Computers Are Your Future

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Review Ch. 3 – Connecting to the Worlds Information © 2010, 2006 South-Western, Cengage Learning.
Cyber Safety Assessment Review
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
Information Technology INT1001
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Unit 18 Data Security 1.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Computers Are Your Future Tenth Edition
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Discovering Computers 2010
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Issues Raised by ICT.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Computers Are Your Future Twelfth Edition Chapter 9: Privacy, Crime, and Security Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 11 Security and Privacy: Computers and the Internet.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Topic 5: Basic Security.
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Privacy, Security and Ethics
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Digital Citizenship Project Submitted by: Etta Pope Instructor: Laurie Fowler.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Computers Are Your Future Twelfth Edition
IT Security  .
Privacy, Crime, and Security
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
How to keep the bad guys out and your data safe
Computer Security.
Computer Security.
G061 - Network Security.
Presentation transcript:

Computers Are Your Future * 07/16/96 Chapter 9: Privacy, Crime, and Security *

Privacy, Crime, and Security * 07/16/96 *

Objectives * 07/16/96 Understand how technological developments are eroding privacy and anonymity. List the types of computer crime and cybercrime. List the types of computer criminals. *

Objectives Understand computer system security risks. * 07/16/96 Understand computer system security risks. Describe how to protect your computer system and yourself. Define encryption and explain how it makes online information secure. *

Objectives * 07/16/96 Describe the issues the government faces when balancing the need to access encrypted data and the public’s right to privacy. Distinguish between electronic discovery and computer forensics. *

Privacy in Cyberspace Privacy * 07/16/96 Privacy Individual’s ability to restrict or eliminate the collection, use, and sale of confidential personal information *

The Problem: Collection of Information Without Consent * 07/16/96 Anonymity Means to communicate without disclosing one’s identity More difficult with the use of computers and the Internet *

The Problem: Collection of Information Without Consent * 07/16/96 Technologies that jeopardize anonymity Cookies Global unique identifiers Ubiquitous computing Radio frequency identification *

The Problem: Collection of Information Without Consent * 07/16/96 Cookies Small files written to your hard disk by Web sites visited Examples include: Track your browsing habits Gather personal information without your consent Can be disabled Banner ads—targeted display ads based on cookies *

The Problem: Collection of Information Without Consent * 07/16/96 Global unique identifer (GUID) Identification number produced by software or a piece of hardware Web servers read the GUID. Users are not always aware of the GUID. If used, companies typically allow users to opt out. Civil liberties groups and public concern have decreased the use of GUIDs. *

The Problem: Collection of Information Without Consent * 07/16/96 Ubiquitous computing Interacting with multiple networked devices Example: adjusting heat or light based on signals sent by monitors built into clothing Active badge—transmits infrared signals to create an electronic trail Current devices—hold private information that can be exploited if the device is lost or stolen Example: smartphones *

UBIQUITOUS COMPUTING Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

The Problem: Collection of Information Without Consent * 07/16/96 Radio frequency identification (RFID) Uses radio waves to track a chip or tag Used for inventory control in stores Recognizes microchips in pets May compromise anonymity and privacy if information stored on RFID tags attached to U.S. passports *

The Problem: Collection of Information Without Consent * 07/16/96 *

The Problem: Collection of Information Without Consent * 07/16/96 SPAM Unsolicited messages sent in bulk over electronic mailing systems *

The Problem: Collection of Information Without Consent * 07/16/96 Protecting privacy online Use products such as Anonymous Surfing or IronKey Secure USB flash. Use free Web-based throwaway e-mail addresses in chat rooms and for mailing lists. Tell children not give out personal information. Complete forms only if you see a privacy statement. Turn off cookies Prevent the activity of Web beacons Transparent graphic images placed on a Web site or in an e-mail—used to monitor Web or e-mail behavior *

IronKey Secure USB flash Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

The Problem: Collection of Information Without Consent * 07/16/96 Protecting privacy at home Create logins and passwords for each person using the computer. Do not save account numbers or passwords. Close a secured account site when not using a computer. Use strong passwords Do use: difficult to guess passwords; at least 14 characters or more long; uppercase letters, lowercase letters, numbers, and special characters Don’t use: a recognizable word or phrase; name of anything or anyone close to you, including names of family members or pets; recognizable strings of numbers, such as social security numbers or birth dates *

The Problem: Collection of Information Without Consent * 07/16/96 Do not leave cell phones in public places. Turn off services not in use, especially Bluetooth. Verify that devices have secure configurations. *

The Problem: Collection of Information Without Consent * 07/16/96 Employee monitoring Majority of large U.S. employers observe employee phone calls, e-mails, Web browsing habits, and computer files Protecting privacy at work Refrain from making personal calls on a work phone Avoid using company e-mail for personal purposes Assume you are monitored Be aware of shoulder surfing *

The Problem: Collection of Information Without Consent * 07/16/96 *

Computer Crime and Cybercrime * 07/16/96 Computer crimes Computer-based activities that violate the law Cybercrimes Crimes perpetrated through the Internet Many Web sites educate users about cybercrime and cybercriminals Cyberlaw Area of law dedicated to computer crime *

Computer Crime and Cybercrime * 07/16/96 *

Computer Crime and Cybercrime * 07/16/96 Types of computer crime Identify theft—criminal access to personal information in order to impersonate someone Dumpster diving—disgruntled employees or thieves go through a company’s trash to find information they can steal Phishing attacks—legitimate-looking e-mails or Web sites created in an attempt to obtain confidential data about a person Spear phishing (similar to phishing)—uses targeted fake e-mails and social engineering to trick recipients into providing personal information to enable identity theft *

Computer Crime and Cybercrime * 07/16/96 Types of computer crime (cont.) Malware (short for malicious software)—programs that intentionally harm a computer system or allow individuals to gain access without permission Tips to protect yourself from malware: Know who you are dealing with Keep your Web browser and operating system up to date Back up important files Protect children online Use security software tools and keep them up to date Use strong passwords Learn what to do if something goes wrong *

Computer Crime and Cybercrime * 07/16/96 Types of computer crime (con’t.) Spyware—software that gathers private information and tracks Web use Adware—form of spyware that generates annoying pop-up and banner ads Keyloggers—record keystrokes to provide cybercriminals with confidential data *

Computer Crime and Cybercrime * 07/16/96 Types of computer crime (con’t.) Computer virus—code concealed inside a program that can harm or destroy files Many spread through e-mail attachments File infectors—attach themselves to files Payload—refers to the dangerous actions a virus performs. Macro viruses—attach to data files and take advantage of application macros Boot sector viruses—execute each time you start the computer SPIM—spam text message sent via a cell phone or instant messaging service *

Computer Crime and Cybercrime * 07/16/96 *

Computer Crime and Cybercrime * 07/16/96 Rogue programs Logic bomb—hidden computer code that sits dormant on a system until triggered. Are set to go off when a partıcular event occurs. Time bomb—virus program that remains dormant on a computer system until activated. Go off at a specified time, date or after a set amount of time elapses. Worm—similar to a virus but does not need action of a user to execute *

Computer Crime and Cybercrime A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Computer Crime and Cybercrime * 07/16/96 More rogue programs (con’t.) Rootkit—malicious program that is disguised as a useful program Enables attacker to gain administrator level access Allows attacker to have repeated and undetected access Trojan horse—normal-looking program that includes concealed instructions to cause harm *

Computer Crime and Cybercrime When a Trojan is activated on your computer, the results can vary. Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised. Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall

Computer Crime and Cybercrime * Computer Crime and Cybercrime 07/16/96 Fraud, theft, and piracy Memory shaving (physical theft of computer equipment) Software piracy Cyber gaming crime Tricks for obtaining passwords Techniques for guessing a password. Salami shaving A programmer alter a program to subtract a very small amount of money from an account . Data diddling Insiders modify data by altering accounts or database records so that its difficult or impossible to tell that they’ve have stolen a funds and equipment. Forgery Knowledgeable users can make internet data appear to come from one place when its really coming from another. Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall *

Computer Crime and Cybercrime * 07/16/96 The attackers Hackers—computer hobbyists attempting unauthorized access, generally subscribing to an unwritten code of conduct—hacker ethic Cybergangs—groups of hackers working together to coordinate attacks IP spoofing—sends a message with an IP address disguised as a message from a trusted source *

Computer Crime and Cybercrime * 07/16/96 The Attackers (con’t.) Crackers (also called black hats)—attempt to enter highly secure computer systems to destroy data or steal information Ethical hackers (also called white hats) use expertise to shore up computer system defenses Computer virus authors—create viruses and other types of malware to vandalize computer systems Swindlers perpetuate frauds: Bogus work-at-home opportunities Illegal pyramid schemes Bogus franchises Phony goods that won’t be delivered Over-priced scholarship searches *

Computer Crime and Cybercrime * 07/16/96 Cyberstalkers Use the Internet, social networking sites, and e-mail to harass or threaten Most perpetrators are men Most victims are college-age women Cyberbullying Sending threatening messages via e-mail or text message Usually involves minors *

Security Computer security risk * 07/16/96 Computer security risk Any intentional or unintentional action resulting in damaging a computer system or its data Increased by wireless LANs because transmissions occur over shared airwaves instead of dedicated lines *

Security Computer security risk (con’t) * 07/16/96 Computer security risk (con’t) Wireless LAN security options include: WEP (Wired Equivalent Privacy) WPA (WiFi Protected Access) WPA2 Vacation hacking—tricking travelers into using phony WiFi hot spots—evil twins *

Security Computer system security threats * 07/16/96 Computer system security threats Corporate espionage—unauthorized access of corporate information, usually to the benefit of a competitor Pod slurping—using removable storage media to create unauthorized copies of confidential data Trap doors—security holes created by employees allowing entry to company systems after leaving the firm Information warfare—use of information technologies to corrupt or destroy an enemy’s information and industrial infrastructure Security loophole detection programs Attacks on safety-critical systems Terrorism *

Security Protecting your computer system * 07/16/96 Protecting your computer system Uninterruptible power supply (UPS)—provides additional power during outages or electrical current fluctuations Control access to computer systems through appropriate password selection and know-and-have authentication, which requires using tokens to generate a login code. *

Security Protecting your computer system (con’t.) * 07/16/96 Protecting your computer system (con’t.) Biometric authentication—use of voice recognition, retinal scans, and fingerprint scans for authentication Firewalls, hardware or software, to prevent unauthorized access Anti-Virus Programs *

Security Protect yourself—avoid scams * 07/16/96 Protect yourself—avoid scams Do business with well-known companies. Read documents carefully. Don’t give out personal information Do not post a user profile. Be skeptical of chat room information. Be cautious if meeting someone you’ve contacted online. If you become uncomfortable or afraid, contact the police *

The Encryption Debate Cryptography Cryptographers Encryption * 07/16/96 Cryptography Study of transforming information into an encoded or scrambled format Cryptographers Individuals who practice cryptography Encryption Coding or scrambling process that renders a message unreadable by anyone other than the intended recipient *

The Encryption Debate Plaintext Encryption key Ciphertext * 07/16/96 Plaintext Readable message that has not been encrypted Encryption key Formula that makes a plaintext message unreadable Ciphertext Coded message *

The Encryption Debate Symmetric key encryption Key interception * 07/16/96 Symmetric key encryption Uses same key for both encryption and decryption Key interception Occurs when a symmetric key encryption is stolen, allowing others to decrypt messages encrypted with that encryption key *

The Encryption Debate Public key encryption * 07/16/96 Public key encryption Also referred to as asymmetric key encryption Uses two keys: Public key to encrypt Private key to decrypt Essential for e-commerce Used to implement: Digital signatures—guarantee messages are secure Digital certificates—validate identity Secure electronic transaction (SET) Uses digital certificates Enable parties engaged in Internet-mediated transactions to confirm each other’s identities *

The Encryption Debate * 07/16/96 *

The Encryption Debate Public key infrastructure (PKI) * 07/16/96 Public key infrastructure (PKI) Uniform set of encryption standards No dominant standard Public fear of a monopoly if a PKI is chosen *

The Encryption Debate Encryption and public security issues * 07/16/96 Encryption and public security issues U.S. government continues search for ways to balance the public’s right to privacy and the government’s need to know *

Prosecuting Violators * 07/16/96 E-discovery Obligation of parties to a lawsuit to exchange documents existing only in electronic form Computer forensics Legal evidence found in computers and digital storage media *

Summary * 07/16/96 Understand how technological developments are eroding privacy and anonymity. List the types of computer crime and cybercrime. List the types of computer criminals. *

Summary Understand computer system security risks. * 07/16/96 Understand computer system security risks. Describe how to protect your computer system and yourself. Define encryption and explain how it makes online information secure. *

Summary * 07/16/96 Describe the issues the government faces when balancing the need to access encrypted data and the public’s right to privacy. Distinguish between electronic discovery and computer forensics. *