Information Technology Security Issues Day 4 – Module 8 Text Materials Chapter 8 – Protecting People and Information.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

By Derek Hahn Washington State Director of Finance and Ian Newby Lake Stevens Member In 3-D.
SECURITY CHECK Protecting Your System and Yourself Source:
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
Information Technology Security Issues Topic 8 Text Materials Chapter 8 – Protecting People and Information.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Cyber Security—What you should know before it’s too late! T Jay Humphries and Trevor O’Donnal.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
CYBER CRIME AND SECURITY TRENDS
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
How It Applies In A Virtual World
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Identity Theft Statistics Identity Theft – “Fastest Growing Financial Crime in the United States.” (1) 9.3 million U.S. Adults were Victims of ID Theft.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Combating cyber-crime: the context Justice Canada March 2005.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Defining Security Issues
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Cyber crime & Security Prepared by : Rughani Zarana.
BUSINESS B1 Information Security.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Security at NCAR David Mitchell February 20th, 2007.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
By: Asfa Khan and Huda Mukhtar
Chap1: Is there a Security Problem in Computing?.
Cybercrime What is it, what does it cost, & how is it regulated?
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
You. are at risk for the fastest growing crimes crime.
Cyber Safety Jamie Salazar.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Cyber crime and security issues
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
IT Security  .
Protecting Your Identity
Faculty of Science IT Department By Raz Dara MA.
Securing your system, protecting your digital data and devices.
Identity Theft Samuel H. Slater.
Presentation transcript:

Information Technology Security Issues Day 4 – Module 8 Text Materials Chapter 8 – Protecting People and Information

IT Security Issues The IT security issue. Different types/categories of Cybercrime and IT security threats. Some popular historical viruses and worms. Security Precautions.

IT Security Issues

Threats are escalating! 90% of all businesses affected each year. $17B+ annual cost. 5% - 10% of IT budget.

U.S. Corporations Top Security Concerns Source: Adapted from InfoWorld, November 16 th, 2001 Percent of respondents concerned in each category. Systems Penetration DoS Attacks Data Theft

Financial Loss Areas Source: Adapted from CSI/FBI Security Survey, 2002, 2007

Theft of Proprietary Information Representative growth of data theft FBI, $Several Billion all U.S. organizations Millions of dollars, 503 organizations

IT Security Issues 503 Respondents Cross-Section of Organizations Intrusions, Not reported Dollar Losses are soaring FBI, $10B annual losses total-2002 Some estimates go much higher

Profile of a Computer Criminal Source:Information Technology for Management & nsca.com Business Week 2/21/ Web Sites Easy to write Male 19-30, no criminal record Computer specialist, clerical, student, manager Self confident, eager, energetic High IQ, personable, creative Egocentric Ax to grind Anti-establishment Doesn’t view himself as a criminal

Easy to Obtain Tools for Cyber Criminals

Identity Theft Identity theft occurs when someone uses the personal information of another (i.e., name, date of birth, social security number, credit card numbers, bank account numbers, etc.), fraudulently and without permission. Criminals usually do this to obtain money or goods and services, but identity theft is also perpetrated to obtain false drivers ’ licenses, birth certificates, social security numbers, visas and other official government papers. Source: Motes, K. “ Identity Theft ”, December 27,

Calling it the largest such bust ever, the U.S. Attorney in Manhattan and the FBI apprehended an alleged ring of identity thieves, accusing three men of stealing tens of thousands of credit reports. The ring is alleged to have operated over a period of three years, suspected of pilfering credit reports from the three major commercial credit reporting agencies and using that information to siphon funds from bank accounts and make fraudulent purchases. Authorities have accounted for $2.7 million in losses so far. At the center of the scheme as outlined Monday by Justice Department and FBI officials is a help-desk employee of Teledata Communications (TCI), a company in Bay Shore, N.Y., that lets banks and other lenders access credit histories compiled by Equifax, Experian and TransUnion.TCI The TCI employee, Philip Cummings, stands accused of wire fraud and conspiracy in filching lenders' passwords and subscriber codes that let a network of identity thieves obtain tens of thousands of credit reports of more than 30,000 individuals. TCI declined to comment. The government has fingered two other defendants, Linus Baptiste and Hakeem Mohammed, in related cases. "The defendants took advantage of an insider's access to sensitive information in much the same way that a gang of thieves might get the combination to the bank vault from an insider," Kevin Donovan, assistant director in charge of the FBI's New York field office, said in a statement. "But the potential windfall was probably far greater than the contents of a bank vault, and using 2lst century technology, they didn't even need a getaway car. Using the same technology, we determined what was done and who did it, proving that technology is a double-edged sword." Experts on identity theft said the existence of such a ring was the natural by-product of the existing system of computerized credit information. "This situation was a problem waiting to happen," said Linda Foley, executive director of the Identity Theft Resource Center in San Diego. "We know that there are many cases of computer breaches where information (is stolen) leading to identity theft." Experts also blamed TCI and the credit agencies for their roles in the identity theft problem. "How much screening did (Cummings) go through before being hired for the help desk?" Foley said. A Gartner analyst pointed out the problem of too many low-level employees having access to consumers' personal information. "The fact that lower-tier employees, people who don't have as high a degree of accountability, have access to such information is a problem, and it's one we see on a regular basis," Gartner analyst Doug Barbin said. Among the TCI clients whose passwords and subscribers codes the identity thieves used are Ford Motor Credit's Grand Rapids, Mich., branch; Washington Mutual Bank in St. Augustine, Fla.; Washington Mutual Finance in Crossville, Tenn.; Dollar Bank in Cleveland; and Central Texas Energy Supply. ID Theft - CNET News.com November 25, 2002, 2:34 PM PT

“Hi, I’m Philip, may I help you?” Hakeem MohammedLinus Baptiste

IT Security Threats

(3) Basic Categories of Threats 1.Network Attacks 2.Intrusions 3.Malicious Code

Data Interception: Old Model Versus New Model Private Network R Increased Opportunity for Data Interception > 10X Public Network

1. Network Attacks Degrades Services Slows Network Performance Does Not Breach Internal IT Workings Can be Started by People with only Modest IT Skills

DoS Attack Denial of Service Attack Easy to Mount Difficult to Defend Against

Denial of Service Attack High Threat Users are denied service to a server Can tie up an organization’s network $$$ Lost commerce Image Message/Request IP Packet Source Address Destination Address

Normal Service Message/Request IP Packet Source Address Destination Address

Denial of Service Attack Message/Request IP Packet Source Address Destination Address Bogus.bogus.bogus

2. Intrusions

3. Malicious Code

Love Bug Virus May 4 th, Million Users 300,000 Internet host computers Replication VBScript Program Medium Threat Characteristics: Wide-Spread Deletes Files Replicates Changes Home Page

Anna Kournikova Virus Low Threat VBScript Program Characteristics: Replicates attachment February 12 th, Replication

Slammer Worm January 25 th, ,000+ Servers Buffer Overflow Network Outages involving: * Airline flights & ATM’s * Internet backbone disruption – S. Korea Medium Threat Characteristics: Wide-SpreadAttacked specific port Smallest, efficient, 376 bytesEasy to detect Filled Internet Bandwidth, Overloaded NetworksRandom, went after every server Very Rapid Spread, doubling time 8 secondsTook DB Servers out of operation Did not destroy files Buffer Originating Computer Random Scanning Vulnerable Server Port 1434

Security Precautions and Recommendations Firewalls Access Logs Anti-virus software Access Authentication Encryption

Firewalls Source: Vicomsoft (

Access Logs Access Log

Encryption

The “s” in https and the padlock

Anti-virus software

Access Authentication