigm Publishing Inc Network and Internet Security Risks Unauthorized Access – User IDs and passwords – hackers gain entry by finding a working user ID and password – System backdoors – a test user ID and password that provides the highest level of authorization – Spoofing – fooling another computer by pretending to send packets from a legitimate source

© Paradigm Publishing Inc Network and Internet Security Risks Unauthorized Access – User IDs and passwords – hackers gain entry by finding a working user ID and password – System backdoors – a test user ID and password that provides the highest level of authorization – Spoofing – fooling another computer by pretending to send packets from a legitimate source – Online predators – talk young people into meeting them

© Paradigm Publishing Inc Network and Internet Security Risks Denial of service attack (DoS) hackers run multiple copies of a program to flood it and shut it down.

© Paradigm Publishing Inc Network and Internet Security Risks Limited Security for Wireless Devices Wired Equivalent Privacy (WEP) makes it more difficult for hackers to intercept and modify data transmissions sent by radio waves or infrared signals.

© Paradigm Publishing Inc Network and Internet Security Risks Data Browsing Workers with access to networked databases that contain private information “browse” through the private documents.

© Paradigm Publishing Inc Computer Viruses Computer Viruses and Worms

© Paradigm Publishing Inc Computer Viruses –Virus – a program designed to perform a trick upon an unsuspecting person; the trick may be just annoying or very destructive. Computer Viruses and Worms

© Paradigm Publishing Inc Computer Viruses –Virus – a program designed to perform a trick upon an unsuspecting person; the trick may be just annoying or very destructive. –Worm – software that actively attempts to move or copy itself. Computer Viruses and Worms

© Paradigm Publishing Inc Computer Viruses Viruses are often transmitted over the Internet and through shared devices such as flash drives.

© Paradigm Publishing Inc Computer Viruses Virus symptoms

© Paradigm Publishing Inc Computer Viruses Impact of Viruses

© Paradigm Publishing Inc Computer Viruses Impact of Viruses –Nuisance virus – usually does no damage but is an inconvenience

© Paradigm Publishing Inc Computer Viruses Impact of Viruses –Nuisance virus – usually does no damage but is an inconvenience –Espionage virus – allows a hacker to enter system later for the purpose of stealing data or spying

© Paradigm Publishing Inc Computer Viruses Impact of Viruses –Nuisance virus – usually does no damage but is an inconvenience –Espionage virus – allows a hacker to enter system later for the purpose of stealing data or spying –Data-destructive virus – designed to erase or corrupt files so that they are unreadable

© Paradigm Publishing Inc Computer Viruses Macro Virus

© Paradigm Publishing Inc Computer Viruses Macro Virus –a small subprogram written specifically for one program to customize and automate certain functions

© Paradigm Publishing Inc Computer Viruses Macro Virus –a small subprogram written specifically for one program to customize and automate certain functions –macro virus usually does little harm but is difficult to remove

© Paradigm Publishing Inc Computer Viruses Variant Virus

© Paradigm Publishing Inc Computer Viruses Variant Virus –programmed to change itself and its behavior to fool programs meant to stop it

© Paradigm Publishing Inc Computer Viruses Variant Virus –programmed to change itself and its behavior to fool programs meant to stop it –comes in many forms and can change daily to avoid detection

© Paradigm Publishing Inc Computer Viruses Stealth Virus

© Paradigm Publishing Inc Computer Viruses Stealth Virus –tries to hide from software designed to find and destroy it

© Paradigm Publishing Inc Computer Viruses Stealth Virus –tries to hide from software designed to find and destroy it –masks the size of the file by copying itself to another location on the victim’s hard drive

© Paradigm Publishing Inc Computer Viruses Boot Sector Virus

© Paradigm Publishing Inc Computer Viruses Boot Sector Virus –designed to alter the boot sector of a disk

© Paradigm Publishing Inc Computer Viruses Boot Sector Virus –designed to alter the boot sector of a disk –whenever the operating system reads the boot sector, the computer automatically becomes infected

© Paradigm Publishing Inc Computer Viruses Trojan Horse Virus

© Paradigm Publishing Inc Computer Viruses Trojan Horse Virus –hides inside another legitimate program or data file

© Paradigm Publishing Inc Computer Viruses Trojan Horse Virus –hides inside another legitimate program or data file –common in downloaded games and shareware files

© Paradigm Publishing Inc Computer Viruses Trojan Horse Virus –hides inside another legitimate program or data file –common in downloaded games and shareware files –may cause damage immediately or may delay acting for a time

© Paradigm Publishing Inc Computer Viruses Multipartite Virus

© Paradigm Publishing Inc Computer Viruses Multipartite Virus –utilizes several forms of attack

© Paradigm Publishing Inc Computer Viruses Multipartite Virus –utilizes several forms of attack –may first infect boot sector and later become a Trojan horse by infecting a disk file

© Paradigm Publishing Inc Computer Viruses Multipartite Virus –utilizes several forms of attack –may first infect boot sector and later become a Trojan horse by infecting a disk file –rarely encountered but difficult to guard against

© Paradigm Publishing Inc Computer Viruses Logic Bomb Virus does not act immediately but waits for a specific event or set of conditions to occur.

© Paradigm Publishing Inc Hardware and Software Security Risks Systems Failure

© Paradigm Publishing Inc Hardware and Software Security Risks Systems Failure –Power spike – sudden rise or fall in power level caused by a power surge; can cause poor performance or permanent hardware damage

© Paradigm Publishing Inc Hardware and Software Security Risks Systems Failure –Power spike – sudden rise or fall in power level caused by a power surge; can cause poor performance or permanent hardware damage –Surge protector – guards against power spikes

© Paradigm Publishing Inc Hardware and Software Security Risks Systems Failure –Power spike – sudden rise or fall in power level caused by a power surge; can cause poor performance or permanent hardware damage –Surge protector – guards against power spikes –Uninterruptible power supply – guards against power spikes and keeps computers running during a blackout

© Paradigm Publishing Inc Hardware and Software Security Risks Employee Theft

© Paradigm Publishing Inc Hardware and Software Security Risks Employee Theft –cost of stolen computer hardware and software

© Paradigm Publishing Inc Hardware and Software Security Risks Employee Theft –cost of stolen computer hardware and software –cost of replacing lost data

© Paradigm Publishing Inc Hardware and Software Security Risks Employee Theft –cost of stolen computer hardware and software –cost of replacing lost data –cost of time lost while machines are gone

© Paradigm Publishing Inc Hardware and Software Security Risks Employee Theft –cost of stolen computer hardware and software –cost of replacing lost data –cost of time lost while machines are gone –cost of installing new machines and training people to use them

© Paradigm Publishing Inc Hardware and Software Security Risks Cracking Software for Copying

© Paradigm Publishing Inc Hardware and Software Security Risks Cracking Software for Copying –crack – a method of circumventing a security scheme that prevents a user from copying a program

© Paradigm Publishing Inc Hardware and Software Security Risks Cracking Software for Copying –crack – a method of circumventing a security scheme that prevents a user from copying a program –make copy of CD with burner

© Paradigm Publishing Inc Hardware and Software Security Risks Cracking Software for Copying –crack – a method of circumventing a security scheme that prevents a user from copying a program –make copy of CD with burner –copy files to hard drive and redirect software to check hard disk for files

© Paradigm Publishing Inc Hardware and Software Security Risks Cracking Software for Copying –crack – a method of circumventing a security scheme that prevents a user from copying a program –make copy of CD with burner –copy files to hard drive and redirect software to check hard disk for files –duplication of program made difficult when original CD has scrambled files

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Physical Security

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Physical Security –computers should be located in controlled-access areas

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Physical Security –computers should be located in controlled-access areas –locking cables can be used when equipment not used

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Firewall

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Firewall –allows normal Web browser operations but prevents other types of communication

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Firewall –allows normal Web browser operations but prevents other types of communication –checks incoming data against a list of known sources

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Firewall –allows normal Web browser operations but prevents other types of communication –checks incoming data against a list of known sources –data rejected if it does not fit a preset profile

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Network Sniffer

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Network Sniffer –displays network traffic data

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Network Sniffer –displays network traffic data –shows which resources employees use and Web sites they visit

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Network Sniffer –displays network traffic data –shows which resources employees use and Web sites they visit –can be used to troubleshoot network connections and improve system performance

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Antivirus Software

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Antivirus Software –detects and deletes known viruses

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Antivirus Software –detects and deletes known viruses –Internet allows antivirus software to update itself to detect newer viruses

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Data Backups

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Data Backups Organizations protect critical files by –keeping a copy of programs and data in a safe place

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Data Backups Organizations protect critical files by –keeping a copy of programs and data in a safe place –keep more than one backup of important databases and update them on a set schedule

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Disaster Recovery Plan

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Disaster Recovery Plan a safety system that allows a company to restore its systems after a complete loss of data; elements include – data backup procedures

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Disaster Recovery Plan a safety system that allows a company to restore its systems after a complete loss of data; elements include – data backup procedures – remotely located backup copies

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Disaster Recovery Plan a safety system that allows a company to restore its systems after a complete loss of data; elements include – data backup procedures – remotely located backup copies – redundant systems with mirrored hard drive which contains same data as original hard drive and is updated automatically when original drive is updated

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Authentication

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Authentication proof of identity of a user and of authority to access data; identity can be confirmed by – personal identity (PIN) numbers

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Authentication proof of identity of a user and of authority to access data; identity can be confirmed by – personal identity (PIN) numbers – user IDs and passwords

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Authentication proof of identity of a user and of authority to access data; identity can be confirmed by – personal identity (PIN) numbers – user IDs and passwords – smart cards

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Authentication proof of identity of a user and of authority to access data; identity can be confirmed by – personal identity (PIN) numbers – user IDs and passwords – smart cards – biometrics

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data An encryption key is used to secure messages that are sent across the Internet.

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Monitoring and Auditing

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Monitoring and Auditing employees’ online and offline activities can be monitored at work by – keyboard loggers store keystrokes on hard drive

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Monitoring and Auditing employees’ online and offline activities can be monitored at work by – keyboard loggers store keystrokes on hard drive – Internet traffic trackers record Web sites visited

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Monitoring and Auditing employees’ online and offline activities can be monitored at work by – keyboard loggers store keystrokes on hard drive – Internet traffic trackers record Web sites visited – webcams provide video surveillance

© Paradigm Publishing Inc Security Strategies for Protecting Computer Systems and Data Monitoring and Auditing employees’ online and offline activities can be monitored at work by – keyboard loggers store keystrokes on hard drive – Internet traffic trackers record Web sites visited – webcams provide video surveillance – auditing reviews monitored data and system logins for unauthorized access

© Paradigm Publishing Inc On the Horizon Based on the information presented in this chapter and your own experience, what do you think is on the horizon?