Lighting Up the Dark Side of the Web Colin Rose Quarter Past Five Limited Monday 11 th October 2004.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Are you Safe at Work? A look into Safety at the Workplace and Internet Security Presented by Sheila Gee.
SHRM-GT SPOTLIGHT Membership Committee. Meet the Committee Garrett Kowalewski, Chair Owner, in the process of founding a new technical and general staffing.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
SECURITY CHECK Protecting Your System and Yourself Source:
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Is Commercial Technology All That Threatening? Colin Rose Quarter Past Five Limited “The Dual Use of Technology” Wednesday 4 th June 2008 SHAPE Club,
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Cyber X-Force-SMS alert system for threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
CYBER CRIME AND SECURITY TRENDS
SiteLock Internet Security: Big Threats for Small Business.
STEGANOGRAPHY. C ONTENTS Defination Steganography History Steganalysis Steganography v/s Cryptography Steganography Under Various Media Steganographic.
Network Security in a Business Setting By: Brian Haumschild.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Presented by: Dr. Munam Ali Shah
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
©Holm Publications Security Awareness Presentation.
CYBER CRIME.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
According to netiquette simply refers to our behavior the internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Demi Leigh.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
 Carla Bates Technology and Education ED 505.  Social Media Sites are interactive webpages, blogs, and other user created sites that all others to create,
Computer crimes.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Computer Security By Duncan Hall.
Lighting Up the Darker Side of the Web Colin Rose Quarter Past Five Limited Tuesday 9 th March 2004.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Cybersecurity Test Review Introduction to Digital Technology.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Cyber crime and security issues
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Securing Information Systems
E&O Risk Management: Meeting the Challenge of Change
IT Security  .
Seminar On Cyber Crime Submitted To: Submitted By:
COMPUTER CRIME.
Securing Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Engage Beginning Computer Programmers with Interactive Concepts
HOW DO I KEEP MY COMPUTER SAFE?
Forensic and Investigative Accounting
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Presentation transcript:

Lighting Up the Dark Side of the Web Colin Rose Quarter Past Five Limited Monday 11 th October 2004

The cost of widespread company network security breaches keeps rising… Occurrence and Average Annual Cost of a Security Attack (IDC)

InformationWeek estimates: Security breaches cost businesses $1.4 trillion worldwide this year 2/3 of companies have experienced viruses, worms, or Trojan horses 15% have experienced Denial of Service attacks “60% of security breaches occur within the company – behind the firewall” (IDC)

What are the drawbacks? Of increased user internet and access “Users; who would have them?” Users do not know what to do Users mess things up Users are lazy Users change things Users are a maverick component

What are the consequences? Of increased user internet and access “Users; what would you do without them?” Users need to be told what to do (and what not to do) Users are the main reason why you have a computer network Users are the larger half of your information systems Users can spot problems Users need to be “configured”, you just need to understand how to “configure” them.

Other Issues Legal liabilities Who is on your network -   Sexual or racial harassment Bad publicity and lost reputation Improper use of the systems Inside out and Outside in??

The Dark Side of the Web Pornography Anarchy and theft Credit card fraud Telephone fraud Lock picking

The Dark Side of the Web Hacking Steganography Spoofs and sucksites Virus creation Password crackers MP3 music files

Cyber Warfare International and commercial Denial of Service Commercial cyber warfare Terminate your existence in cyberspace Puts you out of business Easy to carry – downloadable from the web

You would be amazed to discover how imaginative users can be. Seeing might be believing!! User Abuse of a Computer System

A Word About The Future People Process Technology No matter how much the technology changes, the individuals change, even how much the environment changes. There are still some things that remain the same

To re-cap…. The internet can be used safely, we just have to be a bit more sophisticated than we used to…

Fred Smith, currently on placement, can always be found hard at work at his desk. Fred works independently, without wasting company time talking to colleagues. Fred never thinks twice about assisting fellow employees, and he always finishes given assignments on time. Often Fred takes extended measures to complete his work, sometimes skipping coffee breaks. Fred is an individual who has absolutely no vanity in spite of his high accomplishments and profound knowledge in his field. I firmly believe that Fred can be classed as a high-caliber asset, the type which cannot be dispensed with. Consequently, I duly recommend that Fred be offered permanent employment at Quarter Past Five, and a Proposal be executed as soon as possible. Steganography

Fred Smith, currently on placement, can always be found wasting company time talking to colleagues. Fred never finishes given assignments on time. Often Fred takes extended breaks. Fred is an individual who has absolutely no knowledge in his field. I firmly believe that Fred can be dispensed with. Consequently, I duly recommend that Fred be Proposal be executed as soon as possible.

Confidentiality Inadvertent disclosure (MS Word)MS Word Cached information (Hotel Phoenix)Hotel Phoenix Revelation Phishing

Virus Creation Viruses no longer require a low level understanding of computers. Increased and web use makes viruses easy to distribute. Viruses are very easy to write VCL / Mutation Engine / etc... VCL