Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security Fundamentals

Similar presentations


Presentation on theme: "Computer Security Fundamentals"— Presentation transcript:

1 Computer Security Fundamentals
by Chuck Easttom Chapter 13 Cyber Detective

2 Chapter 13 Objectives Find contact information on the web Locate court records on the web Locate criminal records on the web Use Usenet newsgroups to gather information We no longer live all our lives in the small towns where we were born. People move into and out of our lives constantly. Corporate moves, job losses, educational opportunities, and many other reasons cause a constant shifting in our neighbors and co-workers. Our busy lives do not allow us to know people as well as we used to. Information gathering is a way to protect ourselves, both personally and on the job. © Pearson, Inc Chapter 13 Cyber Detective

3 Introduction Preceding chapters have examined these topics:
Identity theft Hacking Investigating potential employees © Pearson, Inc Chapter 13 Cyber Detective

4 Introduction (cont.) Identity theft
Criminals use a small amount of information to garner more. Look at Internet techniques for finding additional information. Security personnel need to know how this is done to defend against it. Any small bit of information about you can be turned into another bit that, combined with another, can result in a social engineering coup! Each of these steps is just one brick at a time in the wall. © Pearson, Inc Chapter 13 Cyber Detective

5 Introduction (cont.) Hacking Investigating potential employees
Obtain information to social engineer or to guess passwords. Investigating potential employees Calling references may not be enough. Hiring a private detective may be impractical. © Pearson, Inc Chapter 13 Cyber Detective

6 Introduction (cont.) Network administrators in particular must be investigated. The network cannot keep out the person who set it up. Information about his past from a source other than supplied references may affect the hiring decision. Remember that 80% of security policy violations are perpetrated by network techs. © Pearson, Inc Chapter 13 Cyber Detective

7 Introduction (cont.) The Internet is a valuable investigative tool.
Useful for finding out about potential employees, babysitters, and so forth. Much of the information is free. States have court records online. © Pearson, Inc Chapter 13 Cyber Detective

8 Introduction (cont.) Information is a two-edged sword.
An innocent person may use it for legitimate investigations. A less scrupulous person may use it for identity theft or stalking. Invasion of privacy has ethical, moral, and legal ramifications. Practice searches on your own name unless you have written consent. Be careful. Have consent before you search a potential hire, business partner, babysitter, and so forth. Their refusal will tell you something! © Pearson, Inc Chapter 13 Cyber Detective

9 General Searches Search to find addresses, phone numbers, or addresses © Pearson, Inc Chapter 13 Cyber Detective

10 Court Records and Criminal Checks
Sex offender registries You may not be able to base employment decisions on certain information. Check with an attorney first. © Pearson, Inc Chapter 13 Cyber Detective

11 Court Records and Criminal Checks (cont.)
Civil court records Civil issues, as well as crimes, may make a person unsuitable for a particular job. No centralized Web site for these issues. Many states and Federal courts offer online records, for example: © Pearson, Inc Chapter 13 Cyber Detective

12 Court Records and Criminal Checks (cont.)
Other resources The National Center for State Courts The Law School at Emory University Public record finder © Pearson, Inc Chapter 13 Cyber Detective

13 Court Records and Criminal Checks (cont.)
Other resources Pacer The Boost State public access ctl.ncsc.dni.us/publicaccess/ © Pearson, Inc Chapter 13 Cyber Detective

14 Court Records and Criminal Checks (cont.)
Other resources Prison searches Federal prison records Public records United Kingdom public records © Pearson, Inc Chapter 13 Cyber Detective

15 Usenet Newsgroups on many subjects. Use Google “Groups” option.
Anyone can post anything . Search for potential employees. Can be an important investigative tool. Information must be verified elsewhere. Be careful. Take what you find with a grain of salt. Use it to verify other information you may have, or look for more information to verify what you find here. Anyone can say anything on Usenet, whether true or false. Also, keep in mind that many people post to Usenet under pseudonyms—you may be more successful gathering information about companies than data about individuals. © Pearson, Inc Chapter 13 Cyber Detective

16 Summary The Internet is a valuable investigative resource
To hackers and identity thieves To employers of network administrators as well as babysitters Periodically check your own identity to see what information is available. Keep on top of your own identity in this way. © Pearson, Inc Chapter 13 Cyber Detective


Download ppt "Computer Security Fundamentals"

Similar presentations


Ads by Google