Computer and Network Security Brendan Duncombe Bahein Maung.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Craig Rimando Luke White. “hacking” - negative connotation Not always that way Originally a compliment Not all hacking necessarily bad “Good” hacking?
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
1 CHAPTER 1 POLITICS. 2 Definitions Of The Word Hacker Hacker – someone who has achieved some level of expertise with a computer Hacker – someone who.
Copyright © 2009 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 6: Computer and Network Security Ethics for the Information Age Forth.
 Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking means penetration.
 ICT Security › If the firm is a victim of a computer crime, should they pursue prosecution of the criminals at all costs, should they maintain a low.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
1 The Information School of the University of Washington Nov 17fit spyware © 2006 University of Washington The Dark Side of the Internet INFO/CSE.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Quiz Review.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Done By:Salha Mohammed Obaid AL-kaabi ID:
A Guide to Digital Citizenship
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
Mrs. Jefferson Business Information Management I.
COMP 2903 A27 – Why Spyware Poses Multiple Threats to Security Danny Silver JSOCS, Acadia University.
Viruses & Destructive Programs
Introduction of Internet security Sui Wang IS300.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
For brownies this PowerPoint will help you understand computer viruses and help stop them!!!!
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Ethical Hacking Han Li  Ethical Hacking is testing the resources for a good cause and for the betterment of technology.  Technically Ethical Hacking.
Topic 5: Basic Security.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Computer Skills and Applications Computer Security.
Cyber Security By:Jerusa Miller July 7, What Is Cyber Security? The protection of data and systems in networks that are connected to the Internet.
Understand Malware LESSON Security Fundamentals.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Information Systems Design and Development Security Risks Computing Science.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
MALWARE Autumn Mattis.
IT Security  .
Chapter 11 crime and security in the networked economy
The Impact Of ICT “Hacking”
Answer the questions to reveal the blocks and guess the picture.
Electronic voting – safe or not?
A Gift of Fire Third edition Sara Baase
HOW DO I KEEP MY COMPUTER SAFE?
Follow safety rules so that YOU: Avoid getting HURT.
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
CYBERSAFETY & Personal information
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Computer and Network Security Brendan Duncombe Bahein Maung

When code Attacks! Viruses: self replicating code. Worms: Self Contain program which spreads via vulnerabilities. Trojan Horse: program with benign capability that masks a sinister purpose Hidden activities.

Hackers Hackers are those who access systems without authorization. White Hat Hackers are those who access systems with permission or without, but with the intention to increase security. i.e. Security Experts who study vulnerabilities in a piece of software. Black Hat Hacking - a skilled hacker who uses his or her ability to pursue their interest illegally. They are often economically motivated, or may be representing a political cause. Sometimes, however, it is pure curiosity.

Phone Phreakers Phreakers are those who manipulate the phone system in an unauthorized manner. Makes phone call without paying for it.

Dos (Denial-of-Service) A DoS attack is an intentional action design to prevent legitimate users from making use of computer service. It is an asymmetric attack, in which a single person can harm a huge organization, such as a multinational corporation even a government. It is a terrorist arsenal.

DDoS(Distributed Dos) Attacks from multiple computers to one location with the intent to knock the system off the internet. Done by overwhelming the connection to the server Done from bot networks up for use by anyone who bids for their use. Method for hackers to be paid for their work.

Online Voting Voting via the internet. Potentially can get more people involved, since voting would be easier. Could be subjected to attacks and manipulation by hackers. No actual paper trail.

Online Voting Risks More difficult to preserve the privacy of the voter. Vote soliciting and vote selling Security of the election is depending on the home computer Voter deceiving application can be install by the third party Due to no hard record, electoral fraud can happen easily

What do you think? Is it ok for a hacker to enter a system without authorization even if they don’t harm anything or profit from their activity? If a hacker finds a vulnerability, do they have the obligation to tell the software/hardware vendor before they make the vulnerability public? How long? Should we have online voting? Electronic at all? Would it be ok, if there were a paper trail?