Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.

Slides:



Advertisements
Similar presentations
Chapter 9 E-Security. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security Designing for Security.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Thank you to IT Training at Indiana University Computer Malware.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Computer Viruses.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Security+ Guide to Network Security Fundamentals
Chapter 9 E-Security. Awad –Electronic Commerce 2/e © 2003 Prentice Hall 2 Day 24 Agenda Quiz 3 Corrected –4 A’s, 4 B’s and 1 C Quiz 4 (last) will be.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Privacy and Security Issues Privacy and Security Issues related to Information and Communication Technology.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Chapter 9 - Protecting Digital Data, Devices Computer virus types Protecting computers from viruses Hackers Firewalls Passwords (skip) Malware, Spyware.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Topic 5: Basic Security.
Chapter 13 Understanding E-Security. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Security in Cyberspace Conceptualizing Security.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Security Threats CLICKTECHSOLUTION.COM. Computer Security Confidentiality –Data confidentiality –Privacy Integrity –Data integrity –System integrity.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Operating Systems Services provided on internet
Instructor Materials Chapter 7 Network Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Chapter 13 Understanding E-Security

2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer Enemy #1 threat How to prevent and protect?

3 SECURITY CONCERNS: examples Uncover confidentiality (bank account) Leak Authentication and Access Control (user name, password of your Web, ) Conduct ID theft (over 50% is credit card fraud) Hack or Intrude Web sites

4 CLIENT SECURITY THREATS Happens to client computers examples –Deliberate Corruption of Files (e.g., rename files) –Delete Stored Information –Use Virus (bring down system)

5 SERVER SECURIY THREATS Web server with active ports (e.g., 80, 8080) can be misused (scalability or deny of service attack) Web server directories (folders) can be accessed and corrupted

6 Server Threats: DENIAL OF SERVICE Hackers … Break into less-secured computers Installs stealth program which duplicates itself (congest network traffic) Target network from a remote location (RPC) and activates the planted program Victim’s network is overwhelmed and other users are denied access to Web and

7 VIRUS – eCommerce Threat #1 A malicious code replicating itself to cause disruption of the information infrastructure Attacks system integrity (cause inconsistent data) Target at computer networks, files and other executable objects

8 EXAMPLES OF VIRUSES Windows registry (regedit, cookies): e.g., spyware and adware (one type of spyware) Boot Virus –Attacks boot sectors of the hard drive “Trojan horses” –a bot planted in the systems being attacked, can be operated locally or remotely for malicious purposes

9 EXAMPLES OF VIRUSES (cont.): Trojan horse

10 VIRUS CHARACTERISTICS Fast to attack –Easily invade and infect computer hard disk Slow to defend –Less likely to detect and destroy Hard to find (Stealth) –Memory resident (registry) –Able to manipulate its execution to disguise its presence

11 BASIC INTERNET SECURITY TIPS Use Password –Alphanumeric –Mix with upper and lower cases –Change frequently –No dictionary names Use Encryption –Coding of messages in traffic between the customer placing an order and the merchant’s network processing the order

12 FIREWALL & SECURITY Firewall: frequently used for Internet security - prevent –Enforces an access control policy between two networks –Detects intruders, blocks them from entry, keeps track what they did and notifies the system administrator

13 Other security approach - repair, e.g. AntiSpyware to clean virus

14 Summary and Exercises Name a few security concerns What are the two types of threats? (client/server) Explain Trojan Horse Virus How to prevent and repair?