Electronic Security. WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
N ETWORK S ECURITY Presented by: Brent Vignola. M ATERIAL OVERVIEW … Basic security components that exist in all networks Authentication Firewall Intrusion.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
LittleOrange Internet Security an Endpoint Security Appliance.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses & Destructive Programs
Chapter Nine Maintaining a Computer Part III: Malware.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Safe Computing Outreach Joseph Howard Undergraduate Research Assistant 05/01/2015 Disclaimer: This research was supported by the National Science Foundation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crimes.
Hacker Zombie Computer Reflectors Target.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Internet Security facilities for secure communication.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Protecting Students on the School Computer Network Enfield High School.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Security and Your Computer Welcome to Boot Camp.
FIREWALL. The member in group 1. Bhummikorn M.2/5 No.5 2.Borwornrat Khrongsiriwat M.2/5 No.6 3. Panaphon sangobsakun M.2/5 No.20 4.Kalint Muangsornkeaw.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Understand Malware LESSON Security Fundamentals.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Chapter 6 Introduction to Digital Security
Chapter 40 Internet Security.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Chapter 6 Introduction to Digital Security
Risk of the Internet At Home
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Computer Security By: Muhammed Anwar.
Presentation transcript:

Electronic Security

WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety Hacking and Cracking Cryptography Packet Sniffers Future Security Threats Speed of Electronic Attacks

Don't be the tree in the lightning fast electronic world!!! Don't get Zapped: Can be lighting fast Can go unnoticed Can be devastating Electronic Attacks

Why Do People Attack Electronic Systems? Every attack has a certain target Network Devices Hosts Applications Operating Systems People

Why Do People Attack Electronic Systems? Most attacks attempt to steal data and access unauthorized information Some attacks are designed to access computer systems without approval and authorization Some attacks are designed to restrict overall access to data or destroy a computer system o Denial of Service (DOS) Attack To access other computers through an already compromised computer To omit or alter data and sensitive information

Top 5 Most Popular Websites

Malicious Software (Malware) Viruses Worms Wabbits Trojans Spyware Backdoors Exploits Rootkits Keyloggers Dialers URL Injectors Adware

Websites Most Likely to Contain Malware "The general belief is that sites that promote criminal activity—such as sites selling illegal pharmaceuticals or counterfeit luxury goods—are most likely to host malware. Our data reveals the truth of this outdated notion, as web malware encounters are typically not the by-product of “bad” sites in today’s threat landscape." Cisco Annual Security Report

Websites Most Likely to Contain Malware Business and industry sites are one of the top three categories visited when a malware encounter occurred Hidden in online ads that are distributed to legitimate websites "Malvertising" has significantly increased since 2011 Malicious advertising can impact any website The United States retains the top ranking in 2012 for most malware encounters

Malware Prevention 1.Always be alert with your computer 2.Set Internet browser for download notification 3.Install a trusted anti-virus and keep it updated 4.Install a pop-up blocker 5.Use an program that includes spam guard 6.Do not download software or programs from unknown sites 7.Be alert and cautious when sharing or trading files and programs with friends and family 8.Disable cookies on your Internet browser 9.Read the fine print when downloading programs 10.Never click on Web-Links, copy paste them in a.Shadowops.net VS Shadowops.com 11.Download a personal firewall

Firewall Security What is a firewall?

Firewall Security "A firewall is a system designed to prevent unauthorized access to or from a private network." Most modern operating systems and home network gateway routers come with optional firewalls built in Is considered a first line of defense It is also important to customize your firewall to not allow access of any programs to the fire wall, and not allow your firewall access to any programs

Firewall Security Types of Firewall Techniques Packet Filtering Circuit-Level Gateway Implementation Acting as a Proxy Server Web Application Firewall

I s there a 100% safe computer system?

NO!!! ) Computers connected to any network can be compromised 2) Computers connected to the Internet can be compromised 3) Devices can be taken to an OFF- LINE computer to get data 4) Computers and devices can be physically taken

How do you keep your computer secure? Physical Barriers: some examples include walls, doors, and glass Securing Computer Systems

Man Traps prevent unauthorized access to areas Securing Computer Systems

Keycards help to prevent access to unauthorized personnel, as well as help computers recognize authorized personnel Most Keycards have: Smartchip Picture ID Hashed Passcode Securing Computer Systems

Hackin g Hackers get information or access to computers by making or using computer software. Most attacks originate from freeware or software that is free to users. Some hackers can find new exploits in software by making their own attacks or finding new weaknesses in software. These types of attacks are called zero day attacks. Expert/Elite Hackers develop software and find previously unknown exploits in software. Unskilled Hackers use software already written and use known exploits in software. Hacking and Cracking

Crackin g Focuses on finding passwords or reverse engineering them. Offline cracking is usually done against hashed files that contain passwords.

Cryptography -Protects confidentiality of information -Protects the integrity of information -Protects the availability of information to people with proper keys -Confirms the sender of information -It can enforce non-repudiation (Prevents the "I never got that")

Cryptography Symmetric Cryptographic Algorithms -1 key to rule them all

Asymmetric Cryptographic Algorithms Cryptography - 4 key system

Packet Sniffers Monitors and tracks incoming and outgoing packets TCP/IP information

New Security Threats Cars 1) Internal car systems can be compromised by mp3's and mp4's that contain malware 2) PDA's, Cell phones, and PAD's connect to cars create vulnerabilities

New Security Threats House s New houses have electronic access systems, as well as central controlled computer systems

New Security Threats New Technologies New Technologies can pose risks that are yet unknown

QUESTIONS

References Principles of Information Security By: Michael E. Whitman, Herbert J. Mattord 4th Edition Security + Guide to Network Security Fundamentals By: Mark Ciampa, Ph.D. 4th Edition