Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
BUSINESS PLUG-IN B6 Information Security.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security GCSE ICT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 19 INTERNET SECURITY
VIRUSES and DESTRUCTIVE PROGRAMS
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
Computer Network Forensics Lecture - Virus © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Computer Security, Ethics and Privacy Chapter 11.
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Twelfth Edition.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
What is a virus? A virus is a software program that is capable of causing great harm to files and other programs on the same computer. It can replicate.
 a crime committed on a computer network, esp. the Internet.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Technology In Action Chapter 7 © 2006 Prentice-Hall, Inc.1 Technology In Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Small Business Security Keith Slagle April 24, 2007.
Computer security By Isabelle Cooper.
Data Security.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Are you a COMPUTER GEEK or a COMPUTER FREAK? By Evie Watkins.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems Design and Development Security Precautions Computing Science.
HI150 – Automation of Health Information Unit 2 Seminar.
Internet security for the home Paul Norton MEng(Hons) MIEE Electronic engineer working for Pascall Electronics Ltd. on the Isle of Wight A talk on Internet.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Presentation transcript:

Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself –Identify areas of computer security vulnerability and ways to protect against them –Recall the definition of encryption and apply the XOR encryption technique –Recognize good and bad passwords based on password guidelines

Security Resources you can use Protecting your computer sound byte: on_1/0,8697, ,00.html Norton AntiVirus Response Center Web Page Test the vulnerability of your computer: –Gibson Research Corporation ( –Qualys (

Computer security vulnerability points Hardware – Software – People –

Backup Data and Files are vulnerable Primary defense against data loss Selective, incremental & full

Software Perform regular updates for Windowshttp://update.microsoft.com Microsoft update: Windows, Office, more Automatic updates Check with vendors for updates Verify notices independently

Hackers Def: Types of hackers: –White-hat –Black-hat –Script kiddies

What Hackers Do Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffing Commit identity theft Create widespread computer attacks: –Backdoor programs (Trojan horse) Denial of service attacks

How Hackers Gain Access Direct access: –Hacking software Indirect access: –Internet connection

Firewall Def: Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers

Computer Viruses What puts you at risk for viruses?

How to "Catch" a Virus attachments. Do not open attachments before checking –Is this from someone I know? –Is the message a sensible follow-up to the last message from the sender? –Is the content of the message something the sender would say to me? –Is there a reason for the sender to include an attachment? When in doubt, be cautious

Antivirus Software Def: –Scan files looking for virus signatures (unique code) –Provide options for deleting or fixing infected files Need to be updated frequently Examples: McAfee, Norton, and Sophos, Inc.

What Viruses Do Replicate themselves: –Slow down networks Display annoying messages Delete files Change computer settings Love Letter – Fastest spreading virus Melissa – Caused $80 million damage Nimda – Affected more than 1 million computers

Logical security Def: What are ways to protect your password?

Biometric identification systems –Fingerprint –Palm print –Iris scan –Face recognition technology

Encryption Def: Encrypted data can be safely stored or transmitted Why is this needed?

Encryption example Using Exclusive OR, XOR,  If bits are the same, result is 0; if different 1 Apply a key to the plain or clear text

Encryption example 0101 Cleartext (The hex digit 5)  1001 Key

Encryption example If the cleartext is the hex digit D and the XOR key is 1001, what is the encrypted text?

Encryption example Encrypt the word NO with the key

Assignment Using XOR and the key , determine the encrypted results for the ASCII text: PASSWORD Complete HTML3