Security, Social and Legal Issues Regarding Software and Internet.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
The Internet.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 6 Chapter 6 Implementing Security for Electronic Commerce.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Defining Computer Security cybertechnology security can be thought of in terms of various counter measures: (i) unauthorized access to systems (ii) alteration.
Staying Safe Online Keep your Information Secure.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
Adam Soph, Alexandra Smith, Landon Peterson. Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Types of Electronic Infection
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 7: E-Commerce Security and Payment system
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Security is often cited as a major barrier to electronic commerce. Prospective buyers are leery of sending credit card information over the web. Prospective.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Computer Security By Duncan Hall.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Firewalls Priyanka Verma & Jessica Wong. What is it? n A firewall is a collection of security measures designed to prevent unauthorised electronic access.
ONLINE SAFETY AND SECURITY Computer Basics 1.5. INFAMOUS CYBER ATTACKS IN 2014 Sony Pictures: Attackers stole just about everything in the corporate network,
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
CSCI-235 Micro-Computers in Science Privacy & Security.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
CHAPTER 18 TECHNOLOGY ADVANCEMENTS IN THE WORKPLACE.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Electronic Banking & Security Electronic Banking & Security.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Chapter 40 Internet Security.
Security, Social and Legal Issues Regarding Software and Internet
Hotspot Shield Protect Your Online Identity
IT Security  .
Security, Social and Legal Issues Regarding Software and Internet
Unit 4 IT Security.
Information Security 101 Richard Davis, Rob Laltrello.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Understanding the Need for Security Measures
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Security, Social and Legal Issues Regarding Software and Internet

Basic Security Concepts Threats Countermeasures Encryption Decryption

Security Issues: Threats The entire point of computer security is to eliminate or protect against threats. A threat is anything that can cause harm. In the context of computer security, a threat can be a burglar, a virus, an earthquake or a simple user error. By itself, a threat is not harmful unless it exploits an existing vulnerability. A vulnerability is a weakness– anything that has not been protected against threats, making it open to harm.

Countermeasures A countermeasure is any step you take to award off a threat– to protect yourself, your data, or your computer from harm. For example, regularly backing up your data is a countermeasure against the threat of data loss. A firewall is a countermeasure against hackers.

Classes of Countermeasures There are two classes of countermeasures. 1.The first shields the user from personal harm, such as threats to personal property, confidential information, financial records, medical records, and so forth. 2.The second safeguard protects the computer system from physical hazards such as theft, damage, power problems, and natural disasters or attacks on the data stored and processed in computers.

Threats to Users Networks and the internet have created limitless possibilities for people to work, communicate, learn, buy, play games, and interact with others around the world. These possibilities come from the openness of networks– especially the internet, which is available to virtually everyone, for virtually any kind of use. However, the very openness that makes the internet so valuable also has made it a medium for many types of threats. Still, we cannot blame the internet for all computer- related problems. Some issues, such as identity theft, are still accomplished with little or no help from a computer.

Identity Theft Identity theft occurs when someone impersonates you by using your name, social security number, or other personal information to obtain documents or credit in your name. With the right information, an identity thief can virtually “become” the victim, obtaining a drivers license, bank accounts, mortgages and other items in the victim’s name. Identity thieves can use several methods– low tech as well as high tech– to obtain the information they need:

Techniques for Obtaining Personal Information Shoulder Surfing: A trick known as shoulder surfing is as simple as watching someone enter personal identification information for a private transaction, such as an ATM machine. Snagging: A thief can catch information by listening in on the telephone extension, through a wiretap, or over a cubicle wall while the victim shares credit card or other personal information to a legitimate agent.

Techniques for Obtaining Personal Information Phishing: Impersonating a trusted company/institution/organization in an electronic communication to promote revealing of personal information. Advertising Bogus Jobs: Jobs are offered (either full-time or work from home based) to which the victims will reply with their full name, address, curriculum vitae, telephone numbers, and banking details

Encryption and Decryption Encryption is the process of altering readable data into unreadable form to prevent unauthorized access. Encryption is able to use powerful mathematical concepts to create coded messages that are difficult or even virtually impossible to break.

Forms of Encryption There are two basic forms of encryption– private key and public key. 1.Private key: private key encryption means that the same secret key is used by both sender and receiver to encrypt and decrypt a message. 2.Public key: public key encryption means that two keys are used– a public key, which the receiver has made known beforehand to the sender, who uses it to encrypt the message, and a private key, which only the receiver knows and which is required to decrypt the message.

Private Key : Symmetric Encryption This system uses only private keys. This requires the private key (code) to be installed on specific computers that will be used for exchanging messages between certain users. The system works pretty much like two best friends to send secret messages to each other. Both friends know the key to crack and encode secret messages.

Public key : Asymmetric Encryption Uses both the private and public keys. The private key is for yourself and the public key is published on line for others to see. Use the public key to access the encryption code that corresponds to your private key. If you are sending an encrypted message to your friend which you do not want others to see, you would use his/her public key to encrypt it.

Public key : Asymmetric Encryption He/She will be able to decrypt it with his/her own corresponding private key. Likewise, if he/she sends a message to you, he/she uses your public key to encrypt the message and you would use your private key to decrypt it.

Dear Nicole, I have reviewed the new….. Dear Nicole, I have reviewed the new….. Dear Nicole, I have reviewed the new….. Dear Nicole, I have reviewed the new….. $ββ£®€≠µ∞α™ ¥β¥% Original data Scrambled dataOriginal data Scrambled data Original data Public keyPrivate key Encryption Decryption Encryption Decryption Private key encryption Public key encryption

Social Issues: Loss of Privacy Do you know that your buying habits are tracked electronically, in a range of commercial systems? This doesn’t apply just to online transactions either. Any time you rent movies or buy groceries, the purchases are logged in a database. Your medical financial, and credit records are available to anybody authorized to view them. Many of the companies you deal with every day– from your local supermarket to your insurance company– maintain databases filled with information about you. You might expect these firms to know your name and address, but you might be surprised to learn that they know how many times each month you purchase groceries or buy a magazine. And a lot of companies do not keep this information confidential; they may sell it to other companies who are interested in knowing about you.

Online Spying Tools Software developers have created a number of ways to track your activities online. Although many of these tools were created for benign purpose– such as helping legitimate webmasters determine who visits their sites most often– they are also being used in ways most consumers do not appreciate.

Spying Tools: Cookies A cookies is a small text file that a web server asks your browser to place on your computer. The cookie contains information that identifies your computer (its IP address), you (your user name or address), and information about your visit to the web site. For instance, the cookie might list the last time you visited the site, which pages you downloaded, and how long you were at the site before leaving. If you set up an account at a web site such as an e- commerce site, the cookie will contain information about your account, making it easy for the server to find and manage your account whenever you visit.

Spying Tools: Web bugs A web bug is a small GIF-format image file that can be embedded in a web page or an HTML- format message. A web bug can be as small as a single pixel in size and can easily be hidden anywhere in an HTML document. A bug can record what web pages you view, keywords you type into search engine, personal information you enter in a form on a web page, and other data.