Presentation is loading. Please wait.

Presentation is loading. Please wait.

Why Be Concerned About Computer Security? Security concerns that users should be concerned about, including: – Having a computer or other device stolen.

Similar presentations


Presentation on theme: "Why Be Concerned About Computer Security? Security concerns that users should be concerned about, including: – Having a computer or other device stolen."— Presentation transcript:

1

2 Why Be Concerned About Computer Security? Security concerns that users should be concerned about, including: – Having a computer or other device stolen – Losing important data because the storage media it was stored on becomes unreadable – Losing contact lists stored on a missing mobile phone – Buying pirated or counterfeited products Understanding Computers in a Changing Society, 5th Edition 2

3 Hardware Loss, Hardware Damage, and System Failure Hardware Loss – Can occur when a personal computer, USB flash drive, mobile device, or other piece of hardware is stolen, lost, damaged, or experiences a system failure A vast majority of hardware theft is for the value of the hardware itself Often stolen from homes, businesses, cars, airports, hotels, and luggage or packages lost by airlines or shipping companies Theft for information contained within the hardware, called C-level attacks (from CEO’s), is on the rise Understanding Computers in a Changing Society, 5th Edition 3

4 Hardware Loss, Hardware Damage, and System Failure – Hardware Theft 70 million mobile phones lost annually in U. S. alone – 80% of users store information on mobile phones that can be used for identify theft – Hardware Damage Can occur from power fluctuations, heat, dust, static, electricity, water, and abuse Can be accidental or intentional Understanding Computers in a Changing Society, 5 th Edition 4

5 Hardware Loss, Hardware Damage, and System Failure System Failure and Other Disasters – The complete malfunction of a computer system Can be due to a hardware problem, software problem, or computer virus Can be due to a natural disaster or planned attack Understanding Computers in a Changing Society, 5th Edition 5

6 Hardware Loss, Hardware Damage, and System Failure Protecting Against Hardware Loss, Hardware Damage, and System Failure – Door and Computer Equipment Locks Lock up USB flash drives, external hard drives, and other media Cable locks Security slots Cable anchors Laptop alarm software Understanding Computers in a Changing Society, 5th Edition 6

7 Hardware Loss, Hardware Damage, and System Failure – Encryption and Self-Encrypting Hard Drives Use encryption to protect data Increasingly used with USB flash drives, portable computers, external hard drives, etc. Full Disk Encryption (FDE) – Everything on the storage medium is encrypted (some devices allow non-sensitive material to be unencrypted) Self-Encrypting Hard Drive – A hard drive using FDE (full-disk encryption) – Used most often with portable computers Understanding Computers in a Changing Society, 5th Edition 7

8 Hardware Loss, Hardware Damage, and System Failure – Computer Tracking Software and Anti-theft Tools Used to find a computer or other device after it is lost or stolen Sends out identifying data via the Internet (Wi-Fi) Law enforcement can use this data to recover device Some can take video or picture of the person using it Stealth Tracking Software – The sending of data cannot be seen by the thief Understanding Computers in a Changing Society, 5th Edition 8

9 Hardware Loss, Hardware Damage, and System Failure An alternative is tracking software that displays a message on the screen when used – “This computer is stolen” – “This device is locked—it won’t work without a password” Software costs $30 to $50 per year Kill Switch – Technology that causes the device to self- destruct Understanding Computers in a Changing Society, 5 th Edition 9

10 Hardware Loss, Hardware Damage, and System Failure Asset Tags – Identify the owner – Designed to be permanently attached – Some Asset Tags have Tamper Evident Labels » Change their appearance if someone tries to remove them » Have hidden message under tag if removed – Additional Precautions for Mobile Users Mobile Device Management (MDM) – Used by businesses to manage mobile devices used by employees » Can control apps available on phone Understanding Computers in a Changing Society, 5th Edition 10

11 Hardware Loss, Hardware Damage, and System Failure » Can disable a phone camera while on the company premises » Can wipe down a lost or stolen phone » Can display a message where to return phone if lost » Can display current location of the phone via GPS » Can play a loud sound to locate the phone if it is nearby Wireless Tether System – Ties phone to a key fob in order to sound an alarm and lock the phone if further away than the specified allowable distance Understanding Computers in a Changing Society, 5 th Edition 11

12 Hardware Loss, Hardware Damage, and System Failure Other Precautions – Use common sense and do not leave personal computers and mobile devices unattended Understanding Computers in a Changing Society, 5th Edition 12

13 Hardware Loss, Hardware Damage, and System Failure – Proper Hardware Care Do not drop Use protective cases Semi-rugged and ultra-rugged devices are available – Designed to withstand much more physical abuse than conventional computers – Spill resistant and can withstand falls from 3 or more feet to concrete or extreme temperature ranges Understanding Computers in a Changing Society, 5th Edition 13

14 Hardware Loss, Hardware Damage, and System Failure Understanding Computers in a Changing Society, 5th Edition 14

15 Hardware Loss, Hardware Damage, and System Failure Use surge suppressors – Protect hardware from damage due to electrical fluctuations Use uninterruptible power supplies (UPSs) – Provide continuous power to a computer system for a period of time after the power goes off – Run by battery – Length of time depends on number of devices connected to it Understanding Computers in a Changing Society, 5th Edition 15

16 Hardware Loss, Hardware Damage, and System Failure Avoid exposing devices to dust, moisture, static, and heat Specially made vacuums can be used, carefully, to clean Careful around water More than 50% of phones fixed by one data recovery firm were damaged by water Understanding Computers in a Changing Society, 5 th Edition 16

17 Hardware Loss, Hardware Damage, and System Failure Understanding Computers in a Changing Society, 5th Edition 17 Avoid Head Crashes A head crash is a hard-disk failure that occurs when a read–write head of a hard disk drive comes in contact with its rotating platter, resulting in permanent and usually irreparable damage to the magnetic media on the platter surface. It is most commonly caused by a sudden severe motion of the disk, for example the jolt caused by dropping a laptop on the ground while it is operating.

18 Hardware Loss, Hardware Damage, and System Failure – Backups and Disaster Recovery Plans Both businesses and individuals should use appropriate backup procedures Backup media needs to be secured – Data storage companies store backup media at secure remote locations – Online backup is another possibility (the Cloud) Continuous data protection (CDP) – Backups data as it occurs – Expensive, but worth it Disaster-recovery plan – Describes the steps a company will take following the occurrence of a disaster Understanding Computers in a Changing Society, 5th Edition 18

19 Software Piracy and Digital Counterfeiting Software Piracy – Unauthorized copying of a computer program occurs when: Individuals make illegal copies of software to give to friends Businesses or individuals install software on more than the number of computers allowed according to the end-user license agreement (EULA) Sellers install unlicensed copies on computers sold to consumers Large-scale operations in which programs and packaging are illegally duplicated and sold as supposedly legitimate products – Online auctions Understanding Computers in a Changing Society, 5th Edition 19

20 Software Piracy and Digital Counterfeiting Understanding Computers in a Changing Society, 5th Edition 20

21 Software Piracy and Digital Counterfeiting Digital Counterfeiting – The use of computers or other types of digital equipment to make illegal copies of documents Currency, checks, collectibles and other items Often scanned and printed or color-copied More then 60% of all counterfeit money produced digitally—up from 1% in 1996 ―Illegal in the United States Understanding Computers in a Changing Society, 5th Edition 21

22 Software Piracy and Digital Counterfeiting – Majority of counterfeit money made by amateurs easily detectable Paper used on real bills very expensive, and cannot legally be made by paper mills for any purpose other then U. S. money U. S. bills contain special characteristics hard to reproduce – Individuals and businesses lose face value of counterfeit money if in their possession (even if they aren’t aware it is fake—illegal if they do and pass it on) Understanding Computers in a Changing Society, 5 th Edition 22

23 Software Piracy and Digital Counterfeiting Protecting Against Software Piracy and Digital Counterfeiting – Software Antipiracy Tools Educating businesses and consumers about the legality Requiring a unique registration code or product key Checking validity of a software installation before upgrades or other resources related to the program can be used (Microsoft) Watching online auction sites/lawsuits and requesting removal of suspicious items, then suing Michigan woman made $400,000 via her Web site, and was sentenced to two years in prison Understanding Computers in a Changing Society, 5th Edition 23

24 Software Piracy and Digital Counterfeiting Incorporating code into applications to inform the vendor when pirated copies are being used, or are in violation of the license – Information can include business’s domain name or IP address, and a link to its location on Google Maps. – Vendor contacts business and gives them the chance to comply and buy software Understanding Computers in a Changing Society, 5 th Edition 24

25 Software Piracy and Digital Counterfeiting Understanding Computers in a Changing Society, 5th Edition 25

26 Software Piracy and Digital Counterfeiting – Digital Counterfeiting Prevention New currency designs released every seven to ten years by the U.S. Treasury Department – Micro-printing, watermarks, a security thread, and special paper are used – Embedded in the paper » Harder to duplicate Counterfeiters can’t bleach out the ink and replace value with higher denominations Can be held up to the light and checked for watermark or security threads Some hardware and software will not allow images of currency to be printed and many color copiers print invisible codes on copied documents Understanding Computers in a Changing Society, 5th Edition 26

27 Software Piracy and Digital Counterfeiting Digital Watermarks and RFID tags can also be used to deter counterfeiting checks and ID cards – Digital watermark » Subtle alteration to a digital item that is not noticeable, but that can be retrieved to identify the true owner of the item Understanding Computers in a Changing Society, 5 th Edition 27

28 Software Piracy and Digital Counterfeiting Understanding Computers in a Changing Society, 5th Edition 28

29 Databases, Electronic Profiling, Spam, and other Marketing Activities Databases and Electronic Profiling – Unless data stored in databases is sufficiently protected, security breaches can occur – Marketing databases, government databases, and educational databases are at higher risk for personal privacy violations Marketing Databases – Collection of marketing and demographic data about people and used for marketing purposes – Data obtained by subscribing to a magazine, buying with a credit card, filling out product registration card, etc. Understanding Computers in a Changing Society, 5th Edition 29

30 Databases, Electronic Profiling, Spam, and other Marketing Activities – Data is also gathered from Web and social media activities » Facebook, MySpace, Google+, and location services such as Foursquare Government Databases – Collection of data about people, collected and maintained by the government – Some information is confidential, other is public » Tax information, and Social Security earnings are private » Birth records, marriage and divorce information are public Understanding Computers in a Changing Society, 5th Edition 30

31 Databases, Electronic Profiling, Spam, and other Marketing Activities – Real ID Act of 2005 » Mandates the development of a national ID system that links driver’s license and other identification databases across the country – Much information about an individual is available for free on the Internet » Sometimes this is an advantage, like checking background of prospective employee; other times its an invasion of privacy Understanding Computers in a Changing Society, 5th Edition 31

32 Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers in a Changing Society, 5th Edition 32

33 Databases, Electronic Profiling, Spam, and other Marketing Activities – Electronic Profiling Using electronic means to collect a variety of in-depth information about an individual Designed to provide specific information, which is then sold to companies to be used for marketing purposes – Name, current and previous addresses, telephone number, martial status, age of children, spending habits, and product preferences Understanding Computers in a Changing Society, 5th Edition 33

34 Databases, Electronic Profiling, Spam, and other Marketing Activities – Electronic Profiling » Companies purchasing information may ask for addresses in an affluent area who buy baby products, for example Understanding Computers in a Changing Society, 5 th Edition 34

35 Databases, Electronic Profiling, Spam, and other Marketing Activities – Privacy Policy Discloses how information you provide will be used Included on many Web sites Dictates how supplied information may be used, but can be changed and often without notice (common practice) Understanding Computers in a Changing Society, 5th Edition 35

36 Databases, Electronic Profiling, Spam, and other Marketing Activities Spam and Other Marketing Activities – Unsolicited, bulk e-mail sent over the Internet – Often involves health-related products, counterfeit products, fraudulent business opportunities, pornography, etc. – Marketing e-mails from companies a person has done business with, or a third party that acquires the address – Appearing via instant messaging (spim) – Also delivered via mobile phones, social networking sites – 90% of all e-mail messages are now spam Understanding Computers in a Changing Society, 5th Edition 36

37 Databases, Electronic Profiling, Spam, and other Marketing Activities Spam and Other Marketing Activities – Can slow down a mail server’s delivery system – Can disable a mail network completely – Recipients can lose important e-mails because they get caught in a spam filter CAN-SPAM Act of 2003 enacted some requirements and penalties for commercial e-mailers – Truthful subject lines – Honor removal requests – One spammer ordered to pay 230 million to MySpace; another to pay Facebook $873 million Understanding Computers in a Changing Society, 5 th Edition 37

38 Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers in a Changing Society, 5th Edition 38

39 Databases, Electronic Profiling, Spam, and other Marketing Activities Protecting the Privacy of Personal Information – Safeguard Your E-mail Address Use one private e-mail address for trusted sources likes friends, family, and colleagues Use a disposable e-mail address for online shopping, message boards, product registration, etc. Understanding Computers in a Changing Society, 5th Edition 39

40 Databases, Electronic Profiling, Spam, and other Marketing Activities – Be Cautious of Revealing Personal Information Read a Web site’s privacy policy Avoid putting too many personal details on your Web site Use a throw-away e-mail address when signing up for free trials or other services than may result in spam Consider using privacy software, such as Anonymizer Universal or Privacy Guardian to hide personal information while browsing the Web Supply only the required information in registration forms Delete your browsing history and e-mail settings when using a public computer; use private browsing Understanding Computers in a Changing Society, 5th Edition 40

41 Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers in a Changing Society, 5th Edition 41

42 Databases, Electronic Profiling, Spam, and other Marketing Activities – Use Filters and Opt Out Use an e-mail filter to automatically sort e-mail messages and route possible spam into a special folder to deal with later – E-mail filters used to catch spam are called spam filters Opt Out – Request to be removed from marketing activities or that personal information not be shared with other companies – Some privacy groups want individuals to have to opt in to activities instead – Walmart Understanding Computers in a Changing Society, 5th Edition 42

43 Databases, Electronic Profiling, Spam, and other Marketing Activities Understanding Computers in a Changing Society, 5th Edition 43

44 Databases, Electronic Profiling, Spam, and other Marketing Activities – Secure Servers and Otherwise Protect Personal Information Only enter personal information on Web sites using secure servers Automatic encryption systems for e-mail can help sensitive data from accidentally being revealed Chief Privacy Officer (CPO) – Ensures that the private data stored by businesses is adequately protected Understanding Computers in a Changing Society, 5th Edition 44

45 Databases, Electronic Profiling, Spam, and other Marketing Activities – Properly Dispose of Hardware Containing Data Wipe (overwritten several times using special disk-wiping software)--not just delete--data on hard drives before disposing of a computer or hard drive Storage media containing sensitive data should be shredded (CD’s, DVD’s) Businesses should have a media sanitation/data destruction policy Some use data destruction services like Data Killer Understanding Computers in a Changing Society, 5th Edition 45

46 Electronic Surveillance and Monitoring Computer Monitoring Software – Records an individual’s computer usage either by capturing images of the screen, recording the actual keystrokes used, or creating a summary of Web sites visited – Can be used in homes by adults to monitor computer usage of children or spouse – Can be used in businesses to monitor employee computer usage – Keystroke-logging programs Used to capture keystrokes Can be used by hacker to capture usernames, passwords, and other sensitive information entered into a computer via the keyboard – Can be software sent via malware Understanding Computers in a Changing Society, 5th Edition 46

47 Electronic Surveillance and Monitoring – Keystroke-logging programs » Can be physically installed between the system unit and the keyboard » In 2008, man convicted and sentenced to 9 years in prison and ordered to pay $347,000 in restitution for installing software on hotel business centers and in Internet cafes. » There are programs designed for law enforcement agencies, but requires a court order The USA Patriot Act does allow the FBI to conduct a limited amount of Internet surveillance first to capture e-mail or IP address going into or coming out of a suspect’s computer Understanding Computers in a Changing Society, 5 th Edition 47

48 Electronic Surveillance and Monitoring Understanding Computers in a Changing Society, 5th Edition 48

49 Electronic Surveillance and Monitoring Video Surveillance – The use of video cameras to monitor activities of individuals – Used to monitor employees – Used in public locations for crime-prevention purposes Stores and other businesses, public streets, subways, airports, etc. – Can be used with face recognition software Identify terrorists and other known criminals – Privacy advocates object to the use of video surveillance and face recognition technology in public places Understanding Computers in a Changing Society, 5th Edition 49

50 Electronic Surveillance and Monitoring Video Surveillance Privacy concerns also exist regarding digital cameras capabilities in mobile phones – Phones being banned in athletic clubs – Some YMCA’s have banned them in locker and restrooms – Banned in court houses to prevent witness intimidation Understanding Computers in a Changing Society, 5 th Edition 50

51 Electronic Surveillance and Monitoring Understanding Computers in a Changing Society, 5th Edition 51

52 Electronic Surveillance and Monitoring Employee Monitoring – Observing or recording employees’ actions while they are on the job; legal and quite common – Can monitor computer usage, phone calls, e-mail, etc. – Can monitor physical location Video cameras GPS capabilities built into cars or mobile phones Proximity cards – Can also be used to access a facility, computer, etc. – Businesses don’t have to, but should notify employees of monitoring – Bills being introduced in U. S. that would prohibit monitoring without notification Understanding Computers in a Changing Society, 5th Edition 52

53 Electronic Surveillance and Monitoring Presence Technology – Enables one computing device on a network to locate and identify the current status of another device on the same network – Can tell if a someone is using his/her computer or mobile phone – Can locate co-workers – May also be used for marketing activities in the future – Potential privacy concerns How is data going to be used Understanding Computers in a Changing Society, 5th Edition 53

54 Electronic Surveillance and Monitoring Protecting Personal and Workspace Privacy – Use antispyware software to detect and remove some types of illegal computer monitoring and spyware software Understanding Computers in a Changing Society, 5th Edition 54

55 Electronic Surveillance and Monitoring – The Employer’s Responsibilities Keep company, employee, and customer information private and secure – Ensure employee activities are not being monitored by a hacker or other unauthorized individual Have an employee policy that informs employees about company’s monitoring activities – The Employees’ Responsibilities Read the company’s employee policy Avoid personal activities at work Understanding Computers in a Changing Society, 5th Edition 55

56 Computer Security and Privacy Legislation A variety of laws have been passed since the 1970s due to the high level of concern about computer security and personal privacy – Several pieces of legislation have been introduced, but not yet passed Do Not Track Me Online Act Do Not Track Kids Act of 2011 Best Practices Act – Difficult for legal system to keep pace with technology changes – Difficult to balance freedom of speech with right to privacy Understanding Computers in a Changing Society, 5th Edition 56

57 Computer Security and Privacy Legislation Understanding Computers in a Changing Society, 5th Edition 57

58 Computer Security and Privacy Legislation Understanding Computers in a Changing Society, 5th Edition 58


Download ppt "Why Be Concerned About Computer Security? Security concerns that users should be concerned about, including: – Having a computer or other device stolen."

Similar presentations


Ads by Google