Understanding the Need for Security Measures

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Crime and Security in the Networked Economy Part 4.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Security, Privacy, and Ethics Online Computer Crimes.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Chapter 11 Security and Privacy: Computers and the Internet.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber crime & Security Prepared by : Rughani Zarana.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Security, Social and Legal Issues Regarding Software and Internet.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
INTRODUCTION & QUESTIONS.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Security, Social and Legal Issues Regarding Software and Internet
Done by… Hanoof Al-Khaldi Information Assurance
GCSE ICT SECURITY THREATS.
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
3.6 Fundamentals of cyber security
IT Security  .
Security, Social and Legal Issues Regarding Software and Internet
CHAPTER 6 – BASIC SECURITY
Phishing is a form of social engineering that attempts to steal sensitive information.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Year 10 ICT ECDL/ICDL IT Security.
Assalamualaikum Today, I am going to give a presentation on
Understanding the Need for Security Measures
BCT 2.00 Analyze Technology Issues
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Privacy, Security, and Ethics
Presentation transcript:

Understanding the Need for Security Measures Chapter 10 Understanding the Need for Security Measures

Basic Security Concepts Threats Anything that can harm a computer Security attempts to neutralize threats Types of threats Threat to the user Threat to hardware Threat to data

Basic Security Concepts Countermeasures Steps taken to block a threat Protect the data from theft Protect the system from invasion Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security.

Threats to Users Identity Theft Impersonation private information/Fraud: Attempting to deceive someone by pretending that you are another person. Methods of stealing information Shoulder surfing (watching s/o enter personal identification) Snagging (listening through a telephone extension using a wiretap while victim gives credit card info) Dumpster diving (stealing mail containing personal information) Social engineering (tricking victims into providing critical information under pretext of s/th legitimate) High-tech methods (using internet connection in order to steal info) Shoulder surfing (watching s/o enter personal identification) Snagging (listening through a telephone extension using a wiretap while victim gives credit card info) Dumpster diving (stealing mail containing personal information) Social engineering (tricking victims into providing critical information under pretext of s/th legitimate) High-tech methods (using internet connection in order to steal info)

Threats to Users Loss of privacy Purchases are stored in a database Data is sold to other companies Public records on the Internet E.g. facebook *None of these techniques are illegal to many countries

Threats to Users Cookies Spyware Files delivered from a web site Cookies log user online activity history and passwords Spyware Software downloaded to a computer Designed to record personal information Typically undesired software Hides from users Several programs exist to eliminate Teaching tip Cookies are named after the ‘magic cookie’.

Threats to Users Web bugs Spam Small programs embedded in gif images Companies use to track usage Blocked by spyware detecting programs Spam Unsolicited commercial email Networks and PCs need a spam blocker Stop spam before reaching the inbox Spammers acquire addresses using many methods Teaching tip More information regarding web bugs can be found at en.wikipedia.org/wiki/Web_bug.

Affect the operation or reliability of your computer system Threats to Hardware Affect the operation or reliability of your computer system Power-related threats Power fluctuations Blackout Countermeasures UPS – Uninterruptible power supplies Teaching tip Visit www.apc.com for information regarding UPS solutions. Larger installations use generators to protect networks. Hospitals, grocery stores and insurance companies may all use generators. Quite often the power solution is a combination of battery and generator. The batteries run long enough for the generators to start and stabilize. Then the batteries stop and the generators provide power to the facility.

Threats to Hardware Theft and vandalism Thieves steal the entire computer Accidental or intentional damage Countermeasures Keep the PC in a secure area Lock the computer to a desk Do not eat near the computer Security watchdog Handle equipment with care Vandalism: the crime of intentionally damaging property belonging to other people

Threats to Hardware Natural disasters Disasters differ by location Typically result in total loss Disaster planning Plan for recovery List potential disasters Practice all plans Discussion point In 2004 Hurricane Ivan caused massive damage to Florida and several other states. Network administrations in Florida are used to planning for hurricanes. However, computers in Southeastern Pennsylvania suffered massive loss of data due to Ivan. How culpable are the administrators in PA who did not plan for Ivan?

List potential disasters Threats to Hardware List potential disasters Earthquake Flood Discussion point In 2004 Hurricane Ivan caused massive damage to Florida and several other states. Network administrations in Florida are used to planning for hurricanes. However, computers in Southeastern Pennsylvania suffered massive loss of data due to Ivan. How culpable are the administrators in PA who did not plan for Ivan? Fire

Threats to Data The most serious threat Data is the reason for computers Data is very difficult to replace Sometimes worth than a company itself

Threats to Data Viruses Software that distributes and installs itself Countermeasures Anti-virus software Popup blockers Do not open unknown email Teaching tip For information on specific viruses visit securityresponse.Symantec.com/. Detailed information regarding the protection from viruses, see the Computing keynote at the end of the chapter.

Threats to Data Trojan horses Cybercrime Program that poses as beneficial software User willingly installs the software Countermeasures Anti-virus software Spyware blocker Cybercrime Using a computer in an illegal act E.g. Fraud – the crime of obtaining money by deceiving people Teaching tip Ad Aware is sold by LavaSoft. The homepage is www.lavasoftusa.com/software/adaware/. Spybot is a product of Patrick M. Kolla. The true website is www.safer-networking.org/en/index.html.

Threats to Data Internet fraud Most common cybercrime Fraudulent website (dishonest and illegal website) Have names similar to genuine websites

Threats to Data Hacking Using a computer to enter another network Hacker vs. Cracker Possible damages: Steal confidential info Destroy an organization data Change original form of data

Threats to Data Cyber terrorism Attacks made at a nation data Threat first realized in 1996 Organizations combat cyber terrorism Computer Emergency Response Team (CERT) Department of Homeland Security

THE END