Unit 32 – Networked Systems Security

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

4 Information Security.
Lecture: Malicious Code CIS 3360 Ratan K. Guha. Malicious Code2 Overview and Reading Assignments Defining malicious logic Types Action by Viruses Reading.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
LittleOrange Internet Security an Endpoint Security Appliance.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Online Safety Workshop Stephanie Rojas, IMG Krystle Donnelly, IMG Cyndi Backstrom, UNLV OIT.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Unit 19 INTERNET SECURITY
UNIT 4 ASSIGNMENT VIRUSES & DESTRUCTIVE PROGRAMS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Viruses & Destructive Programs
Computer Security, Ethics and Privacy Chapter 11.
COPYRIGHTS: In law, the exclusive right to produce copies and to control an original literary, musical, or artistic work, granted by law for a specified.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
7 Information Security.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
CHAPTER 1 PROTECT YOUR TURF. Netizen – A citizen of cyberspace (ie. Internet) Any person using the Internet to participate in online social communities.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
By : Rishika,Autumn and Melissa Computer and other malware tch?y=c34QwtY40g.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Chapter 1: Explore the Network
Business Technology Applications What is Malware.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Call Us: (Toll Free)
Week-14 (Lecture-1) Malicious software and antivirus: 1. Malware A user can be tricked or forced into downloading malware comes in many forms, Ex. viruses,
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Protecting Computers From Viruses and Similarly Programmed Threats Ryan Gray COSC 316.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Chapter 40 Internet Security.
Mark Ryan Professor of Computer Security 25 November 2009
Executive Director and Endowed Chair
CYBER SECURITY...
Big Picture Consider this How many online threats might you be faced with a day?
Instructor Materials Chapter 7 Network Security
Unit 32 – Networked Systems Security
Lecture 5. Security Threats
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Why Computer Security Need???
Business Risks of Insecure Networks
How to Get Rid of Online Threats Impacting your Computer Device?
Securing Information Systems
What is a Computer? Computer generally means a programmable machine. The two principal characteristics of a computer are: it responds to a specific set.
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
How to Install Vipre Antivirus on Windows 10 PC?
AVG Antivirus is specially designed and developed for Windows and Mac computers to provide a durable protection from various threats. If you are covered.
1:53:58 AM.
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Networking for Home and Small Businesses – Chapter 8
King Saud University- College OF Applied Studies
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Presentation transcript:

Unit 32 – Networked Systems Security https://www.tes.com/lessons/k-4i3DlopqkOYA/review-week-unit-32-networked-systems-security

Find different network attacks Learning Objective 2

A group of interconnected (via cable and/or wireless) computers and peripherals that is capable of sharing software and hardware resources between many users. The Internet is a global network of networks. What is a Network?

What is Network Security? Network security is the process by which digital information are protected What is Network Security?

The term ‘computer virus' was formally defined by Fred Cohen in 1983, while he performed academic experiments on a Digital Equipment Corporation VAX system. Viruses are classified as being one of two types: research or ‘in the wild.' A little history

The first computer viruses were developed in the early 1980s. The first viruses found in the wild were Apple II viruses, such as Elk Cloner, which was reported in 1981 A little history

Task Create an a-z of network attacks poster (pairs). See if you can find 26 different attacks! Organise the attacks into highest to lowest impact the attack has on a network Task

Define network attacks Learning Objective 3

Attacks Denial of service Back door Spoofing Mathematical Brute force Adware. Software exploitation Viruses Rootkits Worms Trojans Spyware Attacks

Task In pairs, create a presentation that defines the following: There are many different types of network attacks, for the following: research online and define the type of attack. In pairs, create a presentation that defines the following: denial of service, back door, spoofing, mathematical, brute force, adware. Your definition should be no more than 1 sentence/20 words. software exploitation, viruses, rootkits, worms, Trojans, spyware, Task Research into the most prolific malware / attacks which were written by teenagers! Write some information down about them – Name of attack/malware, data, damage caused (cost) etc. Present - presentation, report

Summarise a network attack Learning Objective 4

Choose 3 types of threats that attack a network, summarise each attack. Why is it a dangerous type of attack? When is a company usually susceptible to this type of attack? Who normally perpetrates this type of attack? Include a diagram of this attack (if possible) Recommend ways the attack can be mitigated Task

Read this http://www. securityweek Read this http://www.securityweek.com/virus-threats is there anything interesting? Homework