Presentation is loading. Please wait.

Presentation is loading. Please wait.

Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel.

Similar presentations


Presentation on theme: "Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel."— Presentation transcript:

1 Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel

2 Agenda 1. Overview of Desert Tan 2. Computer Security 3. Computer Forensics 4. Conclusions

3 Concept Map

4 Desert Tan Desert Tan is a small company which provides customers with tanning options. They offer state-of-the-art equipment in both light beds and spray on tans. Currently they have 10 different franchise locations within the Northwest. Their unique online presence allows customers to create an online account similar to online banking.

5 Desert Tans‘ Questions How can we provide customers safe and secure online transactions? How can computer forensics help monitor inappropriate employee and franchise activity? What are the costs associated with implementing a monitoring system?

6 Definition Computer Security Computer security is a branch of technology known as information security as applied to computer. The objective of computer security varies and can include protection of information from theft or corruption, or the preservation of availability, as defined in the security policy. Computer security imposes requirements on computers that are different from most system requirements because they often take the form of constraints on what computers are not supposed to do. Source: www.wikipedia.com

7 What Covers Computer Security? Source: data bases on CSI Survey 2007

8 Survey Reading List

9 What type of computer attacks do you know? Source: CSI Survey 2007

10 Estimate the total loss in Dollar due to computer attacks in 2007 for the US: $ 66,930,950 Source: CSI Survey 2007

11 Estimate the percentage loss due to insiders: Source: CSI Survey 2007

12 Estimate the percentage of users having an anti virus software, firewall, anti spyware software, forensic tools: Source: CSI Survey 2007 98% 97% 80% 40%

13 6 layers of security Source: www.hp.com

14 Telephone Interview to Trend Micro Question: What are the common 3 questions about computer security from small companies? No. 3 How often should they upload their computer security software? No. 2 What should they do? No. 1 How much should they prepare for computer security?

15 Definition Computer Forensics Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics adheres to standards of evidence admissible in a court of law. Computer forensics experts investigate data storage devices, (such as hard drives, USB Drives, CD-ROMs, floppy disks, tape drives, etc.), identifying, preserving, and then analyzing sources of documentary or other digital evidence. Computer Forensics Video Source: www.wikipedia.com

16 Enron Case Arthur Andersen & Company said the accounting firm had destroyed a ''significant but undetermined'' number of documents relating to Enron and its finances. Questions for the Class: –What should Enron have done as an organization when these allegations were made? –What would you have done if you were the CEO, CTO, or lawyer of Enron?

17 Question 1 How can we provide customers safe and secure online transactions? –Only certain employees have access to customer information –PayPalPayPal PayPal includes all these features: Secure system Fraud protection Reporting tools Shipping and sales tax tools

18 Question 2 How can computer forensics help monitor inappropriate employee and franchise activity? All internet security Your company needs to decide the level of protection they are looking for.

19 Question 3 - Cost Analysis Source: CSI Survey 2007

20 Recommendet next steps Do more research on what you are currently using Use PayPal Discuss with your IT specialist which security programs are best for your company and what are appropriate next steps

21 QUESTIONS??


Download ppt "Company LOGO Computer Security and Forensics By Kim Cassinelli, Eriko Yamaguce and Stefan Schuebel."

Similar presentations


Ads by Google