Computer Security Elaine Munn Introduction to Computer Security.

Slides:



Advertisements
Similar presentations
Windows XP Tutorial Securing Windows. Introduction This presentation will guide you through basic security principles for Windows XP.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer Threats I can understand computer threats and how to protect myself from these threats.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Chapter 9: Privacy, Crime, and Security
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
Unit 19 INTERNET SECURITY
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Connecting Computers and Keeping them safe from Hackers and Viruses Bradie Britzmann and Courtney Hughes Britzmann & Hughes.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Keeping your System/Computer healthy and Operating
Technical Implementation: Security Risks
Windows Tutorial 5 Protecting Your Computer
Managing Windows Security
What they are and how to protect against them
An Introduction to Phishing and Viruses
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Introduction to Network Security
COMPUTER VIRUSES Computer Technology.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Information Security Session November 11, 2004
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Keeping your System/Computer healthy and Operating
Malware, Phishing and Network Policies
Viruses and Virus Protection
Computer Basics Rabie A. Ramadan, PhD 6.
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Fire-wall.
Faculty of Science IT Department By Raz Dara MA.
Introduction to Cybercrime and Security
King Saud University- College OF Applied Studies
Computer Security.
Securing your system, protecting your digital data and devices.
Week 7 - Wednesday CS363.
Presentation transcript:

Computer Security Elaine Munn Introduction to Computer Security

Introduction Computer systems and networks are all around us. Online banking Automated supermarket checkouts Online classes Online shopping Online travel resources Computer systems are everywhere. Online banking, ATMs, debit cards E-Bay, Amazon, Half.com for textbooks Expedia, Travelocity, airplane e-tickets

Malware Software with a malicious purpose Virus Trojan horse Spyware Logic Bomb Virus – “a small program that replicates itself and hides itself inside other programs, usually without your knowledge” (Symantec, 2003) Trojan horse - a malicious program disguised as something desirable or harmless Spyware – the fastest-growing category of malware

Malware (cont.) Virus One of the two most common types Usually spreads through e-mail Uses system resources, causing slowdown or stoppage One of the two most common types of malware Usually spreads itself through unsuspecting user’s e-mail Even without malicious payload, rapid replication uses system resources, causing slow down or stoppage

Malware (cont.) Trojan Horse The other most common kind of malware Named after the wooden horse of ancient history The other most common kind of malware Named after the famous wooden horse of ancient history It disguises itself as something benign, something you need or want, i.e. a game, screen saver, account logon, etc It captures your information and returns it to the intruder

Malware (cont.) Spyware The most rapidly growing types of malware Cookies Key logger Spyware is the most rapidly growing type of malware. Cookies: initially a good idea to help users surf the Web, now misused to spy on users Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc.

Malware (cont.) Logic Bomb Lays dormant until some logical condition is met, often a specific date. Spyware is the most rapidly growing type of malware. Cookies: initially a good idea to help users surf the Web, now misused to spy on users Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc.

Compromising System Security Intrusions Attacks that break through system resources Hackers Crackers Social engineering War-driving Intrusions are attacks that break through your system’s resources without authorization Hackers – early internet joy riders, by intent not malevolent Crackers – system intruders, with malevolent intent Social Engineering – intruding into a system using human nature, not technology War driving – driving around looking for unprotected wireless networks

Basic Security Terminology People: Hackers White hats Black hats Gray hats Script kiddies Sneakers Ethical hackers People Hackers – anyone who studies a system through analyzing its flaws White hats – Consider themselves the “good guys” Black hats – Or “crackers” are definitely the “bad guys” Gray hats – Not a common term; refers to individuals who operate out side of the law on occasion Script kiddies – Inexperienced; consider themselves hackers, but only copy the work of others Ethical hackers – Consultants who are hired to do vulnerability assessments on company systems

How do I protect my computer? Antivirus: Whenever Windows is up, it should be running an up-to-date antivirus program. These work in the background, blocking not only viruses, but all sorts of malware.

Firewall: Like an antivirus, this type of program runs in the background at all times. But this one controls the traffic between your PC and the rest of the network (and Internet). Windows comes with a perfectly good firewall, but you should make sure it’s on. Search for firewall and select Windows Firewall in Control Panel. In the left pane, click Turn Windows Firewall on or off.

Updates Make sure Windows updates itself automatically. In Windows 7 or 8, search for and launch Windows Update. Click Change settings in the left pane. If Install updates automatically (recommended) isn’t selected, select it. In Windows 10, search for windows updates and select Windows Updates Settings. Scroll down to the bottom of the window and click Advanced options. Make sure Automatic (recommended) is selected.

Your browser Just like Windows, your browser needs to be up-to-date and secure. Go to your browser’s settings to make sure it updates regularly and that it’s set to block suspicious sites.

Encryption If your PC is stolen, why let the thieves get your secrets, as well. Encrypt your most sensitive files This will encrypt every file in this folder and its subfolders. New files created or dragged here will also get encrypted. Other people will be able to see the files and the file names, but they won’t be able to open the files. Only you—or at least, only someone logged on as you—can open these files.