Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos
Department of Mathematics Computer and Information Science2 Outline What is cyber security? Online safety Computer forensics Password protection Malware Steganography Summary Questions
Department of Mathematics Computer and Information Science3 What is cyber security? Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack Computer systems are always under constant attack Work to navigate the Internet cautiously and securely
Department of Mathematics Computer and Information Science4 Social media
Department of Mathematics Computer and Information Science5 Online safety Participating in Internet activities in a responsible and safe manner Being aware of where you are online and who has access to personal information Understand that anything placed on the Internet never goes away
Department of Mathematics Computer and Information Science6 Essentials of online safety cont… Threats to online safety – Phishing – Cyber predators – Cyber bullying
Department of Mathematics Computer and Information Science7 Phishing Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity
Department of Mathematics Computer and Information Science8 Cyber predators Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes
Department of Mathematics Computer and Information Science9 Cyber bullying Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet Solution – Inform a trusted adult
Department of Mathematics Computer and Information Science10 Computer forensics Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information Emerged during this time as a method to recover and investigate digital evidence for use in court
Department of Mathematics Computer and Information Science11 Who are the bad guys? Blackhat hacker – An individual with extensive computer knowledge whose purpose is to breach or bypass internet security – Common name for individuals who commit computer crimes Forensic equipment and software are used to protect against attacks
Department of Mathematics Computer and Information Science12 Computer forensics equipment Write Blocker – Devices that allow acquisition of information on a drive without creating the possibility of accidentally damaging the drive contents
Department of Mathematics Computer and Information Science13 Computer forensics software EnCase – Computer forensics products used to analyze digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations
Department of Mathematics Computer and Information Science14 Malware Software that is intended to damage or disable computers and computer systems Launch attacks without the knowledge of users
Department of Mathematics Computer and Information Science15 Types of Malware Keylogger – Software or hardware that captures keystrokes on a computer Worm – Type of malware that independently copies its self and attacks computer systems Trojan horse – A harmful program that pretends to be something useful and helpful to a user Logic Bomb – Program inserted into software, that triggers when a set of specific conditions occur
Department of Mathematics Computer and Information Science16 Password protection Extremely important to protecting online accounts Should not include very common names (names of pets, people, or simple words in the dictionary)
Department of Mathematics Computer and Information Science17 What happens to simple password? Easier passwords can be attacked Dictionary attacks can be used to guess simple to moderate complexity passwords
Department of Mathematics Computer and Information Science18 Example
Department of Mathematics Computer and Information Science19 How do we protect ourselves? Increase the length and variety of passwords To create a strong password include: – Lowercase and uppercase letters – Numbers – Special characters – Length of seven characters or longer Example – Weak password-rover – Strong password- R043f112$*
Department of Mathematics Computer and Information Science20 Steganography Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient Use for a variety of reasons – Sending messages between friends – U.S. soldiers communicating secretly – Terrorists planning secret attacks on countries
Department of Mathematics Computer and Information Science21 Stego Examples QuickStego WinHip