SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
POSSIBLE THREATS TO DATA
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Created by: Robert McAndrews Career & Technology Education Humble Independent School District.
Crime and Security in the Networked Economy Part 4.
Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Unit 18 Data Security 1.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Chapter 1- Introduction 1.1 The Birth of Computer Security § Data Security requirements §The Network Criminal §Hackers §Hacker’s Prey §Employee Passwords.
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Data Security GCSE ICT.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
The Office Procedures and Technology
Module 12 Ethics and Security in Computing Some social issues in computing –Division issues, workplace issues, legal issues –protecting children on the.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Defining Security Issues
Module 13: Ethics and Security in computing Some social issues in computing Division issues, workplace issues, legal issues Division issues, workplace.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Understanding and Troubleshooting Your PC. Chapter 12: Maintenance and Troubleshooting Fundamentals2 Chapter Objectives  In this chapter, you will learn:
BUSINESS B1 Information Security.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
First Look at Security and Privacy Jeremiah Burleson.
Computer Crimes Career & Technology Education Department.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
IT in Business Issues in Information Technology Lecture – 13.
Computer security By Isabelle Cooper.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Security and Ethics Safeguards and Codes of Conduct.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
MIS105 Chapter 14 Security and Privacy. Objectives Explain the different types of computer crime and the difficulties of discovery and prosecution Describe.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
Planning and Security Policies
Computers: Tools for an Information Age
G061 - Network Security.
Presentation transcript:

SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10

Computer Crime Stealing and using or selling of data : Company data Personal information in company files

Computer Crime Security and Privacy Keep data secure from: Destruction Damage Theft Espionage Types of data need to secure: Salaries Medical information Social security numbers Bank balances

Computer Crime Supplies for the Hacker PC Communications network Why hack? Harass Show-off Gain access to computer services without paying Obtain information to sell Protest Hackers are individuals who attempt to gain access to computer systems illegally

Computer professionals hired to illicitly gain entry into a system Reveal weak points Protect the points May not alert its own employees of the testing Computer Crime Hackers for Hire

Computer Crime What Systems Have Been Invaded? Corporate networks Over half largest corporations were invaded Competitors? Government networks Dept of Defense attacked more than 200,000 times per year Computer attack abilities of other nations? Web sites

Computer Crime How Can Systems be Easily Compromised? Social engineering Con artist – persuade others to give away their passwords over the phone Electronic pickpockets Use computers to transfer or change assets to their advantage

Computer Crime Frequently Reported Crimes Credit-card fraud Numbers captured and used fraudulently Data communications fraud Piggyback on someone else’s network Office network for personal purposes Computer-directed diversion of funds Unauthorized access to computer files Accessing confidential employee records Theft of trade secrets and product pricing Unlawful copying of copyrighted software Casual sharing of copyrighted software Assembly-line copying

Computer Crimes Bomb Program to trigger damage Scheduled to run at a later date May be found in software for general public, especially shareware Data diddling Changing data before or as it enters the system Denial of service attack (DOS) Hackers bombard a site with more request for service than it can possible handle Prevents legitimate users from accessing the site Appearance of requests coming from many different sites simultaneously

Computer Crimes Piggybacking Original user does not sign off properly Intruder gains accesses to files via the original user id Salami technique Embezzlement Scavenging Search garbage and recycling bins for personal information

Computer Crimes Trapdoor Illicit program left within a completed legitimate program Permits unauthorized and unknown entry to the program Trojan horse Illegal instructions placed inside a legitimate program Program does something useful and destructive at the same time Zapping Software to bypass security systems

Computer Crimes Discovery Difficult Accidental 85% of computer crimes are never reported Prosecution Legal representatives lack technical knowledge to understand the crime

Security Natural disasters Fire Accidents Vandalism Theft Theft or destruction of data Industrial espionage Hackers System of safeguards designed to protect a computer system and data from deliberate or accidental damage

Security Identification and Access Provide access to authorized individuals only Uses one of more of the following systems What you have What you know What you do What you are

Security Identification and Access What You Have Key Badge Token Plastic card – magnetized strip Active badge – signals wearer’s location using infrared signals

Security Identification and Access What You Know Password Identification number Combination

Security Identification and Access What You Do Verify signature – software verifies scanned and online signatures

Security Identification and Access What You Are Biometrics – science of measuring individual body characteristics Fingerprints Voice pattern Retina of the eye Entire face

Security Identification and Access Internal controls Transaction log Auditor checks Who has accessed data during periods when that data is not usually used? Off-the-shelf software to access the validity and accuracy of the system’s operations and output

Security Identification and Access Secured waste Shredders Locked trash barrels Applicant screening Verify the facts on a resume Background checks Built-in software protection Record unauthorized access attempts User profile

Security The Internet Firewall Dedicated computer that governs interaction between internal network and the Internet Encryption Data Encryption Standard (DES)

Disaster Recovery Hardware loss Can be replaced Temporarily diminished processing ability Software loss Industry standard – make backups of program files

Disaster Recovery Data loss Reassemble records Customer information Accounting data Design information Major costs and time

Disaster Recovery Plan Restoring computer processing operations and data files if operations are halted or files are damaged by major destruction

Disaster Recovery Plan Approaches Manual services temporarily Purchase time from a service bureau Mutual aid pack Two or more companies will lend each other computer power Problem if regional disaster

Disaster Recovery Plan Approaches Consortium Joint venture Complete computer system Routinely tested Used only if disaster Sites Hot site – fully equipped and environmentally controlled computer center Cold site – environmentally suitable empty shell

Backup Why Backup? “If you are not backing up your files regularly, you deserve to lose them.” Average user experiences loss once a year

Backup What Can Cause Data Loss? Incorrect software use Input data incorrectly Software may harm data Hard disk malfunctions Accidentally delete files Virus infection

Backup Methods Full backup Differential backup Incremental backup Media Diskette Tape Zip disk CD-R / CR-RW DVD-RAM External hard drive

Pests Invade the computer system and cause something unexpected to occur May interfere with function of PC

Worms Rare Transfers over a network Plants as a separate file on the target’s computer

Viruses Illicit instructions that pass themselves on to other programs Damaging to computer Digital vandalism

Viruses Vaccine or antivirus Stops the spread of and eradicates the virus Install software Download signature files regularly

Viruses Retrovirus Fights the vaccine and may delete the antivirus software Costs Billions of dollars a year Aggravation to individual users

Virus Transmission Networks Diskettes

Virus Getting Infected Executing the virus program Booting from a diskette containing an infected boot sector including accidentally leaving a “non-system disk” in the floppy drive Downloading an infected file and executing it Opening an infected attachment By viewing in some versions of Microsoft Outlook

Virus Precautions Be wary of free software from the Internet or friends Only install programs from diskettes in sealed packages Use virus-scanning software to check any file or document before loading it onto your hard disk