Computer System Security

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Crime and Security in the Networked Economy Part 4.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
Ch.5 It Security, Crime, Compliance, and Continuity
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
Bruce Schneier Lanette Dowell November 25, Introduction  “It is insufficient to protect ourselves with laws; we need to protect ourselves with.
Note1 (Intr1) Security Problems in Computing. Overview of Computer Security2 Outline Characteristics of computer intrusions –Terminology, Types Security.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introducing Computer and Network Security
Computer Viruses and Worms By Rafael Albuernes What is a Virus? What is a Virus? What is a Worm? What is a Worm? Types of Infections Types of Infections.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Air Traffic Control. 1.1 Reliability It is extremely important that the air traffic control systems are reliable and do not end up crashing. If the air.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Viruses, Worms & Trojan Horses
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computer Crime and Information Technology Security
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
BUSINESS B1 Information Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
 The purpose of this report is to inform people that the spyware and virus threat is growing and what people can do to stop the spread of spyware and.
 a crime committed on a computer network, esp. the Internet.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
Chap1: Is there a Security Problem in Computing?.
Safe’n’Sec IT security solutions for enterprises of any size.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Overview of Database Security Introduction Security Problems Security Controls Designing Database Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Cyber crime and security issues
Securing Information Systems
Systems Security Keywords Protecting Systems
Homeland Security: Computer Protection
Why Computer Security Need???
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
CHAPTER 4 Information Security.
Understand Core Security Principles
Securing Information Systems
Cyber Crimes Chunlian QU 9/18/2018.
Unit 11 Task #1 Read the unit specification and create a glossary which defines each of the words / terms you don’t know.
Risk of the Internet At Home
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Matthew Allen Comp 2903 October 28th 2010
NETWORK SECURITY.
Intrusion detection Lewis Knight.
Prepared By : Binay Tiwari
Data integrity and security
By Arisara Sangsopapun
Networking for Home and Small Businesses – Chapter 8
Chapter # 3 COMPUTER AND INTERNET CRIME
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Computer Security (Summary)
Privacy, Security, and Ethics
Presentation transcript:

Computer System Security Rocky Pritchard CS 4100 April 23, 2002

Abstract What are the risks of storing personal information on a computer? What forms of attacks can strike the computer? What are some prevention methods to protect the computer?

Security Issues Computer Security is an important issue. Many companies do not take computer crimes seriously. Many jobs and businesses revolve around the use of a computer.

Background 23% of respondents to a survey conducted by CSI reported unauthorized access/misues in last 12 months. 27% didn’t even know if they had suffered attacks. 58% of those attacked reported ten or more incidents.

Computer Security “Computer Security means to protect information” Efforts to increase security. Data transfer too easy?

Types of Threats Malicious Non-Malicious Natural Disasters

Malicious Threats Trojan Horses Viruses Worms

Non-Malicious UNINTENTIONAL Employee Error Natural Disasters

Prevention Methods Basic Prevention Techniques Cryptography Antivirus Software Firewalls

Conclusion Technology driven economy, computer system security is a bigger issue. Threats are very real and can cause lots of damage. Prevention methods can save time and money.