Slides created by Bob Koziel Hagerstown Community College.

Slides:



Advertisements
Similar presentations
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Advertisements

Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 9: Privacy, Crime, and Security
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Computers Are Your Future © 2005 Prentice-Hall, Inc.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
CYBER CRIME AND SECURITY TRENDS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Viruses & Destructive Programs
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computers Are Your Future © 2006 Prentice-Hall, Inc.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Business computer application University of Palestine College of Business Instructor: Mr. Ahmed Abumosameh.
Computers Are Your Future
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
Cyber crime & Security Prepared by : Rughani Zarana.
1 Copyright © 2003 Prentice Hall, IncSlides created by Bob Koziel.
PLUG IT IN 7 Protecting Your Information Assets. 1.How to Protect Your Assets: The Basics 2.Behavioral Actions to Protect Your Information Assets 3.Computer-Based.
 a crime committed on a computer network, esp. the Internet.
CYBER CRIME.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
P ROTECTING D ATA Threats to your privacy and the integrity of your computer’s data come from a number of sources. Understanding how to protect yourself.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Topic 5: Basic Security.
All about viruses, hacking and backups By Harriet Thomas.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Computer Security By Duncan Hall.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Any criminal action perpetrated primarily through the use of a computer.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Issues for Computer Users, Electronic Devices, Computer and Safety.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Computer Security Keeping you and your computer safe in the digital world.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
CSCI-235 Micro-Computer Applications Privacy & Security I.
Technical Implementation: Security Risks
Security Issues in Information Technology
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer Security.
Computer Security.
G061 - Network Security.
Presentation transcript:

Slides created by Bob Koziel Hagerstown Community College

Tips for using the slide show Use MS Power Point XP to view the presentation. Earlier versions will not show the animations correctly. Slides with an icon: Click to view all parts of the slide. Some slides need to be clicked several times. Slides with an icon: Represents an internet link. Clicking on it will take you to the website. Internet connection required. Clicking on the or icon will take you to the previous slide or the next slide Slides with videos or sounds: Click on the picture to view videos or listen to sounds

Computer Crime and Security How attackers and intruders gain entry into computer systems to harm or destroy data Ways you can help system administrators keep computer systems safe from unauthorized users and viruses People who are most likely to attack or harm computer systems and their motives Types of losses caused by computer system intrusions and attacks The tools and techniques used to defend computer systems against intruders and attackers COMPUTERS IN YOUR FUTURE 2003 BRYAN PFAFFENBERGER What You Will Learn Chapter 12

What is the scope of the problem? Computer security risk- Any event, action, or situation that leads to the loss of computer systems or data Computer crime- Actions that violate state or Federal laws Cybercrime- Crimes carried out over the Internet

What are some techniques used to commit computer crimes? Intruders gain unauthorized access to computer systems Techniques used to gain access are:  Password guessing  Shoulder surfing  Packet sniffing  Dumpster diving  Social engineering  Superuser status  SATAN Techniques used by insiders are:  Salami shaving  Data diddling

What are computer viruses? Computer viruses are malicious programs that infect a computer system causing various problems with its use They replicate and attach themselves to programs in the system More than 20,000 different computer viruses

How does a computer get infected? Inserting a disk with an infected program and then starting the program Downloading an infected program from the Internet Being on a network with an infected computer Opening an infected attachment

What are the types of viruses? File infectors Attach themselves to program files Spreads to other programs on the hard drive Most common type of virus Boot sector virus Attach themselves to the beginning of hard drive Executes each time computer is started May lead to destruction of all data Macro virus Infect automatic command capabilities of productivity software Attach themselves to data files in word processing, spreadsheet and database programs Spread when data files are exchanged between users

What are some other types of destructive programs? Time bombs Also called logic bombs Harmless until a certain event or circumstances activate the program Worm Disguises itself as a useful program Contains hidden instructions May erase data or cause other damage Resembles a virus Spreads from one computer to another Controls infected computers Attacks other networked computers Trojan horse

Who creates malicious and damaging computer crimes? Computer hobbyists Try to find weaknesses and loopholes in computer systems Rarely destructive Adhere to hacker’s code of ethics Hackers Crackers Also called black hats Obsessed with entering secure computer systems Rarely destructive Leave calling cards on systems they enter Cyber gangs Brings crackers together by way of the Internet and meetings Virus authors Usually teenage males Want to push the boundaries of antivirus software Can be very damaging

More of who creates malicious and damaging computer crimes? Disgruntled employees Sabotage a company’s computer system Create security holes called trap doors Can divulge trade secrets or destroy data Spies Participate in corporate espionage Some are hackers or former employees 125 countries are involved in industrial espoionage Swindlers Use the Internet to scam money from people Favorite distribution methods are , chat rooms and web sites Types of scams are: Rip & tear, Pumping and dumping and Bogus goods Shills Used on Internet auctions A secret operative who bid’s on a seller’s item to drive up the bid

What is cyberstalking? Newest and fastest growing crime Using the Internet and other electronic media to harass and threaten a person Most perpetrators are men most victims are women Children are at risk from online sexual predators

What’s the cost of computer crime? Staff time- Computer staff stops everything and focuses on the problem Downtime- The system is shutdown unitl it’s safe to operate again Replacing equipment- Company pays when computers and parts are missing due to theft Adverse publicity- Crimes go unreported because of fear of publicity of loss Loss of privacy- Sensitive personal information can end up in the hands of criminals Risk to public safety- Many government agencies rely on computers to maintain public safety Denial of service- Internet service becomes overloaded and doesn’t function

Use programs that have an auto save/auto recovery function Equip system with an uninterruptible power supply; A battery powered device that automatically turns on when power is interrupted Protecting computers from power related problems (surges & outages)

Controlling access Choose authentication passwords that have at least eight letters, mix upper and lower case letters and include numbers Callback systems- Access is granted or denied based on information caller gives Know & have authentication- Users have various ways of accessing a system  Tokens- Electronic device that generates a logon code  Digital certificates- Resemble computer ID cards  Smartcards- Credit card sized device with internal memory  Biometric authentication- Voice recognition, retinal scans, thumbprints and facial recognition

Install a firewall program Programs that are designed to prohibit outside sources from accessing the computer system Personal firewall- Designed to protect home computers from unauthorized access while connected to the Internet

Use encryption Encryption programs make information unreadable if it is stolen Update web browser to use 128-bit encryption for online shopping

Use antivirus programs Called vaccines or virus checkers Uses pattern-matching techniques to examine program files for patterns of virus code Two drawbacks:  They cannot find viruses not in their database  They can not find new viruses that alter themselves to evade detection Use antivirus programs that offer frequent updates and monitor system functions Check disks for viruses that were used on another system

Backup data Backup programs and data regularly Store backups away from the computer system Types of backups:  Full backups- Everything stored on the computer; Backup once a month  Incremental backups- Backup only those files that have changed since last backup: Backup daily or weekly Disaster recovery plan- Large organizations should develop a detailed plan for emergencies

Tips for avoiding scams Do business with established companies Read the fine print Don’t provide financial or personal information to anyone Be skeptical about information received in chat rooms

Tips for preventing cyberstalkers Don’t share personal information in chat rooms Be extremely cautious about meeting anyone you’ve contacted online Contact the police if a situation occurs that makes you feel afraid while online

THE END