ISNE101 Dr. Ken Cosh Week 13.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lecture 11 Reliability and Security in IT infrastructure.
Quiz Review.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Unit 2 - Hardware Computer Security.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
IT security By Tilly Gerlack.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
INTERNET & ONLINE COMMUNITY Week 14. RECAP Remember “Analysing the Social Web”? Why would we want to do that? Propagation – what is it and how.
Information Systems Week 7 Securing Information Systems.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
7 Chapter Securing Information Systems 1. The Boston Celtics Score Big Points Against Spyware Problem: frequency of wireless usage exposed Celtics’ proprietary.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Chapter 6 Introduction to Digital Security
Securing Information Systems
Chapter 40 Internet Security.
What they are and how to protect against them
Malware and Computer Maintenance
MALWARE Autumn Mattis.
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Lecture 5. Security Threats
Network security threats
Chapter 6 Introduction to Digital Security
Cyber Security By: Pratik Gandhi.
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Teaching Computing to GCSE
Internet Challenges to Privacy
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
Malware, Phishing and Network Policies
Week 7 Securing Information Systems
The Internet of Unsecure Things
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
– Communication Technology in a Changing World
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Securing Information Systems
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Unit 1.6 Systems security Lesson 1
Created by:- Sailesh Mathur School:- k.v.5 Jaipur
Presentation transcript:

ISNE101 Dr. Ken Cosh Week 13

This Week Challenges (still) facing Modern IS Reliability Security

Reliability Redundancy is the Key! Spare components Components running in parallel Triple Modular Redundancy Identify unreliable components and arrange back ups. UPS Multiple ISPs

Security Data stored digitally & transmitted through networks == Greater security threats. After all digital data can be copied more easily

Security Threats Tapping Sniffing Message Alteration Theft/Fraud Hacking Vandalism DoS attacks Theft/Copy Data Hardware/Software Failure Unauthorised Access Errors Viruses/Worms Spyware

Malware (Malicious Software): Viruses / Worms / Trojans / Spyware Display message -> destroying data Spread by human action; i.e. sending infected email, or copying a file Worms Don’t need human action; Copy themselves across network on their own. Destroy data / Disrupt network

Malware (Malicious Software): Viruses / Worms / Trojans / Spyware Trojan Horses Software appears benign, but then does something unexpected Doesn’t replicate (so not a virus), but may facilitate viruses Spyware Program installs itself and then serves up advertising Keyloggers record all keystrokes – including passwords / CC numbers etc. Some spyware uses up memory / redirect search requests / reset browser home page

Hackers & Computer Crime Objective: to gain unauthorised access Steal information System damage Cybervandalism Defacing websites

Spoofing / Sniffing Spoofing Sniffing Masquerade as someone else drkencossh@gmail.com Redirect you to similar webpage www.hsbc.net Sniffing Eavesdropping on data passed through a network Legitimately to identify trouble spots / criminal activity But also to steal information V. difficult to detect

DoS Attacks Denial of Service DDoS – Distributed Denial of Service Fake communications / requests submitted simultaneously through network to slow it down and prevent legitimate usages.

Identity Theft Perhaps by Phishing Or Evil Twins Asking users for confidential data through fake emails/websites “Please update your records…” Or Evil Twins I could set up a “trustworthy” wifi network connection in a hotel lobby

Countering the Threats Tight Security Policies Access Control Authentication Password Biometrics Firewalls Anti Virus Encryption

Security Policies Access Control Lists (ACL) Limit which users can do what (e.g. update websites) Signed agreements for service When allowing users onto a network, normally they sign an agreement, regarding terms of use. How about at CMU? Policies could include, Regular password changes Whether personal use of service is permitted Antivirus updates Can help against, external attacks, intrusion, virus / worms

Encryption Encoding the contents of a transmission so it can’t be decrypted on route. Symmetric-key encryption Public / Private key encryption Helps prevent interception.

Symmetric Key Encryption Both sender and receiver use the same ‘code’ to encrypt and then decrypt a message. If I tell you to move each character back two in the alphabet, and then send you this message; Jgnnq Encuu Anyone who intercepts the message gets nothing, but you are able to decrypt it. More interesting patterns can be created to increase security. Substitution Transposition Key: FANCY Message: eatitnihmexnetmgmedt

Decoding