Computers and WEAPONS. Computers as Weapons or help Weapons.

Slides:



Advertisements
Similar presentations
A NASSCOM ® Initiative Comprehensive Computer Security Software An advanced computer security software usually have one or more of the following utilities.
Advertisements

ETHICAL HACKING.
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Cyber Crime Game Players By Marharyta Abreu & Iwona Sornat.
NetSPA A software program aimed to avert cyber hackers Group 8 Tiffany Duhamel Elizabeth Sewell Katherine Watson.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
1 Telstra in Confidence Managing Security for our Mobile Technology.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Malicious Attacks Quinn Male Susan Dou Hanzhang Hu.
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
By: Colby Shifflett Dr. Grossman Computer Science /01/2009.
Protecting Information. Who We Are We are working on our Information Assurance MBA This is part of our curriculum; to present on information security.
Protecting Customer Websites and Web Applications Web Application Security.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber crime & Security Prepared by : Rughani Zarana.
Electronic Security. WELCOME -About us What we're going to talk to you about: Why Systems are Attacked Malware Firewall Security Computer System Safety.
Autonomous Machines By: Tyler Roberts.
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
P RESENTED B Y - Subhomita Gupta Roll no: 10 T OPICS TO BE DISCUSS ARE : Introduction to Firewalls  History Working of Firewalls Needs Advantages and.
Do you believe in this? Due to its very nature, the Internet is NOT a safe or secure environment. It is an ever-changing medium where anyone and everyone.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Firewalls Julie Petrusa S.A.M. Matiur Rahman Carlo Mormina.
Networking Components
Firewalls Nicklas Nordenmark Fabian Alenius Peter Renström Nicklas Nordenmark Fabian Alenius Peter Renström.
INGOTs Computer Security Name: Elliot Haran. Introduction  Staying safe on the internet  Learning to deal with Cyber Bullying, Stalking and grooming.
GORAN OSIM AND TIM MYERS CPSC 424 DDOS AND THE SYSADMIN.
Password Security & Software Encryption n John Barthmaier n October 21, 2009.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Manga comic industry security information presentation By Dominic Roofe.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Network Security Lewis R. Folkerth, P. E. Consumers Energy Energy Management Systems
What is hacking? Hacking is the use of a computer and its files with out being allowed by the owner. Hacking is used to find out peoples passwords and.
BREAKING NEWS “Ebay Had 145 Million Personal Record’s Stolen in a Data Breach” “Target Credit Card Breach Affects 110 Million Americans” “Court Ventures.
Be Computer Smart Internet Safety Kathy Pascavage.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Cybersecurity for the modern Commercial Brokerage Presented by Brian W. Palm.
WINS Monthly Meeting 06/05/2003 WINS Monthly Meeting 06/05/2003.
Zemana AntiLogger (2012) Zemana AntiLogger (2012) Zemana Antilogger has been specifically developed to protect PC from numerous security.
Jessica Prochut Unmanned Aerial Vehicles "Drones".
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Network Immunization Real-Time Network Security Raymond R. Hoare, Assistant Professor Department of Electrical Engineering University of Pittsburgh
NETWORK DEVICES Ted Lawson LTEC Hub A hub is a device that allows you to connect multiple devices together, which allows them to act as a single.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
The Current State of Cyber Security and How to Defend Your Data.
FIREWALLS Created and Presented by: Dawn Blitch & Fredda Hutchinson.
 Define hacking  Types of hackers  History  Intentions  Statistics  Facts  How to Protect yourself.
Responsible digital citizenship By: Aiden. What is responsible digital citizenship? Responsible digital citizenship is many things. The topics I am covering.
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.
Drones Erik Axel. Drone Applications 1. Military 2. Commercial 3. Service.
NETWORK SECURITY. What do you see THE IMPORTANCE OF SECURITY THE ARE WEBSITES ON THE INTERNET COULD INFORM PEOPLE THE RANGE AND AVAILABLE UNSECURED SITES.
IT 244 Week 8 DQ 3 To purchase this material link 244-Week-8-DQ-3 For more courses visit our website
Calgary Computer Security Solutions
Proactive Incident Response
Security in the Workplace: Information Assurance
Firewalls.
Final Project Part 1: Paper and Storyboard
Operating Systems Security
Fire-wall.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
FIREWALL.
Presentation transcript:

Computers and WEAPONS

Computers as Weapons or help Weapons

Hacking, known as Cyber Weapon

A Cyber Weapon is Mainly as hacking techniques Viruses Software used to penetrate networks NOT ONLY in military, ALSO relating us

Computer Applied Weapons

Weapons that are Conventional weapons Computer controlled New unmanned military vehicles, drones

History

Cyber Weapons The 414s (1982) 6 teenagers raging from 16 to high-profile computer systems 1 st incident caused damage 1 st arrest of hackers

Cyber Weapons Markus Hess (1980s) Recruited by the KGB Attacked 400 U.S. military computers Germany, Japan, MIT, OPTIMIS Database

Cyber Weapons Routers with filtering rules (the late 1980s) Packet filter firewalls (1988) First commercial firewalls ( ) Circuit-level gateways (1989), 2 nd generation Firewall Toolkit (FWTK)(1994), 3 rd generation

Computer Applied Weapons New technologies, for military at first AN/MYK-1 (MOBIDIC) (1959) M18 FADAC (1960) D-17B (1962) D-37C (1964)

Computer Applied Weapons UAV (Unmanned Aerial Vehicle) MAARS (Modular Advanced Armed Robotic System) Gun data computer

Problems for Society

Cyber Weapons Will our information leak? JP Morgan Chase: 76,000,000 (October, 2014) Apple Developer site: 275,000 (July, 2013) LinkedIn: 8,000,000 (June, 2012) US Military, National Guard and etc.

Cyber Weapons How severe is it? Our safety is threatened

Computer Applied Weapons How to increase the efficiency?

Computer Applied Weapons How to reduce casualty?

Computer Applied Weapons How to protect bases?

Solutions

Cyber Weapons How can we defend?

Computer Applied Weapons To increase the efficiency Gun data computer GOT & GOLIS systems by guidance computer

Computer Applied Weapons To reduce casualty UAV & MAARS APS (Active protection system)

Computer Applied Weapons To protect bases Ballistic Missile Early Warning System

Will the Problem Change?

Cyber Weapons Will the information leaking stop? From the history to the present Same in the future

Cyber Weapons Why? Attackers and defenders Benefits

Computer Applied Weapons How to increase the efficiency? This never changes

Computer Applied Weapons How to reduce casualty? How to reduce the cost?

Computer Applied Weapons How to protect bases? In common sense, this never changes

References What is a cyber weapon? (2011, June 28). Retrieved February 23, 2015, from age.com/technology/security/ /what-is-a-cyber-weapon Darell, R. (2014, May 15). Hacking History - A Timeline Of Hack Tactics [Infographic]. Retrieved February 23, The 414s. (n.d.). Retrieved February 23, 2015, from Goodchild, J. (2012, May 14). 10 hacks that made headlines. Retrieved February 23, Drones, computers new weapons of U.S. shadow wars. (2012, June 17). Retrieved February 23, Firewalls.com, S. (n.d.). Internet Security. Retrieved February 23, Military computers. (n.d.). Retrieved February 23, 2015, from MAARS. (n.d.). Retrieved February 23, 2015, from Gun data computer. (n.d.). Retrieved February 23, 2015, from SILVER-GREENBERG, J., GOLDSTEIN, M., & PERLROTH, N. (2014, October 2). JPMorgan Chase Hacking Affects 76 Million Households. Retrieved February 23, Arthur, C. (2013, July 20). Apple Developer site hack: Turkish security researcher claims responsibility. Retrieved February 23, Goodin, D. (2012, June 6). 8 million leaked passwords connected to LinkedIn, dating website. Retrieved February 23, Missile guidance. (n.d.). Retrieved February 23, 2015, from