Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Tiffany Phillips CIS What is a Social Networking Website? Social networking websites function like an online community of internet users. Depending.
4 Information Security.
Definition Is when a child, preteen is tormented, threatened, harassed, humiliated, embarrassed, or otherwise targeted by another child, preteen, or teen.
Breaking Trust On The Internet
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
INTERNET SAFETY FOR STUDENTS
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Course Title: WEB SECURITY Chapter No: 02 “I nternet: S ocial T hreats and S afety ” 1 Maiwand Institute Of Higher Education.
SOCIAL DEVELOPMENT: CYBER BULLYING TEXTING/SOCIAL MEDIA LESSON ONE 8th Grade 1.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Security, Privacy, and Ethics Online Computer Crimes.
Security Awareness: Applying Practical Security in Your World
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Threats and Attacks Principles of Information Security, 2nd Edition
INTERNET SAFETY FOR STUDENTS
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
CYBER SAFETY RACHEL FOULGER & JANELL TOMLINSON. Cyber Bullying Violence In Media Pornography Fraud & Copyright Be Kind On Line.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
By: Sophia Dermouche & Maheen Khalid
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Chapter 11 Security and Privacy: Computers and the Internet.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Digital Citizenship By: Miranda Scorver.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Ashley Chambliss ED 505 Fall 2. “Digital Citizenship is a way for teachers to prepare you for a world full of technology.” (Ribble, ) “A means.
DIGITAL CITIZENSHIP DIGITAL CITIZENSHIP By: Erica Lewis ED 505.
Digital Citizenship Texting vs. Sexting Cyberbullying.
Staying Safe Online Keep your Information Secure.
Online Safety and Awareness. Introductions We are students at UNM We are taking an Information Security course this semester. It is our mission to teach.
By: Brett Sauve. What is Cyber-bullying? Being tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen.
Viruses & Destructive Programs
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
A guide to netiquette, copyright & fair use, plagiarism, internet and computer safety By Briana Horton.
November 10,  Acceptable use  Internet Filtering  Social Web (MySpace, Facebook, etc.)  Cyberbullying  Plagiarism  Phishing.
Have Fun – Stay Safe ‘E Safety’ – ‘Cyber Safe’. What is ‘Cyber Space’? The invisible space that we use to link ourselves to the internet or other people.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Digital Citizenship Project By Allen Naylor Ed 505.
Digital Citizenship. Topics  Netiquette  Copyright and Fair Use  Plagiarism  Safety on the Internet  Safety on your Computer.
Digital Citizenship By: Amanda Thurber. Netiquette on Social Media Sites According to networketiquette.net, netiquette is the social code of the internet.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Cyber Bullying Texting/Instant Messaging Lesson One Social Development 1 8th Grade.
Medway High School Health “Never be bullied into silence. Never allow yourself to be made a victim. Accept no one’s definition of your life, but define.
Online Safety Objective8: Practice safe uses of social networking and electronic communication such as recognizing dangers of online predators and protecting.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Internet has advanced a lot throughout the years. It has changed the way people communicate, work, find knowledge and much more. Work has became easier.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
“Doing the Right thing online” Online Safety. Socializing Communicating Creating Playing Exploring Learning.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
What is the Internet? The large network of millions of computers around the world that are connected to each other through smaller networks. It is a very.
Anti-Bullying Week Take a stand against bullying.
Securing Information Systems
Dove science academy Cyber Club
Cybersecurity Awareness
Risk of the Internet At Home
DOVE SCIENCE ACADEMY CYBER CLUB
How to keep the bad guys out and your data safe
Presentation transcript:

Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos

Department of Mathematics Computer and Information Science2 Outline What is cyber security? Online safety Computer forensics Password protection Malware Steganography Summary Questions

Department of Mathematics Computer and Information Science3 What is cyber security? Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Computer systems are always under constant attack Work to navigate the Internet cautiously and securely

Department of Mathematics Computer and Information Science4 Social media

Department of Mathematics Computer and Information Science5 Online safety Participating in Internet activities in a responsible and safe manner Being aware of where you are online and who has access to personal information Understand that anything placed on the Internet never goes away

Department of Mathematics Computer and Information Science6 Essentials of online safety cont… Threats to online safety – Phishing – Cyber predators – Cyber bullying

Department of Mathematics Computer and Information Science7 Phishing Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity

Department of Mathematics Computer and Information Science8 Cyber predators Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes

Department of Mathematics Computer and Information Science9 Cyber bullying Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet Solution – Inform a trusted adult

Department of Mathematics Computer and Information Science10 Computer forensics Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information Emerged during this time as a method to recover and investigate digital evidence for use in court

Department of Mathematics Computer and Information Science11 Who are the bad guys? Blackhat hacker – An individual with extensive computer knowledge whose purpose is to breach or bypass internet security – Common name for individuals who commit computer crimes Forensic equipment and software are used to protect against attacks

Department of Mathematics Computer and Information Science12 Computer forensics equipment Write Blocker – Devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents

Department of Mathematics Computer and Information Science13 Computer forensics software EnCase – Computer forensics products used to analyze digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations

Department of Mathematics Computer and Information Science14 Malware Software that is intended to damage or disable computers and computer systems Launch attacks without the knowledge of users

Department of Mathematics Computer and Information Science15 Types of Malware Keylogger – Software or hardware that captures keystrokes on a computer Worm – Type of malware that independently copies its self and attacks computer systems Trojan horse – A harmful program that pretends to be something useful and helpful to a user Logic Bomb – Program inserted into software, that triggers when a set of specific conditions occur

Department of Mathematics Computer and Information Science16 Password protection Extremely important to protecting online accounts Should not include very common names (names of pets, people, or simple words in the dictionary)

Department of Mathematics Computer and Information Science17 What happens to simple password? Easier passwords can be attacked Dictionary attacks can be used to guess simple to moderate complexity passwords

Department of Mathematics Computer and Information Science18 Example

Department of Mathematics Computer and Information Science19 How do we protect ourselves? Increase the length and variety of passwords To create a strong password include: – Lowercase and uppercase letters – Numbers – Special characters – Length of seven characters or longer Example – Weak password-rover – Strong password- R043f112$*

Department of Mathematics Computer and Information Science20 Steganography Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient Use for a variety of reasons – Sending messages between friends – U.S. soldiers communicating secretly – Terrorists planning secret attacks on countries

Department of Mathematics Computer and Information Science21 Stego Examples QuickStego WinHip