Matthew Allen Comp 2903 October 28th 2010

Slides:



Advertisements
Similar presentations
By : Deepak Singhal. Cyber warrior is a type of warfare which takes place on a computer through internet. This type of electronic warfare is growing everyday.
Advertisements

Computer Threats I can understand computer threats and how to protect myself from these threats.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Viruses, Hacking and Backups By Katie Louise Bieber!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
1 August 18, 2010 Disaster Recovery Coordinators’ Meeting.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Computer security By Isabelle Cooper.
What vulnerabilities do you face in cyberspace?  Cyberbullying  Cyberstalking  Racial hatred  Exposure to violent, disturbing and/or illegal material.
Internet Dangers Technology Communication Tools E-Literate.
Computer Security By Duncan Hall.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Computer networks!!!. What is a computer network? Its a type of connection of communication or anything between people such as internet.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
CYBERCRIME & ADVANCED PERSISTENT THREATS TEMITAYO OLOYEDE ( ) ATHABASCA UNIVERSITY ETHICAL, LEGAL, AND SOCIAL ISSUES IN INFORMATION TECHNOLOGY (COMP607)
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
Chebucto Community Net
BAE systems Research results October 2016
Creating your online identity
3.6 Fundamentals of cyber security
System Access Authentication
Common Methods Used to Commit Computer Crimes
Unit 4 IT Security.
Information Security.
Cyber Crime What’s all the fuss about?
Unit 32 – Networked Systems Security
A Project on CYBER SECURITY
Homeland Security: Computer Protection
Wireless Network Security
Attribution & the globalization of criminal evidence
Pre-writing topic discussion: Speak to your partner
What is Cyber bullying? Cyber bullying is when a person, or a group of people, uses the internet, mobile phones or other digital technologies to threaten,
Online Safety.
Israel Handbook.
Chapter 11 crime and security in the networked economy
CZECH – GERMAN YOUNG PROFESSIONAL PROGRAM
The Best Way To Secure U R Self
How to prevent internet snooping!
COMPUTER PRIVACY.
McAfee Support UK Tel McAfee Support is one of our principal technical assistance facilities to the users of McAfee—a part of the gargantuan.
Mary Kummer Jim McNall PRIMA Spring Training 2018
Risk of the Internet At Home
Safer computing week Create, connect and share respect.
What Is Bullying? What do you think bullying is? Bullying is:
Provided by OSPA ( OPSEC for Families Presented by: (Presenter’s Name) Provided by OSPA (
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
The American Cyber-Angst and the Real World – Any Link?
WELCOME AOI Tech Solutions Get Instant Tech Help & Support.
WELCOME AOI Tech Solutions - Network Security.
LO1 - Know about aspects of cyber security
Reflecting on the Viability of Liberalism
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Marcial Quinones-Cardona
Cryptojacking' hacker trend turns Canadians into cryptocurrency miners
Chapter 1 Key Security Terms.
Cybercrime By: Kimberly Foreiter
Digital Footprint By: Jamie Purdy.
SECURITY IN THE DIGITAL AGE
Computer System Security
Presentation transcript:

Matthew Allen Comp 2903 October 28th 2010 Cyber Attacks Matthew Allen Comp 2903 October 28th 2010

What is the difference between a cyber attack and cyber warfare? How many know the difference, or if there is a difference between the two? Example: United Kingdom man hacks into NASA and other US computer networks. His goal was to see if the US was covering up the existence of aliens. Is this an attack or warfare?

What is a Cyber Attack? Cyber Warfare? A cyber attack is defined as “an attempt to undermine or compromise the function of a computer-based system, or attempt to track the online movements of individuals without their permission”[Tatum] Cyber Warfare is “the use of the Internet to wage war in the virtual world, often with real effects in the physical world”[McGuigan]

Summary of the article “UK says it gets hit by 1000 cyber attacks monthly” Satter, Raphael G. October 13th 2010 That the UK gets approximately 1,000 cyber attacks in a month. 20,000 Malicious emails being sent to government networks. That E-crime can cost countries a lot of money. The importance of cyber security Possibilities to prevent and ways to counter

Protection against cyber attacks Article mentions that UK was considering using cyber warfare to deter others from using cyber attacks. 2005, Ottawa created something called the Canadian Cyber Incident Response Centre. A system was set up by the US. Started in May 2009. Became organized in May 2010. It was slated to be fully operational on October 1st. The US president getting an internet “kill switch”

My position about cyber attacks I think that cyber attacks are bad because of all the things that happen because of them, from causing damages to networks to causing cyber warfare.

Alternative position An alternate position to the one previously presented is that we could not do anything and leave everything the way it is, cyber attacks and all.

Risks of my position The risks of dealing with the issue of cyber attacks is that it may fully evolve into greater threats such as use of cyber warfare. Having too much power within one preventative measures group, gives them power to censor other things, which may not need censoring

Links to class topics One of the five things to know about technological change. “Always winners and losers in technological change”[Postman] The second connection to class is the international topic, which we have yet to cover.

Conclusion Cyber attacks are bad. They are not likely to go away People will continue to take advantage of others by using the internet

Sources http://news.bbc.co.uk/2/hi/programmes/click_online/4977134.stm “Hacker fears 'UFO cover-up‘” BBC News May 2006 http://www.wisegeek.com/what-is-a-cyberattack.htm “What is a cyber attack?” Tatum, Malcolm September 9th 2010 http://www.wisegeek.com/what-is-cyber-warfare.htm What is cyber warfare? McGuigan, Brendan September 9th 2010 http://www.globalresearch.ca/index.php?context=va&aid=20933 “Cyber Warfare: US Military Hackers and Internet Spies” Savin, Leonid September 6th 2010 http://www.canada.com/topics/technology/science/story.html?id=c3a21871- c6c0-48bf-8d00-5774163e2600 “Canada needs protection from cyber attacks, CSIS says” National Post January 2nd 2008 http://www.washingtonpost.com/wp- dyn/content/article/2010/10/13/AR2010101302147.html (the article) The Washington post Satter, Raphael G. October 13th 2010 “Five things we need to know about technological change” Computers in society Postman, Neil Pg. 4March 27th 1998 http://www.canada.com/technology/cyber+arrived/3722461/story.html National post Goodspeed, Peter October 25th 2010