Computer Security. E-bay Phishing Scam Slide 2 Phishing Scam using Google Chat “LOL – ya gotta see this!!” Read about this scam:

Slides:



Advertisements
Similar presentations
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Advertisements

SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Data Security GCSE ICT.
Slide 1 Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall Power Point Lectures to accompany Tomorrow’s Technology and You, 9e.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
© 2008 Prentice-Hall, Inc. Slide 1. Chapter 10 Computer Security and Risks © 2008 Prentice-Hall, Inc. Slide 2.
© 2006 Prentice-Hall, Inc.Slide 1 Tomorrow's Technology & You.
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 11 Security and Privacy: Computers and the Internet.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
BUSINESS B1 Information Security.
Internet Security facilities for secure communication.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
© 2006 Prentice-Hall, Inc.Slide 1 Computer Confluence 7/e.
Security Risks Todays Lesson Security Risks Security Precautions
IT Security  .
UNIT 19 Data Security 2.
Tomorrow’s Technology and You
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Computer Security and Risks
HOW DO I KEEP MY COMPUTER SAFE?
G061 - Network Security.
Presentation transcript:

Computer Security

E-bay Phishing Scam Slide 2

Phishing Scam using Google Chat “LOL – ya gotta see this!!” Read about this scam: spreads-through-chat-sessions/ spreads-through-chat-sessions/ Slide 3

Google tries to fight phishing

Slide 5 Objectives Describe several types of computer crime and discuss possible crime prevention techniques. Describe the major security issues facing computer users, computer system administrators, and law enforcement officials Describe the ways in which computer security relates to personal privacy issues. Explain the ways in which security and computer reliability are related.

© 2008 Prentice-Hall, Inc.Slide 6 Online Outlaws: Computer Crime Computers are used to break laws as well as to uphold them. Computer crime involves:  Theft by computer  Software piracy  Software sabotage  Hacking and electronic trespassing

© 2008 Prentice-Hall, Inc.Slide 7 Online Outlaw: Computer Crime The Computer Crime Dossier Computer crime is any crime accomplished through knowledge or use of computer technology. Businesses and government institutions lose billions of dollars every year to computer criminals. The majority of crimes committed by company insiders.  These crimes are typically covered up or not reported to authorities to avoid embarrassment.

© 2008 Prentice-Hall, Inc.Slide 8 Online Outlaws: Computer Crime According to a 2001 survey of over 500 companies and government agencies:  85% detected computer security breaches in the preceding 12 months.  Financial losses due to security breaches topped $377 million.  70% reported that Internet connections were frequent points of attack.  Only 31% said that internal systems were frequent points of attack.

© 2008 Prentice-Hall, Inc.Slide 9 Theft by Computer Theft is the most common form of computer crime. Computers are used to steal:  Money  Goods  Information  Computer resources

Skimming: ATM Card Readers Slide 10

ATM Video Camera Slide 11

© 2008 Prentice-Hall, Inc.Slide 12 Common types of computer crime:  Spoofing: tricking a computer or user into believing the attacker is a different person / computer  E.g. Using a false sender addresses, IP address  Identity theft: the use of computers and other tools to steal whole identities  Usually involves social engineering: slang for the use of deception to get individuals to reveal sensitive information  Online fraud  Most commonly related to online auctions

© 2008 Prentice-Hall, Inc.Slide 13 Protect Yourself from online theft:  Make all your online purchases using a credit card.  Consider getting a separate credit card with a low credit limit for your online transactions.  Make sure a secure web site is managing your transaction.  Don’t disclose personal information over the phone.  Don’t give social security or driver’s license numbers over the phone; don’t print it on checks; and use encryption when sending it in .  Shred sensitive information.

© 2008 Prentice-Hall, Inc.Slide 14 Software Sabotage: Viruses and Other Malware  Virus / Trojan Horse: A piece of code hidden in a larger piece of software (game, MP3, exe file, OS, etc). When the software is executed, the malware does one or both of the following: 1.Replicates itself by making copies of its own code and inserting itself into other files on the computer 2.Has some kind of malicious activity – e.g. deleting critical system files on the user’s hard drive  E.g. Melissa virus, Chernobyl, Love Bug

© 2008 Prentice-Hall, Inc.Slide 15 Software Sabotage: Viruses and Other Malware How a Virus Works

© 2008 Prentice-Hall, Inc.Slide 16 Software Sabotage: Viruses and Other Malware Worm: program that travels independently (ie. unattached to a separate computer file as with viruses) over computer networks, seeking uninfected computers  The first headline-making worm was created as an experiment by a Cornell graduate student in  In the summer of 2001, a worm called Code Red made worldwide headlines. Virus War  Researchers have identified more than 18,000 virus strains, with 200 new strains appearing each month.  At any given time, about 250 virus strains are in active circulation.

© 2008 Prentice-Hall, Inc.Slide 17 Software Sabotage: Viruses and Other Malware Antivirus programs are designed to search for viruses, notify users when they’re found, and remove them from infected disks or files.  Antivirus programs continually monitor system activity, watching for and reporting suspicious virus-like actions.  Anti-virus software needs to be frequently revised and updated to combat new viruses as they appear.  Most anti-virus apps can automatically download new virus- fighting code from the Web as new virus strains appear.  However, it can take several days for companies to develop and distribute patches for brand-new viruses.

© 2008 Prentice-Hall, Inc.Slide 18 Software Sabotage: Viruses and Other Malware Spyware is technology that collects information from computer users without their knowledge or consent.  Also called: Tracking software or Spybot  Information is gathered and shared with others via the Internet.  Your keystrokes could be monitored. (e.g. passwords)  Web sites you visit are recorded.  Snapshots of your screen are taken.  Spyware can be the cause of pop-up windows appearing on your screen.  COMMON: In one survey, over 90% of PC users were found have spyware on their computers!  Frequently distributed in freeware, shareware, illegal downloads (e.g. torrents)  In drive-by downloads just visiting a Web site can cause a download!  Still not common, but it happens

© 2008 Prentice-Hall, Inc.Slide 19 Norton Antivirus Software’s Interface Norton’s Anti-Virus app

© 2008 Prentice-Hall, Inc.Slide 20 Software Sabotage: Viruses and Other Malware Hacking and Electronic Trespassing Hacker refers to people who break into computer systems. Webjackers hijack Web pages and redirect users to other sites. Denial of Service (DOS) attacks bombard servers and Web sites with traffic that shuts down networks and makes the network’s resources unavailable. Method: Saturate the victim (e.g. web server) with requests (e.g. for web pages) so that it cannot respond to legit traffic from customers/users. During the war in Georgia in 2008, many of the Georgian government’s computers including the national bank were shut down by a DoS attack. American sites that have been temporarily shut down include the FBI and NIH.

© 2008 Prentice-Hall, Inc.Slide 21 Software Sabotage: Viruses and Other Malware Hacking and Electronic Trespassing Breaking into other computer systems is called electronic trespassing. Electronic crime rings focus on stealing credit card numbers and other valuable information. Cliff Stoll discovered an international computer espionage ring because of a $.75 accounting error.

© 2008 Prentice-Hall, Inc.Slide 22 Access Restrictions Computer crime has led to a need to protect computer systems. Computer security attempts to protect computers and the information they contain. Computer security protects against unwanted access, damage, modification, or destruction.

© 2008 Prentice-Hall, Inc.Slide 23 Computer System Access Depending on the security system, you might be granted access to a computer based on:  Something you have  A key, an ID card with a photo, or a smart card containing digitally encoded identification in a built-in memory chip  Something you know  A password, an ID number, a lock combination, or a piece of personal history, such as your mother’s maiden name  Something you do  Your signature or your typing speed and error patterns  Something about you  A voice print, fingerprint, retinal scan, facial feature scan, or other measurement of individual body characteristics—collectively called biometrics

© 2008 Prentice-Hall, Inc.Slide 24 Passwords Passwords are the most common tool for restricting access to a computer system. Effective passwords are:  Not real words  Not names  Changed frequently  Kept secret  A combination of letters and numbers  Others?  Some systems require users to implement one or more of the above techniques when choosing a password  Northwestern Hospital’s EMR system

© 2008 Prentice-Hall, Inc.Slide 25 Firewalls, Encryption, and Audits These security systems reduce or prohibit the interception of messages between computers.  A firewall is like a gateway with a lock.  Encryption is where codes protect transmitted information and a recipient needs a special key to decode the message.  Shields are specially developed machines that prevent unwanted interception.

© 2008 Prentice-Hall, Inc.Slide 26 Firewalls Software that examines every bit of information travelling in and out of a network (e.g. your internet connection) It has various rules / settings. For example, some firewalls keep a list of IP addresses known to belong to malicious computers and will not allow access to/from those computers. May block remote login requests coming IN to your computer.

Firewall Software Slide 27

© 2008 Prentice-Hall, Inc.Slide 28 Computer Security: Reducing Risks Software and Hardware Firewalls

© 2008 Prentice-Hall, Inc.Slide 29 Reducing Risks: Encryption Making a message secure from outsiders requires encryption software.  Encryption software scrambles the sent message using a key.  A different key is needed to unscramble the received message.

© 2008 Prentice-Hall, Inc.Slide 30 Reducing Risks: Encryption Cryptography is the process of encrypting messages. Audit-control software monitors and records computer activity.  Effective audit-control software forces every user to leave a trail of electronic footprints.  Northwestern Hospital’s EMR system keeps track of every person who has accessed every record!

Backups and Other Precautions An uninterruptible power supply (UPS) can protect computers from data loss during power failures. Surge protectors shield electronic equipment from power spikes. Have a routine for making regular backups.  Many systems are automatically backed up at the end of each work day.

© 2008 Prentice-Hall, Inc.Slide 32 Rules of Thumb: Safe Computing Share with care. Don’t pirate software. Run an anti-virus utility– and update regularly. Run an anti-spyware utility – and update regularly. Change your passwords regularly. Take your password seriously. Don’t name it after your pet, bf/gf, favorite color, birthday, etc Lock sensitive data. Use backup systems. Consider encryption for Internet activities. Prepare for the worst (e.g. back up data regularly)

© 2008 Prentice-Hall, Inc.Slide 33 Justice on the Electronic Frontier Dozens of hackers have been arrested for unauthorized entry into computer systems and for the release of destructive viruses and worms. Through our scientific genius, we have made this world a neighborhood; now through our moral and spiritual development, we must make of it a brotherhood. —The Rev. Martin Luther King, Jr.

© 2008 Prentice-Hall, Inc.Slide 34 Security, Privacy, Freedom, and Ethics: The Delicate Balance Federal and state governments have responded to the growing computer crime problem by creating new laws against electronic trespassing and by escalating enforcement efforts:  Telecommunications Act of 1996  Digital Millennium Copyright Act of 1998  Each of these laws introduced new problems by threatening rights of citizens—problems that have to be solved by courts and by future lawmakers.

© 2008 Prentice-Hall, Inc.Slide 35 Security and Reliability Computer security involves more than protection from trespassing, sabotage, and other crimes. Software errors and hardware glitches account for some of the most important security issues, such as: Bugs and Breakdowns Software bugs do more damage than viruses and computer burglars combined.

© 2008 Prentice-Hall, Inc.Slide 36 Security and Reliability Facts about software engineering:  It is impossible to eliminate all bugs.  Even programs that appear to work can contain dangerous bugs.  The bigger the system, the bigger the problem.  Computer breakdowns pose a risk to the public, and the incidence rate doubles every two years.  Hardware problems are rare when compared with software failures.  Problems in most fields from computers to airplanes result from human error. Programmers need to be very careful and test rigorously.

Software Bug function updateBalance() { depositAmount = 500; newBalance = oldBalance – depositAmount; } © 2008 Prentice-Hall, Inc.Slide 37

© 2008 Prentice-Hall, Inc.Slide 38 Computers at War Smart weapons are missiles that use computerized guidance systems to locate their targets. An autonomous system is a complex system that can assume almost complete responsibility for a task without human input.

© 2008 Prentice-Hall, Inc.Slide 39 Warfare in the Digital Domain The front lines of future warfare may be in cyberspace. By attacking computer networks an enemy could conceivably cripple:  Telecommunications systems  Power grids  Banking and financial systems  Hospitals and medical systems  Water and gas supplies  Oil pipelines  Emergency government services

© 2008 Prentice-Hall, Inc.Slide 40 Will Computers Be Democratic?  1991 Soviet Union coup attempt: News in a very closed society still was rapidly disseminated using computers.  “The higher the technology, the higher the freedom. Technology enforces certain solutions: satellite dishes, computers, videos, international telephone lines force pluralism and freedom onto a society.”—Lech Walesa  “When machines and computers, profit motives, and property rights are considered more important than people, the giant triplets of racism, materialism, and militarism are incapable of being conquered.” — Rev. Martin Luther King, Jr.

© 2008 Prentice-Hall, Inc.Slide 41 Layered Defenses  Organizations will place sophisticated pattern-recognition software and special hardware on the perimeter of their networks.  Special-purpose hardware, called security processors, will allow every message to be encrypted. The People Problem  This is the weak link in the system. How Open?  Will the onslaught of malware and spam place the openness of the Internet in peril?

© 2008 Prentice-Hall, Inc.Slide 42 Lesson Summary Computers play an ever-increasing role in fighting crime. At the same time, law enforcement organizations are facing an increase in computer crime—crimes accomplished through special knowledge of computer technology. Some computer criminals use computers, modems, and other equipment to steal goods, money, information, software, and services. Because of rising computer crime and other risks, organizations have developed a number of computer security techniques to protect their systems and data.

© 2008 Prentice-Hall, Inc.Slide 43 Lesson Summary (continued) Normally, security measures serve to protect our privacy and other individual rights, but occasionally security procedures threaten those rights. The trade-offs between computer security and freedom raise important legal and ethical questions. Computer systems aren’t just threatened by people, they’re also threatened by software bugs and hardware glitches. An important part of security is protecting systems—and the people affected by those systems—from the consequences of those bugs and glitches.