CSCE101 –Chapter 9 – Sections 2 and 3 Thursday, December 7, 2006.

Slides:



Advertisements
Similar presentations
The Challenges of the Digital Age
Advertisements

4 Information Security.
Ethics, Privacy and Information Security
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Information System Audit : © South-Asian Management Technologies Foundation Chapter 4: Information System Audit Requirements.
Information Security EDU IT Security Terms EDU
The Law of Torts Chapter 4. The Corner Cafe Characters: Jamila ………………….Ms. Walton Thai …………………….Jacoy Daniel …………………. Peggy ………………….Kerisha.
Crime and Security in the Networked Economy Part 4.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
Information Security Management Chapter “We Have to Design It for Privacy and Security. ” Tension between Maggie and Ajit regarding terminology.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Ch.5 It Security, Crime, Compliance, and Continuity
Practical Law – Chapter 9 Crimes Against Person. Homicide is the killing of one human being by another. Homicides may be criminal or non-criminal. I.Criminal.
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Introduction to Information Technology, 2nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc Introduction to Information Technology.
Chapter 12 Information Security Management © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Introduction to Computers. Michael R. Izzo
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Information Security Principles and Practices
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Chapter 10: Computer Controls for Organizations and Accounting Information Systems
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Family Readiness Education Hazards in New Mexico David P. O’Brien Ph.D Project Specialist Department of Extension Home Economics
Chapter 3: Types of Cyber Attacks Expand the definition of cyberspace to include: – hardware like computers, printers, scanners, servers and communication.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Chapter Six Laws: Civil vs. Criminal. Criminal & Civil Laws Substantive Laws: laws that define our rights and obligations Procedural Laws: laws that dictate.
Information System Security and Control
FORESEC Academy FORESEC Academy Security Essentials (II)
Made by: Sambit Pulak XI-IB. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence of data.
Information Security Management
C8- Securing Information Systems
Can your team outwit, outplay and outlast your opponents to be the ultimate CyberSurvivor?
Information Security EDU IT Security Terms EDU
 CS 5380 Software Engineering Chapter 11 Dependability and Security.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
Copyright © 2013 Pearson Education, Inc. Publishing as Prentice Hall
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Security and Disaster Recover. Security Objectives Balance between effectiveness and difficulty to use Difficult to intrude Detect intrusion Prevent alteration.
Chapter 12  2000 by Prentice Hall Computer Security Uma Gupta Introduction to Information Systems.
Using Information Technology
Crimes Against the Person Chapter 9. Homicide –The killing of one human being by another –Criminal Homicide –Murder (done with malice) First-degree: premeditated.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Welcome to CJ 110 Professor Brown. Unit 3: Methods of Data Collection In this unit we will address the importance of the origin and integrity of the data.
DATA PROTECTION 2003 THEORY AND PRACTICE OF HANDLING WITH THE COMPUTER CRIME IN THE REPUBLIC OF MACEDONIA Belgrad.
Health Safety and Preparedness.  Identify the resources required to develop and maintain a safe and prepared workplace  Understand the key roles and.
Section 2.1 Crimes and Criminal Justice Section 2.1 Crimes and Criminal Justice A _____ is an act that _______ the ______ of _______, or the _______.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Securing Information Systems
THE CHALLENGES OF THE DIGITAL AGE Society & Information Technology Today 9 Chapter.
IT Security, Crime, Compliance, and Continuity
THREATS IT in HOTEL INDUSTRY Pertemuan 8
Applications of Cryptography
CompTIA Security+ Study Guide (SY0-401)
Understanding the Need for Security Measures
Severe Weather and other Natural Disasters
Chapter 9 E-Commerce Security and Fraud Protection
INFORMATION SYSTEMS SECURITY and CONTROL
Computer System Security
Presentation transcript:

CSCE101 –Chapter 9 – Sections 2 and 3 Thursday, December 7, 2006

Threat vs. Attack It can also be any source of probable impending danger. A threat can be an explicit declaration of intention to inflict punishment or harm on another. A threat can be unintentional or intentional. An attack is an attempt to actively strike at an opponent.

9.2 – Threats to Computers & Communication Systems Errors & Accidents –Human Errors –Software Errors –Hardware Errors –Dirty Data Errors Natural Hazards –Floods, blizzards, hurricanes, tornadoes… Criminal Activity –Theft –Crimes of Malice

9.3 – Security: Safeguarding Computers & Communications Before a threat becomes an attack: Deterrents to computer crime –Enforcing laws –CERT –Detecting anomalous behavior –Identification and access What you have What you know Who you are

9.3 – Security: Safeguarding Computers & Communications Before a threat becomes an attack: Deterrents to computer crime –Encryption During or after an attack: –Audit controls –People controls –Recovery plan Disaster recovery plans

Test Review True/False – 20 Multiple Choice – 20 Short Answer – 15 Extra Credit Short Answer– 2 Short Answer section will come directly from the questions in the study guide.