Presentation is loading. Please wait.

Presentation is loading. Please wait.

Lecture 8. Cyber Security, Ethics and Trust

Similar presentations


Presentation on theme: "Lecture 8. Cyber Security, Ethics and Trust"— Presentation transcript:

1 Lecture 8. Cyber Security, Ethics and Trust

2 Purpose Safety hazards of information and their classification
Measures and means of information protection. Enciphering (cryptography) Anti-virus programs

3 Vocabulary Viruses Worms Trojans Spyware Phishing Adware Riskware
Jokes Rootkit Malware firewall Вирусы Черви Трояны Шпионские программы Фишинг Реклама Потенциально опасные программы Шутки Руткит Вредоносные программы брандмауэр

4 1. Safety hazards of information and their classification
Information security (InfoSec), is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. 

5 Viruses: Boot Sector Virus - targets the boot sector of a hard drive and crucially effects the boot proccess. Network Virus - uniquely created to quickly spread throughout the local area network and generally across the Internet as well. (drives and folders) Macro Virus - infects program files that use macros in the program itself, such as word processors. Polymorphic virus - Type of virus that can change form each time it is executed . It was developed to avoid detection

6 Viruses: Worms Trojans Spyware Phishing Adware Riskware Jokes Rootkit
Spam

7 Viruses Worms: this type of Malware uses network resources for spreading. Trojans: programs that execute on infected computers unauthorized by user actions; i.e. depending on the conditions delete information on discs, make the system freeze, steal personal information, etc.

8 Viruses Spyware: software that allows to collect data about a specific user or organization, who are not aware of it. Phishing is a mail delivery whose aim is to get from the user confidential financial information as a rule.

9 Viruses Logic Bombs - Surreptitiously copied from the central system and remain dormant until an external event the alert activates it. It can be a combination of evetns or a certain date, etc. Stealth - A program that looks harmless, but has harmful code inside. When that software is activated it causes damage to your computer.

10 Viruses Rootkit - these are utilities used to conceal malicious activity. Jokes - software that does not harm your computer but displays messages that this harm has already been caused, or is going to be caused on some conditions Spam - anonymous, mass undesirable mail correspondence.

11 A virus is made up of three modes
Reproductive Attack Defense

12

13 2 Measures and means of information protection
Password Protection Software Updates (anti-virus, anti-spyware, etc). Firewall Malware Protection

14 A firewall is a network security system that monitors and controls the incoming and outgoing network traffic based on predetermined security rules.

15 Cryptography Cryptography (from the Greek Krypto 'hidden' and Grafo 'written') is the study and implementation of techniques to hide information, or to protect it from being read. There are five primary functions of cryptography today: Privacy/confidentiality Authentication Integrity Non-repudiation Key exchange

16 3 Antivirus software Antivirus software detects, and then prevents, disarms or removes malicious programs or malware, often referred to as 'viruses'.

17 Best Antivirus Programs
1. 2. 3. 4. 5.

18 Standards and specifications in the field of information security
ISO Information security A standard is a document that provides requirements, specifications, guidelines or characteristics that can be used consistently to ensure that materials, products, processes and services are fit for their purpose. ISO International Standards ensure that products and services are safe, reliable and of good quality. For business, they are strategic tools that reduce costs by minimizing waste and errors, and increasing productivity.  The ISO family of standards helps organizations keep information assets secure.


Download ppt "Lecture 8. Cyber Security, Ethics and Trust"

Similar presentations


Ads by Google