DIYTP 2009. What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
BUSINESS PLUG-IN B6 Information Security.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
THE INFORMATION SECURITY PROBLEM
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Security+ Guide to Network Security Fundamentals
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
presentation topic : cyber crimes and security By ashwini awatare
Computer Hacking Cybercrime (1).
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Securing Information Systems
7.1 © 2007 by Prentice Hall 10 Chapter Securing Information Systems.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Computer Crime and Information Technology Security
Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
BUSINESS B1 Information Security.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
C8- Securing Information Systems
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Topic 5: Basic Security.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chap1: Is there a Security Problem in Computing?.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer crimes.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Information Security: Current Threats Marc Scarborough Information Security Officer
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Securing Information Systems
IT Security  .
Lecture 5. Security Threats
Network security threats
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
The Impact Of ICT “Hacking”
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Securing Information Systems
Security in Networking
Computer Security Elaine Munn Introduction to Computer Security.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Prepared By : Binay Tiwari
Philip Nichilo Vincent Carestia
Introduction to Cybercrime and Security
Security.
Computer Security By: Muhammed Anwar.
Presentation transcript:

DIYTP 2009

What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity  Stalking  Stealing information  Child Pornography

Cybercrime Components  Computers  Cell Phones  PDA’s  Game Consoles

High-Profile Cybercrime- related Cases  TJ Maxx data breach  45 million credit and debit card numbers stolen  Kwame Kilpatrick  Cell phone text messages  BTK Serial Killer  Kevin Mitnick

Computer Security  Confidentiality  Only those authorized to view information  Integrity  Information is correct and hasn’t been altered by unauthorized users or software  Availability  Data is accessible to authorized users

Computer Security Figure 1.0 – CIA Triangle

Computer Security - Threats  Malware  Software that has a malicious purpose  Viruses  Trojan horse  Spyware

Computer Security - Threats  Intrusions  Any attempt to gain unauthorized access to a system  Cracking  Hacking  Social Engineering  War-driving

Computer Security - Threats  Denial-of-Service (DOS)  Prevention of legitimate access to systems  Also Distributed-Denial-of-Service (DDoS)  Different types:  Ping-of-Death  Teardrop  Smurf  SYN

Computer Security - Threats Figure 1.1 – DoS and DDoS Models

Computer Security - Terminology  People  Hackers  White Hat – Good guys. Report hacks/vulnerabilities to appropriate people.  Black Hat – Only interested in personal goals, regardless of impact.  Gray Hat – Somewhere in between.

Computer Security - Terminology  Script Kiddies  Someone that calls themselves a ‘hacker’ but really isn’t  Ethical Hacker  Someone hired to hack a system to find vulnerabilities and report on them.  Also called a ‘sneaker’

Computer Security - Terminology  Security Devices  Firewall  Barrier between network and the outside world.  Proxy server  Sits between users and server. Two main functions are to improve performance and filter requests.  Intrusion Detection Systems (IDS)  Monitors network traffic for suspicious activity.

Computer Security - Terminology  Activities  Phreaking  Breaking into telephone systems (used in conjunction with war-dialing)  Authentication  Determines whether credentials are authorized to access a resource  Auditing  Reviewing logs, records, or procedures for compliance with standards

Computer Security - Careers  Information Security Analyst US National Average Salary Figure 1.2 – Median salary courtesy cbsalary.com

Computer Security - Certifications  Entry-level  Security+ spx spx  CIW Security Analyst  Intermediate  MSCE Security /mcse.aspx#tab3 /mcse.aspx#tab3  Professional  CISSP  SANS

Computer Security - Education  Community-college  Washtenaw Community College  Computer Systems Security gs/programs/degree.php?code=APCSS gs/programs/degree.php?code=APCSS  Computer Forensics gs/programs/degree.php?code=APDRAD gs/programs/degree.php?code=APDRAD

Computer Security - Education  4-Year College  Eastern Michigan University  Information Assurance  Applied  Network  Cryptography  Management 