Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
How to protect yourself, your computer, and others on the internet
Primary Threats to Computer Security
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
SECURITY CHECK Protecting Your System and Yourself Source:
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Windows Security Tech Talk 9/25/07. What is a virus?  A computer program designed to self replicate without permission from the end user  The program.
Don’t Lose Your Identity – Protect Yourself from Spyware Dan Frommer Sherry Minton.
Viruses and Spyware. What is a Virus? A virus can be defined as a computer program that can reproduce by changing other programs to include a copy of.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Quiz Review.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Chapter 11 Security and Privacy: Computers and the Internet.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Protecting People and Information: Threats and Safeguards
Online Annoyances Spam – electronic junk mail
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
BUSINESS B1 Information Security.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Computer Security, Ethics and Privacy Chapter 11.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Cyber Security Anchorage School District – 7 th grade Internet Safety.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Computer Skills and Applications Computer Security.
NetTech Solutions Protecting the Computer Lesson 10.
Internet safety By Suman Nazir
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Security and Ethics Safeguards and Codes of Conduct.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Ethical, Safety and other issues when using the Internet Displays a knowledge of networking in terms of user- access Demonstrates responsible.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
G061 - Network Security.
Presentation transcript:

Computer Security and Risks

Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom and Ethics –Security and Reliability

Slide 3 Computer Crime Theft by computer –Money –Goods: phone calls, software piracy, intellectual property, … –Information: company secrets, personal identities, … –Computer resources: virus, DOS attacks, …

Slide 4 Employee Theft Most electronic crimes are committed by disgruntled employees and other insiders. E.G. An employee duplicated an entire library of computerized machining instructions then took a job with a competitor.

Slide 5 Identity Theft Thieves collect personal information –Credit card –Drivers license –SIN, Passport Then use to –Access government services –Buy things

Slide 6 Identity Theft Don’t need a computer –Dumpster diving –Credit card skimming –ATM front-end –People give away information

Slide 7 Identity Theft Phishing Brand spoofing

Slide 8 Phishing

Slide 9 Protecting Yourself Beekman, p. 389

Slide 10 Software Sabotage Risks –Virus –Worm –Trojan horse –Spyware –DOS Attacks Protection

Slide 11 Virus Program code that attaches itself to a program –Operating system or application program When program executes the virus code copies itself to other programs Can destroy data

Slide 12

Slide 13 Virus Macro virus –Attach to documents virus –Attachments

Slide 14 Vaccines Antivirus software –Search for known viruses –Identify them –Remove them

Slide 15 Use Anti-virus Software –Install and update anti-virus software UofC IT anti-virus web page Free software: McAffee –ISP might provide free –Otherwise buy it (McAffee, Norton, …)

Slide 16 Virus Detection ISP mail server (UofC IT and CPSC) –Scans incoming and outgoing messages, notifies user if finds virus (strips attachments), and quarantines the message –Also filters file types:.exe,.com,.scr,.pif,.rar, and.zip –User can recover message from quarantine If you suspect: don’t open the attachment –Scan in program, or save to disk and then scan with virus detection software

Slide 17 Sober Source: Calgary Herald

Slide 18 Virus Detection From: Subject: WARNING - VIRUS (Worm.Sober.U) IN MAIL TO YOU Date: November 25, :20:55 AM MST (CA) My last Friday

*** VIRUS ALERT *** Dear user, This is an automatically generated message from the University of Calgary, Department of Computer Science (CPSC). The CPSC system has detected a piece of with a virus called: Worm.Sober.U in an addressed to you from: The Subject of this was: Mail delivery failed Delivery of the original has been stopped. A copy of the message has been placed under quarantine. Please visit the CPSC Maia Mailguard system located: to view your quarantined messages. You will be required to log into this system using your CPSC address and your CPSC Login Password. For your reference, here are some selected headers from the Date: Fri, 25 Nov :20: (MST) From: (Empty if virus is known to forge sender address) To: Subject: Mail delivery failed Received: dpwtlcd.com (S f1f983b.cg.shawcable.net [ ])

Slide 20 Worm Program that travels independently over computer networks, seeking uninfected sites Replicates and starts up thousands of processes Overloads a system

Slide 21 The Cost of Worms Nimba, Sept. 18, 2001 In 24 h infected 2.2 million computers Microsoft Windows Huge traffic disabled web and servers Damaged system files

Slide 22 Trojan Horse Program that performs a useful task while also being secretly destructive A logic bomb responds to a particular event Cannot replicate E.G. Logon Trojan horse

Slide 23 Denial of Service Attacks Web servers are sent millions of bogus requests Overloads the system Consequently they shut down Service is denied legitimate users

Spyware

Slide 25 Spyware (Adware) –Secretly sends data about our web surfing to a spy –Spy sells data to advertisers –Software unknowingly downloaded with other free software or music –Can result in pop-up ads

Slide 26 New Twist

Slide 27 SONY Source: Calgary Herald

Slide 28 Protection from Spyware Don’t –download free stuff –enter online contests Do –use antispyware software –UofC IT Antispyware PageUofC IT Antispyware Page

Slide 29 Protection from Viruses and Spyware Use anti-virus software –Update frequently Update your operating system –Automatic updates and security patches –MicrosoftMicrosoft –MacintoshMacintosh

Slide 30 Computer Security: Reducing Risks Disaster Planning –backup power –monitoring, alarms –backup of data –redundant sites or hot sites

Slide 31 Computer Security: Reducing Risks Physical Access Restrictions –something you have: key, ID card you know: password, personal information you do: signature, … About you: Biometics

Slide 32 Passwords The most common tool for restricting access to computer systems Weekness –user –sustained guessing program guesses words from online dictionaries

Slide 33 Password Guidelines Don’t use –real words –names –plurals –common expressions –reversal

Slide 34 Passwords Do –mix letters and numbers –change frequently –keep secret

Slide 35 Firewall Objective: to keep internal network secure from the outside It is a hardware device or software through which all traffic must pass Firewall LANWAN

Slide 36 Firewall Always on Internet service is a problem –use a router –see IT website for Firewall informationIT website for Firewall information