Introduction to Cybercrime and Security

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
1 Agendas Chapter 5 (Recap) Chapters 6 – Diverse IT Infrastructures Case – The iPremier Company: Denial of Service Attack.
THE INFORMATION SECURITY PROBLEM
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
presentation topic : cyber crimes and security By ashwini awatare
Computer Hacking Cybercrime (1).
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
Computer Crime and Information Technology Security
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
C8- Securing Information Systems
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Topic 5: Basic Security.
Quality of Information System (IS) reflecting local correctness and reliability of the operating system; the logical completeness of the hardware and software.
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Introduction to Security Dr. John P. Abraham Professor UTPA.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Information Security: Current Threats Marc Scarborough Information Security Officer
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Security Risks Todays Lesson Security Risks Security Precautions
Securing Information Systems
IT Security  .
Lecture 5. Security Threats
Network security threats
CHAPTER 6 – BASIC SECURITY
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Securing Information Systems
Security in Networking
Computer Security Elaine Munn Introduction to Computer Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Ethics, Part 2 Chapter 5 pp National Income Tax Workbook™
Prepared By : Binay Tiwari
Philip Nichilo Vincent Carestia
Firewalls and Security
Faculty of Science IT Department By Raz Dara MA.
Security.
Computer Security By: Muhammed Anwar.
Operating System Concepts
Presentation transcript:

Introduction to Cybercrime and Security DIYTP 2009 Introduction to Cybercrime and Security

What is Cybercrime? Using the Internet to commit a crime. Identity Theft Hacking Viruses Facilitation of traditional criminal activity Stalking Stealing information Child Pornography

Cybercrime Components Computers Cell Phones PDA’s Game Consoles

High-Profile Cybercrime- related Cases TJ Maxx data breach 45 million credit and debit card numbers stolen Kwame Kilpatrick Cell phone text messages BTK Serial Killer Kevin Mitnick

Computer Security Confidentiality Integrity Availability Only those authorized to view information Integrity Information is correct and hasn’t been altered by unauthorized users or software Availability Data is accessible to authorized users

Computer Security Figure 1.0 – CIA Triangle

Computer Security - Threats Malware Software that has a malicious purpose Viruses Trojan horse Spyware

Computer Security - Threats Intrusions Any attempt to gain unauthorized access to a system Cracking Hacking Social Engineering War-driving

Computer Security - Threats Denial-of-Service (DOS) Prevention of legitimate access to systems Also Distributed-Denial-of-Service (DDoS) Different types: Ping-of-Death Teardrop Smurf SYN

Computer Security - Threats Figure 1.1 – DoS and DDoS Models

Computer Security - Terminology People Hackers White Hat – Good guys. Report hacks/vulnerabilities to appropriate people. Black Hat – Only interested in personal goals, regardless of impact. Gray Hat – Somewhere in between.

Computer Security - Terminology Script Kiddies Someone that calls themselves a ‘hacker’ but really isn’t Ethical Hacker Someone hired to hack a system to find vulnerabilities and report on them. Also called a ‘sneaker’

Computer Security - Terminology Security Devices Firewall Barrier between network and the outside world. Proxy server Sits between users and server. Two main functions are to improve performance and filter requests. Intrusion Detection Systems (IDS) Monitors network traffic for suspicious activity.

Computer Security - Terminology Activities Phreaking Breaking into telephone systems (used in conjunction with war-dialing) Authentication Determines whether credentials are authorized to access a resource Auditing Reviewing logs, records, or procedures for compliance with standards

Computer Security - Careers Information Security Analyst US National Average Salary Figure 1.2 – Median salary courtesy cbsalary.com

Computer Security - Certifications Entry-level Security+ http://www.comptia.org/certifications/listed/security.aspx CIW Security Analyst www.ciwcertified.com Intermediate MSCE Security http://www.microsoft.com/learning/en/us/certification/mcse.aspx#tab3 Professional CISSP www.isc2.org SANS www.sans.org

Computer Security - Education Community-college Washtenaw Community College Computer Systems Security http://www4.wccnet.edu/academicinfo/creditofferings/programs/degree.php?code=APCSS Computer Forensics http://www4.wccnet.edu/academicinfo/creditofferings/programs/degree.php?code=APDRAD

Computer Security - Education 4-Year College Eastern Michigan University Information Assurance Applied Network Cryptography Management http://www.emich.edu/ia/undergraduate.html