Types of Electronic Infection

Slides:



Advertisements
Similar presentations
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
By: Mr Hashem Alaidaros MIS 326 Lecture 6 Title: E-Business Security.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Chapter 9: Privacy, Crime, and Security
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8: Protecting Yourself Online.
19.1 Silberschatz, Galvin and Gagne ©2003 Operating System Concepts with Java Chapter 19: Security The Security Problem Authentication Program Threats.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 9: Planning and Managing Certificate Services.
1 Encryption What is EncryptionWhat is Encryption Types of EncryptionTypes of Encryption.
Computer and Network Security. Introduction Internet security –Consumers entering highly confidential information –Number of security attacks increasing.
Business Data Communications, Fourth Edition Chapter 10: Network Security.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
INTRODUCTION Why Signatures? A uthenticates who created a document Adds formality and finality In many cases, required by law or rule Digital Signatures.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
1 Computer & Web Security  Security Problems in Computer Use  Privacy-Protecting Techniques  Privacy-Protecting Technologies: cryptography, digital.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Unit 19 INTERNET SECURITY
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Internet Security facilities for secure communication.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 50 Cryptography, Privacy, and Digital Certificates.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 SSL - Secure Sockets Layer The Internet Engineering Task Force (IETF) standard called Transport Layer Security (TLS) is based on SSL.
Oz – Foundations of Electronic Commerce © 2002 Prentice Hall Security and Privacy Issues.
Technology Competency Computer Infestations Mr. Locke.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Encryption. Introduction The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Security Issues in Information Technology
Chapter 40 Internet Security.
Unit 3 Section 6.4: Internet Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security.
Computer Security.
Electronic Payment Security Technologies
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Types of Electronic Infection 1. Computer viruses 2. Worms 3. Trojan horses

1.Computer virus 17.3 Electronic Infection A program that attaches itself to a real program Each time the user’s program runs, the virus runs too Can corrupt a computer system Can replicate itself to infect other computer systems

1.Computer virus 17.3 Electronic Infection spreading through e-mail messages Spread via the Internet Spread through storage media

1.Computer virus: Spread through e-mail messages 17.3 Electronic Infection E-mail virus 1.Computer virus: Spread through e-mail messages Most common way of virus transmission Computers usually infected through e-mail attachments Virus replicates itself by automatically mailing itself to people in victim’s e-mail address book

1.Computer virus: Spread via the Internet 17.3 Electronic Infection Source of viruses Good practice to scan suspicious downloads

1.Computer virus: Spread through Storage Media 17.3 Electronic Infection 1.Computer virus: Spread through Storage Media Storage Media: Floppy Disks, CD- ROM etc… NOT the major sources for spreading computer viruses nowadays Files in a disk may be infected with virus downloaded from the Internet or attached to e-mails

2.Worms Method of spreading 17.3 Electronic Infection A computer program that uses computer networks and security loopholes to spread out and replicate itself. Method of spreading A copy of the worm scans the network for another machine with a specific security loophole The worm copies itself to the new computer using the security loophole.

3.Trojan Horses 17.3 Electronic Infection A computer program that intends to perform malicious or destructive actions Hide well or looks like real programs Running these programs the Trojan horse enters without any notice Hackers, with Trojan horses, can Steal sensitive information such as passwords and credit card numbers Remotely control the victim’s computer NOT a virus as there is NO REPLICATION

Avoiding Virus Attacks 17.3 Electronic Infection Avoiding Virus Attacks 1. Antivirus software Examine files stored on disk or downloaded from the Internet Determine whether they are infected Disinfect the files if necessary Scan for virus signatures to identify a known virus

Avoiding Virus Attacks 17.3 Electronic Infection Avoiding Virus Attacks 2. Measures to prevent infection Do not accept files from high-risk sources Install updated antivirus software Update virus signatures regularly Scan computer at regular intervals to ensure that it is free from virus Scan all incoming files before opening Backup programs and data regularly Change passwords at regular intervals

1. What is an Encryption? 17.4 Securing Internet Transaction The process of converting readable data (plaintext) into unreadable characters (ciphertext) Can prevent unauthorized access Read the encrypted file → Decryption → Readable form The reverse process is called decryption The encryption process generally requires -Algorithm -A mathematical formula -Encryption key -A string of numbers and characters

2. Symmetric Key Encryption & Public Key Encryption 17.4 Securing Internet Transaction 2. Symmetric Key Encryption & Public Key Encryption Symmetric Key Encryption BOTH the sender and the recipient use the SAME key to encrypt and decrypt data Problem Need one key for each partner → problem of key management and storage when a lot of people need to communicate

2. Symmetric Key Encryption & Public Key Encryption 17.4 Securing Internet Transaction 2. Symmetric Key Encryption & Public Key Encryption Public Key Encryption Two keys (Public Key & Private Key) Public Key Used for encryption Known to every person and placed on a public-key server Private Key Used for decryption Should be kept confidential

3. Digital Certificate 17.4 Securing Internet Transaction Guarantees the identity of a user involved in a transaction Also called a public-key certificate Issued and verified by a certificate authority (CA) Typically contains Holder’s name Holder’s public key Expiration date Issuing CA’s name and signature Serial number of certificate

4. Secure Sockets Layer (SSL) 17.4 Securing Internet Transaction 4. Secure Sockets Layer (SSL) A protocol that provides secure data transmission between web servers and browser A web site providing SSL must have a digital certificate Web sites use them to transmit confidential information like passwords and credit card numbers Web pages that use SSL typically begin with https:// instead of http://

4. Secure Sockets Layer (SSL) 17.4 Securing Internet Transaction 4. Secure Sockets Layer (SSL)

5. Securing E-mail Messages 17.4 Securing Internet Transaction 5. Securing E-mail Messages An e-mail message passes through a number of servers before reaching the recipient. Messages can be read by everyone if pried intentionally. Messages containing confidential information should be encrypted before being sent.

6. Digital Signature 17.4 Securing Internet Transaction A digital code attached to a message Used to identify the sender and verify that the received message has not been altered during transmission Generation process of digital signatures relies on public key method