Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Computer Security. E-bay Phishing Scam Slide 2 Phishing Scam using Google Chat “LOL – ya gotta see this!!” Read about this scam:
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security GCSE ICT.
Slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Power Point Lectures to accompany Tomorrow’s Technology and You, 9e.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
© 2008 Prentice-Hall, Inc. Slide 1. Chapter 10 Computer Security and Risks © 2008 Prentice-Hall, Inc. Slide 2.
© 2006 Prentice-Hall, Inc.Slide 1 Tomorrow's Technology & You.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Cyber crime & Security Prepared by : Rughani Zarana.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data Security.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Privacy, Security and Ethics
Security and Ethics Safeguards and Codes of Conduct.
CPT 123 Internet Skills Class Notes Internet Security Session B.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
Technical Implementation: Security Risks
Add video notes to lecture
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Tomorrow’s Technology and You
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Security and Risks
INFORMATION SYSTEMS SECURITY and CONTROL
G061 - Network Security.
COSC-100 (Elements of Computer Science) Prof. Juola
Presentation transcript:

Chapter 12 Computer Security and Risks

 2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst in a person.” Former computer criminal turned corporate programmer On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy, Freedom, and Ethics: The Delicate Balance Security and Reliability

 2002 Prentice Hall 3 On-line Outlaws: Computer Crime Computers are used to break laws as well as uphold them Computer crime involves:  Theft by computer  Software piracy and intellectual property laws  Software sabotage  Hacking and electronic trespassing

 2002 Prentice Hall 4 The Computer Crime Dossier Computer crime is defined as any crime accomplished through knowledge or use of computer technology The typical computer criminal is a trusted employee with no criminal record

 2002 Prentice Hall 5 The Computer Crime Dossier According to the FBI:  Financial losses topped $120 million in 1999  More than 60 percent of corporate, university, and government sites report at least one break-in per year

 2002 Prentice Hall 6 Theft by Computer Theft is the most common form of computer crime Computers are used to steal:  Money  Goods  Information  Computer resources

 2002 Prentice Hall 7 Software Piracy and Intellectual Property Laws Software piracy is the illegal duplication of copyrighted software Intellectual property includes the results of intellectual activities in the arts, sciences, and industry

 2002 Prentice Hall 8 Software Piracy and Intellectual Property Laws Property laws:  Inventions are patented  Trade secrets are covered by contract law  The expression of intellectual property can be copyrighted Look-and-feel lawsuits can result from mimicking intellectual property

 2002 Prentice Hall 9 Software Sabotage  Trojan horse - performs a useful task while also being secretly destructive; time bombs are an example  Virus - spreads by making copies of itself from program to program or disk to disk  Worm - a program that travels independently over computer networks, seeking uninfected sites Sabotage of software can include: These are referred to as a virus.

 2002 Prentice Hall 10 Software Sabotage How software sabotage works:

 2002 Prentice Hall 11 Software Sabotage Virus detection software locates and removes viruses These programs need to be frequently revised More than 200 new virus appear each month!

 2002 Prentice Hall 12 Hacking and Electronic Trespassing Hackers are people who enjoyed learning the details of computer systems Hackers (or crackers) refers to people who break into computer systems Webjackers hijack Web pages and redirect users to other sites Denial of Service (DOS) attacks bombards servers and web sites with traffic that shuts down the network

 2002 Prentice Hall 13 Hacking and Electronic Trespassing Breaking into other computer systems is called electronic trespassing Electronic crime rings focus on stealing credit card numbers and other valuable information Cliff Stoll discovered an international computer espionage ring because of a.75 cent accounting error.

 2002 Prentice Hall 14 Computer Security: Reducing Risks Computer crime has led to a need to protect computer systems Computer security attempts to protect computers and the information they contain Computer security protects against unwanted access, damage, modification, or destruction

 2002 Prentice Hall 15 Computer Security: Reducing Risks  Physical Access Restrictions  Passwords  Firewalls, Encryptions, and Audits  Backups  Law, Management, and Ethics A variety of security techniques are used to protect computer systems

 2002 Prentice Hall 16 Physical Access Restrictions Physical access restrictions are based on:  Something you have, such as a key, ID card with photo, or a smart card  Something you know, such as a password, an ID number, or a piece of personal history  Something you do, such as your signature or your typing speed and error patterns

 2002 Prentice Hall 17 Physical Access Restrictions  Something about you, such as voice print, fingerprints, retinal scans, or other measurements of individual body characteristics (biometrics)

 2002 Prentice Hall 18 Passwords Passwords are the most common tool for restricting access to computer system Effective passwords are:  Not real words  Not names  Changed frequently  Kept secret  A mix of alphabet letters and numbers

 2002 Prentice Hall 19 Firewalls, Encryption, and Audits These security systems reduce or prohibit the interception of messages between computers:  Firewalls are like gateways with a lock  Codes protect transmitted information and take a special key to decode  Shields are specially developed machines that prevent unwanted interception

 2002 Prentice Hall 20 Firewalls The computer serves as a firewall by scanning every message for security risks before allowing it to pass into or out of the LAN

 2002 Prentice Hall 21 Encryption To make a message secure from outsiders requires encryption software Encryption software scrambles the sent message using a key A different key is needed to unscramble the received message

 2002 Prentice Hall 22 Encryption

 2002 Prentice Hall 23 Audit-Control Software Audit-control software monitors and records computer activity Effective audit-control software forces every user to leave a trail of electronic footprints

 2002 Prentice Hall 24 Backups and Other Precautions The best and most widely used method to recover data is a routine for making regular backups Many computer systems are backed up at the end of each work day

 2002 Prentice Hall 25 Human Security Controls: Laws, Management, and Ethics Security measures prevent crime, but can also pose threats to personal privacy Managers must make employees aware of security issues and risks

 2002 Prentice Hall 26 Security, Privacy, Freedom, & Ethics: The Delicate Balance Active badges can simultaneously improve security and threaten privacy by:  identifying who enters a door or logs onto a machine  finding an employee’s location or where they have been throughout the day “In this age of advanced technology, thick walls and locked doors cannot guard our privacy or safeguard our personal freedom.” Lyndon B. Johnson

 2002 Prentice Hall 27 Security and Reliability Computer security involves more than protection from trespassing, sabotage, and other crimes Software errors and hardware glitches account for some of the most important security issues, such as:  Bugs and Breakdowns  Computers at War

 2002 Prentice Hall 28 Bugs and Breakdowns Software bugs do more damage than viruses and computer burglars combined. Facts about software engineering:  It is impossible to eliminate all bugs.  Even programs that appear to work can contain dangerous bugs.  The bigger the system,the bigger the problem.

 2002 Prentice Hall 29 Bugs and Breakdowns Computer breakdowns pose a risk to the public and the incidence doubles every two years. Hardware problems are rare when compared with software failures

 2002 Prentice Hall 30 Computers at War Smart weapons are missiles that use computerized guidance systems to locate their targets. An autonomous system is a complex system that can assume almost complete responsibility for a task without human input.

 2002 Prentice Hall 31 Warfare in the Digital Domain The front lines of the future may in cyberspace By attacking computer networks an enemy could conceivably cripple:  telecommunications systems  power grids  banking and financial systems  hospitals and medical systems  water and gas supplies  oil pipelines  emergency government services

 2002 Prentice Hall 32 Rules of Thumb: Safe Computing Share with care Beware of BBS risks Don’t pirate software Disinfect regularly Treat diskettes with care Take your password seriously Lock sensitive data Use backup systems Consider encryption for Internet activities Prepare for the worst