Presentation is loading. Please wait.

Presentation is loading. Please wait.

Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Similar presentations


Presentation on theme: "Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos."— Presentation transcript:

1 Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos

2 Department of Mathematics Computer and Information Science2 Outline What is cyber security? Online safety Computer forensics Password protection Malware Steganography Summary Questions

3 Department of Mathematics Computer and Information Science3 What is cyber security? Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Computer systems are always under constant attack Work to navigate the Internet cautiously and securely

4 Department of Mathematics Computer and Information Science4 Social media

5 Department of Mathematics Computer and Information Science5 Online safety Participating in Internet activities in a responsible and safe manner Being aware of where you are online and who has access to personal information Understand that anything placed on the Internet never goes away

6 Department of Mathematics Computer and Information Science6 Essentials of online safety cont… Threats to online safety – Phishing – Cyber predators – Cyber bullying

7 Department of Mathematics Computer and Information Science7 Phishing Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity

8 Department of Mathematics Computer and Information Science8 Cyber predators Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes

9 Department of Mathematics Computer and Information Science9 Cyber bullying Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet Solution – Inform a trusted adult

10 Department of Mathematics Computer and Information Science10 Computer forensics Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information Emerged during this time as a method to recover and investigate digital evidence for use in court

11 Department of Mathematics Computer and Information Science11 Who are the bad guys? Blackhat hacker – An individual with extensive computer knowledge whose purpose is to breach or bypass internet security – Common name for individuals who commit computer crimes Forensic equipment and software are used to protect against attacks

12 Department of Mathematics Computer and Information Science12 Computer forensics equipment Write Blocker – Devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents

13 Department of Mathematics Computer and Information Science13 Computer forensics software EnCase – Computer forensics products used to analyze digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations

14 Department of Mathematics Computer and Information Science14 Malware Software that is intended to damage or disable computers and computer systems Launch attacks without the knowledge of users

15 Department of Mathematics Computer and Information Science15 Types of Malware Keylogger – Software or hardware that captures keystrokes on a computer Worm – Type of malware that independently copies its self and attacks computer systems Trojan horse – A harmful program that pretends to be something useful and helpful to a user Logic Bomb – Program inserted into software, that triggers when a set of specific conditions occur

16 Department of Mathematics Computer and Information Science16 Password protection Extremely important to protecting online accounts Should not include very common names (names of pets, people, or simple words in the dictionary)

17 Department of Mathematics Computer and Information Science17 What happens to simple password? Easier passwords can be attacked Dictionary attacks can be used to guess simple to moderate complexity passwords

18 Department of Mathematics Computer and Information Science18 Example

19 Department of Mathematics Computer and Information Science19 How do we protect ourselves? Increase the length and variety of passwords To create a strong password include: – Lowercase and uppercase letters – Numbers – Special characters – Length of seven characters or longer Example – Weak password-rover – Strong password- R043f112$*

20 Department of Mathematics Computer and Information Science20 Steganography Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient Use for a variety of reasons – Sending messages between friends – U.S. soldiers communicating secretly – Terrorists planning secret attacks on countries

21 Department of Mathematics Computer and Information Science21 Stego Examples QuickStego WinHip


Download ppt "Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos."

Similar presentations


Ads by Google