04.09.2015Prof.P.Bekh, Kiev, Ukraine1 Information security in IT society: humanitarian aspects. Prof. Petro Bekh Taras Shevchenko National University of.

Slides:



Advertisements
Similar presentations
Emerging Threats, RF-ID and eCrime issues. Pascal Chauvaud 28/06/2006.
Advertisements

How to protect yourself, your computer, and others on the internet
Hart District Acceptable Use Policy Acceptable Use Policy.
E-Commerce Security Chapter 5.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Ch.5 It Security, Crime, Compliance, and Continuity
Using Cryptography to Protect Data in Computer Networks: case study Vsevolod Ievgiienko National Taras Shevchenko University of Kiev Faculty of Cybernetics.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
Chapter 10 Privacy and Security McGraw-Hill
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Safe Information By Eli Salazar. The Government The Internet A strategic way to communicate top secret plans. The government used Internet for its safety.
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Disaster Prevention and Recovery. Team Members   Gwenn Cooper   Kristy Short   John knieling   Carissa Vancleave   Matthew Owens.
Applied Cryptography for Network Security
1 Lesson 17 Technology, the Workplace, and Society Computer Concepts BASICS 4 th Edition Wells.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
CYBER CRIME AND SECURITY TRENDS
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Data Security GCSE ICT.
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Using cryptography to protect data in networks. Summary National Taras Shevchenko University of Kiev Ukraine Vsevolod Ievgiienko.
Cyber crime & Security Prepared by : Rughani Zarana.
Computer Legislation The need for computer laws Go to Contents.
Unethical use of Computers and Networks
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Digital Citizenship Created By: Kelli Stinson June 2011.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
A Gift of Fire, 2edChapter 1: Unwrapping the Gift1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Network Security Jiuqin Wang June, 2000 Security & Operating system To protect the system, we must take security measures at two levels: Physical level:
Cryptography and Network Security (CS435) Part One (Introduction)
O PROTECT YOUR RIGHTS.  E-RULE GOVERNING COMMUNICATION AND TECHNOLOGY USE INCLUDING RESPECT FOR OWNERSHIP AND AUTHORSHIP  CYBER CRIME COMPUTER CRIME,
CYBER CRIME AND SECURITY If we can defeat them sitting at home……who needs to fight with tanks and guns!!!! Presented By Lipsita Behera. B.Sc IST, 3 rd.
Digital citizenship By: Cody Quinn.
Why is it important to back up your work/information? If you do not back up your work or information then your data might be lost when your computer clashes.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
4 TH YEAR PARENTS EVENING MOBILE DEVICES Mrs Helen Alexander Head of ICT/Computing.
Welcome Topic : Security.
Internet Dangers Technology Communication Tools E-Literate.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
PCD Objective 2.02 Children’s Safety KEY TERMS. What is a safe, secure environment for children?
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Geographic Information & Society: Some things to think about GEOG 370 Christine Erlien.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
CPT 123 Internet Skills Class Notes Internet Security Session B.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
First week. Catalog Description This course explores basic cultural, social, legal, and ethical issues inherent in the discipline of computing. Students.
 In this unit you will: impact  Assess the impact of TPS on participants.  Identify jobs  Identify jobs that have changed or have been created as a.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
The conflict in Donbas region: challenges, solutions Olga Reznikova, PHd Head of the National Security Research Department The National Institute for Strategic.
Cyber crime and security issues
SECURE NETWORKS Device detects all network within radius Secure networks require SSID Password ENCRYPTION Translated into code Uses a mathematical Key.
Copyright Computer crime and cyber security.
Chapter 1 : Introduction to Computers
Security Of Information Systems
ETHICAL & SOCIAL IMPACT OF INFORMATION SYSTEMS
Five Unethical Uses of Computers
Chapter 1 : Introduction to Computers
Chapter 10: Privacy, Security, and Ethics
INFORMATION SYSTEMS SECURITY and CONTROL
Security of Data  
Presentation transcript:

Prof.P.Bekh, Kiev, Ukraine1 Information security in IT society: humanitarian aspects. Prof. Petro Bekh Taras Shevchenko National University of Kiev

Prof.P.Bekh, Kiev, Ukraine2 IT – vunarability and impact E.g. Terrorist uses of the Internet: Propaganda & publicity; Fundraising (or finance); Information dissemination & sharing information; Underground communication & networking Recruitment & mobilization etc., etc.

Prof.P.Bekh, Kiev, Ukraine3 Consequences of data security violation political –resignation of a government; military –change of the cryptography technique; business – financial damages; personal – loss of job or accommodation

Prof.P.Bekh, Kiev, Ukraine4 Aspects of information security software data protection safety of data storage

Prof.P.Bekh, Kiev, Ukraine5 Information stored in a digital form list of top secrete agents financial transactions blood and cell analyses holographic copies of masterpieces

Prof.P.Bekh, Kiev, Ukraine6 Software methods of data protection the faster computers - the more sophisticated methods none of the codes could be cracked mathematically

Prof.P.Bekh, Kiev, Ukraine7 Destruction danger physical destruction is much more easier than decoding destruction has greater political effects weapon of terrorists

Prof.P.Bekh, Kiev, Ukraine8 Ways of solution compression algorithms firewalls antivirus programs dubbing technique read-only storages

Prof.P.Bekh, Kiev, Ukraine9 What should we store carefully commercial data political and official texts (documents, laws, agreements etc.) numerical tables manuscripts soniferous sources (songs, symphonies, etc.) paintings

Prof.P.Bekh, Kiev, Ukraine10 Sources of danger Crime Terrorism Fires, Floods, hurricane (like latest Katrina), earthquakes, etc.

Prof.P.Bekh, Kiev, Ukraine11 What the civilized world should do develop mathematical/software methods digitize masterpieces use copies instead of originals implement reliable storage techniques organize safe depositories