Lecture 5. Security Threats

Slides:



Advertisements
Similar presentations
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 10 E-Commerce Security.
Copyright © 2007 Pearson Education, Inc. Slide 5-1 E-commerce Kenneth C. Laudon Carol Guercio Traver business. technology. society. Second Edition.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 19 INTERNET SECURITY
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 37 Network Security. Aspects of Security data integrity – data received should be same as data sent data availability – data should be accessible.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Not only business information, but a large amount of personal information too is now digitized and stored in computer connected to the internet. System.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
E-commerce Security By John Doran. What is e-commerce?  the buying and selling of products or services over the internet [3].  Most e-commerce transactions.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Electronic Commerce Semester 1 Term 1 Lecture 14.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Security Issues in Information Technology
Chapter 40 Internet Security.
Securing Information Systems
Network Security (the Internet Security)
Instructor Materials Chapter 7 Network Security
Lecture 8. Cyber Security, Ethics and Trust
Network security threats
Chapter 17 Risks, Security and Disaster Recovery
Chapter 5 Electronic Commerce | Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
ISNE101 Dr. Ken Cosh Week 13.
Chapter 5 Electronic Commerce | Security
Pooja programmer,cse department
برنامج أمن أنظمة الحاسب
Prepared By : Binay Tiwari
INFORMATION SYSTEMS SECURITY and CONTROL
HOW DO I KEEP MY COMPUTER SAFE?
Faculty of Science IT Department By Raz Dara MA.
Network Security 1. Computer Security Components of computer security Policies and mechanisms 2.
Networking for Home and Small Businesses – Chapter 8
Security Risanuri Hidayat 21 February 2019 security.
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Module 4 System and Application Security
Mohammad Alauthman Computer Security Mohammad Alauthman
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
INTERNET SECURITY.
Chapter 5 Computer Security
Presentation transcript:

Lecture 5. Security Threats Keywords: security, encryption, malware, protection Lecture 5. Security Threats. Author: Aleksey Semyonov

Main Definitions Threats Protection Lecture plan Plan Main Definitions Threats Protection Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Information Security Plan Confidentiality - Protection from unauthorized persons Legitimate use - ensuring appropriate use by authorized users Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Information Security Plan Integrity - consistency of data; no unauthorized creation, alteration or destruction Availability - ensuring access to legitimate users Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

the process or action of verifying the identity of a user or process. Authentication Plan the process or action of verifying the identity of a user or process. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Internet Security Plan Internet security is a catch-all term for a very broad issue covering security for transactions made over the Internet. Generally, Internet security encompasses browser security, the security of data entered through a Web form, and overall authentication and protection of data sent via Internet Protocol. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Threats Information Theft Malware Denial of Service Plan Information Theft Malware Denial of Service Information deletion Information alteration Privacy violation Phishing Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Information Theft Plan Information Theft poses a threat of privacy violation, gaining access to personal data and unauthorised use of stolen data. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Viruses Trojans Adware Spyware Worms Malware Plan Viruses Trojans Adware Spyware Worms Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Denial of Service Plan An interruption in an authorized user's access to a computer network, typically one caused with malicious intent. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Information deletion and alteration Plan This threat poses a problem of losing valuable data, using altered data and can be costly to account for if happened. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Intrusion into private affairs with possible legal implications. Privacy violation Plan Intrusion into private affairs with possible legal implications. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Filters Encryption Secure connection Backup Virus protection Protection mechanisms Plan Filters Encryption Secure connection Backup Virus protection Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Firewall Plan A firewall inspects network traffic and denies or permits passage based on a set of rules. Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Backup Making copy of data Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Symmetric key encryption Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Asymmetric key encryption Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Encryption Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Encryption Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Digital certificate Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Anti virus Plan Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Online transactions Authentication- we are who we say we are Plan Authentication- we are who we say we are Certification - guarantee by 3rd party Confirmation - digital receipt of transaction Non-repudiation - binding agreement, digital proof of transaction Encryption - for all of the above, encoded passage of information over open networks Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

Reading Effy Oz, “Foundations of E-commerce”, Chapters 7-8,10-11 Plan Effy Oz, “Foundations of E-commerce”, Chapters 7-8,10-11 https://www.symantec.com/content/dam/symantec/docs/infographics/istr-zero-day-en.pdf http://usa.kaspersky.com/internet-security-center/threats/computer-viruses-and-malware-facts#.WJRQ5FN97cs Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov

References Plan Internet security: https://www.techopedia.com/definition/23548/internet-security Antivirus picture: http://www.seasnet.ucla.edu/anti-virus-software/ Main Definitions Threats Protection Reading and References Lecture 5. Security Threats. Author: Aleksey Semyonov