Topic 5: Basic Security.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Let’s Talk About Cyber Security
Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Cyber X-Force-SMS alert system for threats.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Cyber Crimes.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT security By Tilly Gerlack.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Chap1: Is there a Security Problem in Computing?.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer crimes.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
IT Security  .
Social Engineering Charniece Craven COSC 316.
Instructor Materials Chapter 7 Network Security
CHAPTER 6 – BASIC SECURITY
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Malware, Phishing and Network Policies
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Computer Security By: Muhammed Anwar.
Chapter # 3 COMPUTER AND INTERNET CRIME
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Unit 1.6 Systems security Lesson 1
Presentation transcript:

Topic 5: Basic Security

Topic Review... This topic will cover: - Understand the networking threats. :> Describe the risks of network intrusion. :> Sources of network intrusion. :> social engineering and phishing in networking. - Explain the methods of attacks. :> viruses, worms, trojan horses etc - Implement the security measures to protect networks. :> define computer security :> security policy

Risk of Network Intrusion... Intruders can gain access to a network through software vulnerabilities, hardware attacks or even through less high-tech methods, such as guessing someone's username and password. Intruders who gain access by modifying software or exploiting software vulnerabilities are often called hackers.

Once the hacker gains access to the network, four types of threat may arise: > Information theft > Identity theft > Data loss / manipulation > Disruption of service

Information theft Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes. Example: Stealing a organization’s proprietary information, such as research and development information

Identity theft A form of information theft where personal information is stolen for the purpose of taking over someone’s identity. Using this information an individual can obtain legal documents, apply for credit and make unauthorized online purchases. Identify theft is a growing problem costing billions of dollars per year.

Data loss / manipulation Breaking into a computer to destroy or alter data records. Examples of data loss: sending a virus that reformats a computer’s hard drive. Examples of data manipulation : breaking into a records system to change information, such as the price of an item.

Disruption of service Preventing legitimate users from accessing services to which they should be entitled.

Sources of Network Intrusion... Security threats from network intruders can come from both internal and external sources.

External Threats External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.

Internal Threats Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. The internal attacker knows the internal politics and people. They often know what information is both valuable and vulnerable and how to get to it.

Social Engineering and Phishing... One of the easiest ways for an intruder to gain access, whether internal or external is by exploiting human behavior. One of the more common methods of exploiting human weaknesses is called Social Engineering.

Social Engineering Social engineering is a term that refers to the ability of something or someone to influence the behavior of a group of people. In the context of computer and network security Social Engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.

With these techniques, the attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords.

Phising Phishing is a form of social engineering where the phisher pretends to represent a legitimate outside organization. They typically contact the target individual (the phishee) via email. The phisher might ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring.

Vishing / Phone Phishing A new form of social engineering that uses Voice over IP (VoIP) is known as vishing. With vishing, an unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone- banking service. The call is then intercepted by a thief. Bank account numbers or passwords entered over the phone for verification are then stolen.

Methods of Attack... In addition to social engineering, there are other types of attacks which exploit the vulnerabilities in computer software. Examples of these attack techniques include: viruses, worms and Trojan horses. All of these are types of malicious software introduced onto a host.

They can damage a system, destroy data, as well as deny access to networks, systems, or services. They can also forward data and personal details from unsuspecting PC users to criminals. In many cases, they can replicate themselves and spread to other hosts connected to the network.

Viruses A virus is a program that runs and spreads by modifying other programs or files. A virus cannot start by itself; it needs to be activated. Once activated, a virus may do nothing more than replicate itself and spread. Though simple, even this type of virus is dangerous as it can quickly use all available memory and bring a system to a halt. A more serious virus may be programmed to delete or corrupt specific files before spreading. Viruses can be transmitted via email attachments, downloaded files, instant messages or via diskette, CD or USB devices.

Worms A worm is similar to a virus, but unlike a virus does not need to attach itself to an existing program. A worm uses the network to send copies of itself to any connected hosts. Worms can run independently and spread quickly. They do not necessarily require activation or human intervention. Self-spreading network worms can have a much greater impact than a single virus and can infect large parts of the Internet quickly.

Trojan Horses A Trojan horse is a non-self replicating program that is written to appear like a legitimate program, when in fact it is an attack tool. A Trojan horse relies upon its legitimate appearance to deceive the victim into initiating the program. It may be relatively harmless or can contain code that can damage the contents of the computer's hard drive. Trojans can also create a back door into a system allowing hackers to gain access.