Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 9: Privacy, Crime, and Security
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Security+ Guide to Network Security Fundamentals
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
Defining Security Issues
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
First Look at Security and Privacy Jeremiah Burleson.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
IT in Business Issues in Information Technology Lecture – 13.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
MIS105 Chapter 14 Security and Privacy. Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe.
Securing Information Systems
Add video notes to lecture
IT Security  .
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BCT 2.00 Analyze Technology Issues
Network and Internet Security and Privacy
Planning and Security Policies
INFORMATION SYSTEMS SECURITY and CONTROL
Computers: Tools for an Information Age
Presentation transcript:

Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz

November 6, Assignments Assignment #5 – Due November 8, 2002 This Friday………… Programming Edit a Java Script program file If you want more information about javascript, visit

Security and Privacy: Computers and the Internet Chapter 11 Part A

November 6, Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution. Describe the aspects of securing corporate data, including software and data security, disaster recovery plans, and security legislation. Describe in general terms how viruses work, the damage they can cause, and procedures used to prevent this damage. Explain the threats to personal privacy posed by computers and the Internet. Describe actions you can take to maximize your privacy.

November 6, Computer Crime Stealing and using or selling of data : Company data Personal information in company files

November 6, Computer Crime Employees and individuals need to recognize the possible danger from computer systems and protect their assets.

November 6, Computer Crime Security and Privacy Keep data secure Destruction Accidental damage Theft Espionage Keep data private Salaries Medical information Social security numbers Bank balances Data communications capabilities provides new challenges

November 6, Data, not equipment (cont) Ways to secure data Locked servers Removable hard drives that are locked away when not in use Hard disk drives requiring special tools for detachment Physical cages around computers that prohibit access Passwording files

November 6, Computer Crime Supplies for the Hacker PC Communications network Why hack? Harass Show-off Gain access to computer services without paying Obtain information to sell Hackers are individuals who attempt to gain access to computer systems illegally

November 6, White-hat hackers Professional Hackers.. Computer professionals hired to illicitly gain entry into a system Reveal weak points Protect the points May not alert its own employees of the testing Tiger teams Intrusion tester White hat hackers

November 6, Computer Crime What Systems Have Been Invaded? Corporate networks Over half largest corporations were invaded Competitors? Government networks Dept of Defense attacked more than 200,000 times per year Computer attack abilities of other nations? Web sites Universities UCSC is attacked daily…. Personal machines..

November 6, Computer Crime How Can Systems be Easily Compromised? Social engineering Con artist – persuade others to give away their passwords over the phone Electronic pickpockets Use computers to transfer or change assets to their advantage reroute orders, change invoice pricing….

November 6, Computer Crime Frequently Reported Crimes Credit-card fraud Numbers captured and used fraudulently Data communications fraud Piggyback on someone else’s network Office network for personal purposes Computer-directed diversion of funds Unauthorized access to computer files Accessing confidential employee records Theft of trade secrets and product pricing Unlawful copying of copyrighted software Casual sharing of copyrighted software Assembly-line copying

November 6, Computer Crimes Bomb Program to trigger damage Scheduled to run at a later date May be found in software for general public, especially shareware Data diddling Changing data before or as it enters the system Denial of service attack (DOS) Hackers bombard a site with more request for service than it can possible handle Prevents legitimate users from accessing the site Appearance of requests coming from many different sites simultaneously

November 6, Piggybacking Original user does not sign off properly Intruder gains accesses to files via the original user id Salami technique Embezzlement A “little slice” from every transaction can add up Scavenging Search garbage and recycling bins for personal information Computer Crimes

November 6, Trapdoor Illicit program left within a completed legitimate program Permits unauthorized and unknown entry to the program Trojan horse Illegal instructions placed inside a legitimate program Program does something useful and destructive at the same time Zapping Software to bypass security systems Computer Crimes

November 6, Discovery Difficult Accidental 85% of computer crimes are never reported Prosecution Legal representatives lack technical knowledge to understand the crime Computer Crimes

November 6, Computer Fraud and Abuse Act – 1986 Computer criminals subject to Fines Jail time Confiscation of hardware Supplemented by state statutes Computer Crime Discovery and Prosecution

November 6, Computer Forensics Uncovering computer-stored information suitable for legal use Computer Crime Discovery and Prosecution

November 6, Security Natural disasters Fire Accidents Vandalism Theft Theft or destruction of data Industrial espionage Hackers System of safeguards designed to protect a computer system and data from deliberate or accidental damage

November 6, Security Identification and Access Provide access to authorized individuals only Uses one of more of the following systems What you have Key, badge, token, etc.. What you know Password, PIN number What you do Signature What you are Biometrics – fingerprint, retinal scan

November 6, Security Identification and Access What You Have Key Badge Token Plastic card – magnetized strip Active badge – signals wearer’s location using infrared signals

November 6, Security Identification and Access What You Know Password Identification number Combination

November 6, Security Identification and Access What You Do Verify signature – software verifies scanned and online signatures Hard to forge, but not impossible

November 6, Security Identification and Access What You Are Biometrics – science of measuring individual body characteristics Fingerprints Voice pattern Retina of the eye Entire face

November 6, Security Identification and Access Internal controls Transaction log Auditor checks Who has accessed data during periods when that data is not usually used? Off-the-shelf software to access the validity and accuracy of the system’s operations and output

November 6, Security Identification and Access Secured waste Shredders Locked trash barrels Applicant screening Verify the facts on a resume Background checks Built-in software protection Record unauthorized access attempts User profile

November 6, Security Software Security Ownership – who owns custom software? The Company if programmer is employee Contractual agreement if the programmer is not an employee (ie, consultant) If no contract – unclear title Software can be copyrighted

November 6, Security The Internet The Internet is NOT Secure Firewall Dedicated computer that governs interaction between internal network and the Internet Encryption Data Encryption Standard (DES)

November 6, Security Personal Computers Physical security with locks and cables Surge protector Uninterruptible power supply (UPS) Backup files regularly and systematically

November 6,