Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto.

Similar presentations


Presentation on theme: "Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto."— Presentation transcript:

1 Computer Security and Risks

2 “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government

3 Using Quizlet Choosing one word per page and two from some Make approximately 8 to 10 flash cards Invite your friends to your flash cards Learn all the terminology about computer crime using quizlet.com

4 Computer Crime Computer Forensics cybercrime Cyberstalking Identity theft Social engineering Spoofing Phishing Spammer

5 Computer Crime Malware Cross platform Viruses Macro Virus Macros 1999 Melisa Virus Cross scripting Virus Worms

6 Computer Crime Trojan Horse Logic Bomb Time Bomb Spyware Tracking software Spybot Drive by Downloads

7 Just as natural forests are more resistant to disease than are single- species tree farms, mixed computing environments are less susceptible to crippling attacks than is an organization in which everyone uses the same hardware and software.

8 Computer Crime Proxy server SSL Audit Trails Antivirus Security patches MS Slammer Hackers Crackers Webjackers Zombie Computers Bots Botnets

9 Quotes In 2007 a DDOS attack crippled the electronic infrastructure of the republic of Estonia, one of the most wired countries in the world “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)

10 Computer Crime DOS attacks (Denial of Service) DDOS distributed DOS Mafia Boy Biometrics Smart Card Passwords Access-control software Access privileges

11 Quotes “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics

12 Computer Crime Firewalls Encryption Encryption Key Decryption Audit control software Backups Generations RAID Automatically mirror Instant redundancy Off site backup On line backup (Speed Issues)


Download ppt "Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto."

Similar presentations


Ads by Google