Forensics Week 12.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

By Hiranmayi Pai Neeraj Jain
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
IT security Are you protected against hackers?. Why are we in danger?  The Internet is worldwide, publicly accessible  More and more companies and institutes.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Firewalls Presented by: Sarah Castro Karen Correa Kelley Gates.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lesson 10 – SECURING YOUR NETWORK Security devices Internal security External security Viruses and other malicious software OVERVIEW.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Protecting People and Information: Threats and Safeguards
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Information Security Rabie A. Ramadan GUC, Cairo Room C Lecture 2.
Viruses & Destructive Programs
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
 a crime committed on a computer network, esp. the Internet.
Introduction of Internet security Sui Wang IS300.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
--Harish Reddy Vemula Distributed Denial of Service.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Trojan Virus By Forbes and Mark. What is a Trojan virus Trojans are malicious programs that perform actions that have not been authorised by the user.
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
History of the Computer David Covarrubias. Terms of Computers ► Bit - A bit or binary digit is the basic unit of information in computing and telecommunications.
Sid Stamm, Zulfikar Ramzan and Markus Jokobsson Erkang Xu.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer History By Jordan Mendez. Important Events 1936-The first computer is made 1962-The first computer game, Space Wars, is invented The original.
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Computer safety Filip Hruby.
Chapter 40 Internet Security.
Managing Windows Security
Seminar On Ethical Hacking Submitted To: Submitted By:
Operating Systems Services provided on internet
CYBER SECURITY...
CONNECTING TO THE INTERNET
Instructor Materials Chapter 7 Network Security
Various Types of Malware
Answer the questions to reveal the blocks and guess the picture.
Protect Your Computer Against Harmful Attacks!
How to Get Rid of Online Threats Impacting your Computer Device?
Teaching Computing to GCSE
Computer Applications Unit B
Little work is accurate
Computer Viruses.
Malware, Phishing and Network Policies
Chap 10 Malicious Software.
Viruses and Virus Protection
Security.
Viruses.
Faculty of Science IT Department By Raz Dara MA.
Networking for Home and Small Businesses – Chapter 8
Chap 10 Malicious Software.
Computer Security By: Muhammed Anwar.
Networking for Home and Small Businesses – Chapter 8
WJEC GCSE Computer Science
Networking for Home and Small Businesses – Chapter 8
Test 3 review FTP & Cybersecurity
Presentation transcript:

Forensics Week 12

Agenda Forensic Plan Timing Outsider Threat Final Project Option 1 – Final and Presentation Due (4/24) Option 2 – Presentation (4/24) and Final (5/1-Study Day) Outsider Threat

Definition of External Threat The threat from outside the organization, who have no legitimate rights to corporate system or information.

In Class Assignment Design and attack against your companies system… From the Inside From the Outside

Types of external threats

Social Engineering In the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

Denial of Service attack occurs when multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers. Such an attack is often the result of multiple compromised systems flooding the targeted system with traffic.

Virus, Worm and Trojans A computer virus attaches itself to a program or file enabling it to spread from one computer to another, leaving infections as it travels. A worm is similar to a virus by design and is considered to be a sub- class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. The Trojan Horse, at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  

Organizational Attacks

Automated attacks A very common attack used by hackers is known as the Automated Attack – An attack that automatically scans IP ranges and ISPs endings. Most of the attacks know how to spot if there is a firewall active, combined with Trojans that allow information theft or backdoor that allows full access to the victim’s computer.