Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.

Similar presentations


Presentation on theme: "Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and."— Presentation transcript:

1 Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself –Identify areas of computer security vulnerability and ways to protect against them –Recall the definition of encryption and apply the XOR encryption technique –Recognize good and bad passwords based on password guidelines

2 Security Resources you can use Protecting your computer sound byte: http://wps.prenhall.com/bp_evans_techinacti on_1/0,8697,1105530-,00.html Norton AntiVirus Response Center Web Page http://securityresponse.symantec.com/ Test the vulnerability of your computer: –Gibson Research Corporation (http://www.grc.com)http://www.grc.com –Qualys (http://browsercheck.qualys.com/)http://browsercheck.qualys.com/

3 Computer security vulnerability points Hardware – Software – People –

4 Backup Data and Files are vulnerable Primary defense against data loss Selective, incremental & full

5 Software Perform regular updates http://update.microsoft.com for Windowshttp://update.microsoft.com Microsoft update: Windows, Office, more Automatic updates Check with vendors for updates Verify e-mail notices independently

6 Hackers Def: Types of hackers: –White-hat –Black-hat –Script kiddies

7 What Hackers Do Steal information from computers: –Credit card numbers –Bank account numbers Internet packet sniffing Commit identity theft Create widespread computer attacks: –Backdoor programs (Trojan horse) Denial of service attacks

8 How Hackers Gain Access Direct access: –Hacking software Indirect access: –Internet connection

9 Firewall Def: Types of firewalls: –Norton Personal Firewall –McAfee Firewall –Zone Alarm –BlackICE PC Protection –Network routers

10 Computer Viruses What puts you at risk for viruses?

11 How to "Catch" a Virus Email attachments. Do not open attachments before checking –Is this email from someone I know? –Is the message a sensible follow-up to the last message from the sender? –Is the content of the message something the sender would say to me? –Is there a reason for the sender to include an attachment? When in doubt, be cautious

12 Antivirus Software Def: –Scan files looking for virus signatures (unique code) –Provide options for deleting or fixing infected files Need to be updated frequently Examples: McAfee, Norton, and Sophos, Inc.

13 What Viruses Do Replicate themselves: –Slow down networks Display annoying messages Delete files Change computer settings Love Letter – Fastest spreading virus Melissa – Caused $80 million damage Nimda – Affected more than 1 million computers

14 Logical security Def: What are ways to protect your password?

15 Biometric identification systems –Fingerprint –Palm print –Iris scan –Face recognition technology

16 Encryption Def: Encrypted data can be safely stored or transmitted Why is this needed?

17 Encryption example Using Exclusive OR, XOR,  If bits are the same, result is 0; if different 1 Apply a key to the plain or clear text

18 Encryption example 0101 Cleartext (The hex digit 5)  1001 Key

19 Encryption example If the cleartext is the hex digit D and the XOR key is 1001, what is the encrypted text?

20 Encryption example Encrypt the word NO with the key 10110110

21 Assignment Using XOR and the key 10110110, determine the encrypted results for the ASCII text: PASSWORD Complete HTML3


Download ppt "Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and."

Similar presentations


Ads by Google