Tomorrow’s Technology and You

Slides:



Advertisements
Similar presentations
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Advertisements

Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Crime and Security in the Networked Economy Part 4.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Computer Security. E-bay Phishing Scam Slide 2 Phishing Scam using Google Chat “LOL – ya gotta see this!!” Read about this scam:
Chapter 9 Information Systems Ethics, Computer Crime, and Security
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall Digital Planet: Tomorrow’s Technology and You George Beekman Ben Beekman Tenth Edition.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Data Security GCSE ICT.
Slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Power Point Lectures to accompany Tomorrow’s Technology and You, 9e.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
© 2008 Prentice-Hall, Inc. Slide 1. Chapter 10 Computer Security and Risks © 2008 Prentice-Hall, Inc. Slide 2.
© 2006 Prentice-Hall, Inc.Slide 1 Tomorrow's Technology & You.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Privacy, Security and Ethics
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
Chapter 40 Internet Security.
Add video notes to lecture
IT Security  .
Network security threats
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Securing Information Systems
Lesson 2- Protecting Yourself Online
Computer Security and Risks
Lesson 2- Protecting Yourself Online
G061 - Network Security.
Presentation transcript:

Tomorrow’s Technology and You Chapter 10 Computer Security and Risks ITGS – Mr. Crossman

Chapter 10: Objectives Describe several types of computer crime and discuss possible crime-prevention techniques Describe the major security issues facing computer users, computer system administrators, and law enforcement officials Describe how computer security relates to personal privacy issues Explain how security and computer reliability are related

Online Outlaws: Computer Crime Computers are used to break laws as well as to uphold them. Computer crime involves: Theft by computer Software piracy and sabotage Hacking and electronic trespassing Computer forensics experts use special software to scan criminal suspects for digital “fingerprints.”

The Digital Dossier Computer crime is any crime accomplished through knowledge or use of computer technology. Cyberstalking – form of harassment that takes place on the Internet Businesses and government institutions lose billions of dollars every year to computer criminals. The majority of crimes are committed by company insiders. These crimes are typically covered up or not reported to authorities to avoid embarrassment.

Online Outlaws: Computer Crime Theft is the most common form of computer crime. Computers are used to steal: Money Goods Information Computer resources

Common Types of Computer Crime Spoofing: the use of a computer for stealing passwords Identity theft: the use of computers and other tools to steal whole identities Social engineering: slang for the use of deception to get individuals to reveal sensitive information Phishing: users “fish” for sensitive information under false pretenses Online fraud: 87% related to online auctions Average cost per victim: $600

Protect Yourself from Identity Theft: Make all your online purchases using a credit card. Get a separate credit card with a low credit limit for your online transactions Make sure a secure Web site is managing your transaction. Don’t disclose personal information over the phone. Keep your wallet thin Copy your cards Scan your bills and statements promptly Report identity theft promptly

Software Sabotage: Viruses and Other Malware Malware: malicious software Trojan horse: performs a useful task while also being secretly destructive Time bombs are logic bombs activated by a time-related event Logic bombs - a programmed attack that destroys data files if a programmer is ever terminated Virus: spreads by making copies of itself from program to program or disk to disk Examples: macro viruses and email viruses HTML viruses - infect a webpage at the HTML code

Virus, Worms, Time Bombs, Etc Bubbleboy – system can be infected by email even if the email wasn’t opened MS Slammer (2003) – worm that shut down hundreds of thousands of PC’s as it moved from computer to computer looking for vulnerable targets Security Patches - Software programs that close potential security breaches in an operating system or application are known as USA Patriot Act – set of law changes that redefined terrorism and government’s authority to combat it © 2009 Prentice-Hall, Inc.

Worm & Malware Wars Worm: program that travels independently over computer networks, seeking uninfected sites Code Red (2001)– target was Internet servers running Microsoft server software Melissa (1999) - macro virus sent emails out to the first 50 names of a user's Outlook address book if they opened an email from an unknown sender Accidently released into the Internet, clogged 6,000 computers Malware Wars Researchers have identified 18,000 virus strains 200 new strains appearing each month. At any given time, about 250 virus strains are in circulation.

Antivirus Antivirus programs - designed to search for viruses, notify users when they’re found, and remove them from infected disks or files. Programs need to be frequently revised to combat new viruses as they appear.

Spybot also called tracking software Spyware Spyware - technology that collects information from computer users without their knowledge or consent. Spybot also called tracking software Gathers user information and communicates it to an outsider via the Internet. Your keystrokes could be monitored. Web sites you visit are recorded. Snapshots of your screen are taken. Spyware can cause pop-ups appearing on your screen. 91% of PC users have spyware on their computers. Drive-by downloads - visiting a Web site can cause a download.

Hacking and electronic trespassing Hacker (or cracker) - refers to people who break into computer systems. Cracking - criminal hacking Webjackers - hijack Web pages and redirect users to other sites. Zombie computers - Internet connected computers that have been hijacked using viruses to perform malicious acts without the knowledge of the owners and users. DOS (denial of service) attacks - bombard servers and Web sites with traffic that shuts down networks.

Physical Access Restrictions Computer crime has led to a need to protect computer systems. Computer security attempts to protect computers and the information they contain. Computer security protects against unwanted access, damage, modification, or destruction.

Physical access restrictions (cont.) You might be granted access to a computer based on: A key ID card w/photo Smart card containing digitally encoded identification in a built-in memory chip A password, ID number, a lock combination Your signature or your typing speed and error patterns A voice print fingerprint, retinal scan, facial feature scan, or other measurement of individual body characteristics—collectively called biometrics

Computer Security: Reducing Risks Passwords and access privileges Passwords are the most common tool for restricting access to a computer system. Effective passwords are: Not real words Not names Changed frequently Kept secret A combination of letters and numbers

Computer Security: Reducing Risks Firewalls, encryption, and audits These security systems reduce or prohibit the interception of messages between computers. Firewall - a gateway with a lock. Encryption - codes protect transmitted information and a recipient needs a special key to decode the message. Shields - specially developed machines that prevent unwanted interception. Making a message secure from outsiders requires encryption software. Encryption software - scrambles the sent message using a key A different key is needed to unscramble the received message.

Computer Security: Reducing Risks Cryptography—is the process of encrypting messages. Audit-control software monitors and records computer activity. Effective audit-control software forces every user to leave a trail of electronic footprints. Cryptosystem - If you want to secure a message

Backups and Other Precautions UPS (uninterruptible power supply) Can protect computers from data loss during power failures. Surge protectors Shield electronic equipment from power spikes. Have a routine for making regular backups. Many systems are backed up at the end of each work day.

Human Security Controls Security measures prevent crime, but also can pose threats to personal privacy. Managers must make employees aware of security issues and risks. Systems administrators play a key role in security and back-up. In 2003, Microsoft launched a “Trustworthy Computing” initiative: Long-term goal: to make its software as secure as possible when released Will lessen the need for security patches

Security, Privacy, Freedom, and Ethics: The Delicate Balance Active badges can simultaneously improve security and threaten privacy by: Identifying who enters a door or logs onto a machine Finding an employee’s current or earlier location Remembering: at the end of the day, an active-badge wearer can get a minute-by-minute printout listing exactly where and with whom he or she has been.

Security, Privacy, Freedom, and Ethics: The Delicate Balance Rules of thumb: safe computing Share with care Beware of BBS risks Don’t pirate software Disinfect regularly Treat disks or drives with care Take your password seriously Lock sensitive data Use backup systems Consider encryption for Internet activities Prepare for the worst

Justice on the Electronic Frontier Telecommunications Act of 1996--Outlining what kinds of communications are legal online Digital Millennium Copyright Act of 1998—most comprehensive reform of U.S. copyright law Each of these laws introduced new problems by threatening rights of citizens—problems that have to be solved by courts and by future lawmakers.

Bugs and Breakdowns Software bugs do more damage than viruses and computer burglars combined. Facts about software engineering: It is impossible to eliminate all bugs. Even programs that appear to work can contain dangerous bugs. The bigger the system, the bigger the problem. Computer breakdowns pose a risk to the public, and the incidence rate doubles every two years. Hardware problems are rare compared with software failures.

Computers at War Smart weapons are missiles that use computerized guidance systems to locate their targets. An autonomous system is a complex system that can assume almost complete responsibility for a task without human input. By attacking computer networks an enemy could conceivably cripple: Telecommunications systems Power grids Banking and financial systems Hospitals and medical systems Water and gas supplies Oil pipelines Emergency government services