AP CSP: Cybercrime.

Slides:



Advertisements
Similar presentations
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Advertisements

ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet safety By Lydia Snowden.
Cyber crime & Security Prepared by : Rughani Zarana.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Understand Protection LESSON Security Fundamentals.
Cyber security. Malicious Code Social Engineering Detect and prevent.
2 Computer JEOPARDY How’s Your Inbox? Computers Get Sick Too See You in Cyberspace W Cubed ScatteredBits
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Security Risks Todays Lesson Security Risks Security Precautions
AP CSP: Identifying People with Data and The Cost of Free
Securing Information Systems
Botnets A collection of compromised machines
Digital Security Identity theft Copyright Laws Plagiarism, and More.
What they are and how to protect against them
Go to youtube and search “Code.org internet videos”
Edexcel GCSE Cyber security threats Computer Science 1CP1
To Know what Cyber crime is
Port Knocking Benjamin DiYanni.
Network Security (the Internet Security)
HTTP and Abstraction on the Internet
Lesson Objectives Aims You should be able to:
Learn how to protect yourself against common attacks
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Lesson Objectives Aims You should be able to:
How to build a good reputation online
Cyber Security By: Pratik Gandhi.
Cyber Security Awareness Workshop
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Answer the questions to reveal the blocks and guess the picture.
Introduction to Networking
Phishing is a form of social engineering that attempts to steal sensitive information.
Lesson 2-9 AP Computer Science Principles
The Best Way To Secure U R Self
Protect Your Computer Against Harmful Attacks!
Rapid Research - Cybercrime
Botnets A collection of compromised machines
Teaching Computing to GCSE
Lesson 2- Protecting Yourself Online
NET 311 Information Security
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Security Threats Haunting the E-Commerce Industry. How Can Security Testing Help?
Risk of the Internet At Home
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
Rapid Research - Cybercrime
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
The Internet: Encryption & Public Keys
Unit 1 Fundamentals of IT
Securing your system, protecting your digital data and devices.
WJEC GCSE Computer Science
Lesson 2- Protecting Yourself Online
Test 3 review FTP & Cybersecurity
Wireless Spoofing Attacks on Mobile Devices
Marcial Quinones-Cardona
Week 7 - Wednesday CS363.
An overview over Botnets
Created by:- Sailesh Mathur School:- k.v.5 Jaipur
INTERNET SECURITY.
Presentation transcript:

AP CSP: Cybercrime

Introduction to Cybercrime: Now that we’ve learned various encryption schemes including Public Key Encryption, we need to learn about all the other ways criminals can potentially steal information. We’re going to take a look at cybercrime, how it’s conducted, what to look out for and how to protect yourself by watching an informational video. Complete the worksheet as we watch the video https://youtu.be/AuYNXgO_f3Y Here are a few topics introduced in the video: DDoS Attacks (and Bot Nets) Cyber warfare Viruses and Anti Virus Software Phishing Scams Credit Card theft Types of people who commit cybercrimes

Rapid Research: Cybercrime Today you will research a particular cybercrime topic out of the ones listed in the video or one you are interested in. You will then find a “recent” event in the news related to the cyber crime topic you chose. Find at least two articles about the event Wikipedia is a starting point not an actual article. Prepare an essay that basically describes the who, what, where, why, and when of the event they researched. At least 4 paragraphs. You will then complete the worksheet handed to you in the beginning of class along with writing your essay.

Cybersecurity Terms: Implementing cybersecurity has software, hardware, and human components. This is a theme for the whole lesson Vulnerabilities in hardware and software can be compromised as part of an attack. But, as mentioned in the video, a large percentage of cybersecurity vulnerabilities are human-related, such as choosing bad passwords, (unintentionally) installing viruses, or giving personal information away.

Cybersecurity Terms: Sockets layer/transport layer security (SSL/TLS) An encryption layer of HTTP. When you see the little lock icon and https it means that you are visiting a website over HTTP but the data going back and forth between you and the server is encrypted. SSL (secure sockets layer) and TLS (transport layer security) use public key cryptography to establish a secure connection.

Cybersecurity Terms: Cyber warfare and cyber crime have widespread and potentially devastating effects. This is especially true in the case of warfare which (fortunately) we have not experienced much of on a global scale. But using cyber attacks to cripple basic infrastructure (power, water) and communication could be devastating.

Cybersecurity Terms: Distributed denial of service attacks (DDoS) Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed – doing this can render web services like DNS, or routers, or certain websites useless and unresponsive.

Cybersecurity Terms: Phishing scams Typically a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. More sophisticated scams can make websites and email look very similar to the real thing.

Cybersecurity Terms: Viruses / Antivirus software and firewalls A virus is program that runs on a computer to do something the owner of the computer does not intend. Viruses can be used as a Bot Net to trigger a DDoS- style attack, or they can spy on your computer activity, such as capturing all the keystrokes you make at the computer, or websites you visit, etc. Antivirus software usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. A “firewall” is simply software that runs on servers (often routers) that only allows traffic through according to some set of security rules.

Quiz: Quiz next Wednesday on Unit 4: Big Data & Privacy Unit 4 Review Guide will be online by Friday 2/17/17 Includes general overview of everything we learned along with vocabulary Next class we will be starting Unit 5 Back to Programming!!