MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

How to protect yourself, your computer, and others on the internet
Victoria ISD Common Sense Media Grade 6: Scams and schemes
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Acceptable Use Policy –The Acceptable Use Policy defines the rules of the machine and internet connection you are on. –Specific policies differ by machine.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Security, Privacy, and Ethics Online Computer Crimes.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Threats To A Computer Network
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
BUSINESS B1 Information Security.
Staying Safe Online Keep your Information Secure.
Scams & Schemes Common Sense Media.
IT security By Tilly Gerlack.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
1 Introduction to Malcode, DoS Attack, Traceback, RFID Security Cliff C. Zou 03/02/06.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
What are they? What do they have to with me?. Introduction  You may not know exactly what it is, but chances are you have encountered one at some point.
Cyber Safety Jamie Salazar.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Securing Information Systems
Unit 3 Section 6.4: Internet Security
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Done by… Hanoof Al-Khaldi Information Assurance
IT Security  .
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

MKTG 476 SECURITY Lars Perner, Instructor 1 Internet Security  Servers  Hacking  Publicly available information  Information storage  Intrusion methods –Phishing –Pharming –Spyware  Viruses  Spam  Identity theft

MKTG 476 SECURITY Lars Perner, Instructor 2 Concerns Shared by Firms and Consumers  Identity theft  Fraudulent use of credit cards or bank accounts  Loss of privacy  Consumer reluctance to shop online due to fears of fraud  Costs of authentication

MKTG 476 SECURITY Lars Perner, Instructor 3 Consumer Privacy Concerns  Large amounts of consumer information can be bought online  Some information is available to the public through government offices—e.g., –Real estate ownership –Vehicle registrations –Licenses (driver’s /professional) –Personal records—e.g.,  Marriage divorce  Certain tax liens  Certain criminal records  Bankruptcies  Information inadvertently posted online  Information posted without consent of customer –E.g., employment records –E.g., membership directories

MKTG 476 SECURITY Lars Perner, Instructor 4 Consumer Privacy Concerns, Part II  Online services combining information –Information sold by vendors (e.g., unlisted phone numbers of customers; purchase histories) –Aggregation of databases (e.g., combining multiple phone directories and real-estate recordings)  Information that is only supposed to be available when authorized –Credit records –Medical  Some information may be available only to certain kinds of users

MKTG 476 SECURITY Lars Perner, Instructor 5 Online Data Storage  Types of information stored on customers –Login, passwords –Credit card information –Purchase histories –Home addresses –Other personal info  May or may not have resulted from online transactions—databases are often networked for internal firm use

MKTG 476 SECURITY Lars Perner, Instructor 6 “Vulnerable” Information  Social security numbers  Place and date of birth; mother’s maiden name  Home address  Login and passwords  Financial information

MKTG 476 SECURITY Lars Perner, Instructor 7 Data Interception  By employees or others with direct access to information  Cyber thieves may attempt to access information through –Phishing/pharming –Host computer  Log-in through insecure passwords  Hacking –Internet traffic –Local networks—especially wireless with limited or no security

MKTG 476 SECURITY Lars Perner, Instructor 8 Password Vulnerabilities  Disclosure to strangers  Theft of databases  Phishing  Use of obvious passwords –Common words –Personal information—e.g., phone number, address, birthday  Passwords not frequently changed  Password “sniffers”

MKTG 476 SECURITY Lars Perner, Instructor 9 Some Security Measures  Encryption  Tracking of IP address of entry into the computer  Secondary passwords  Consumer chosen icon –In s –At site, once origin IP address is recognized

MKTG 476 SECURITY Lars Perner, Instructor 10 Servers  “Denial of service” –Numerous “requests to identify” are sent to targeted server –The server may slow down or become entirely in accessible –Computers and servers infected through viruses are often targeted –Mostly intended as “vandalism”  Hacking –“Hackers” break into computer systems –Purposes  Taking on challenge/political expression  Vandalism  Stealing information

MKTG 476 SECURITY Lars Perner, Instructor 11 Hacking  Established software has “holes” that are gradually discovered  May be able to “crash” sites and access “core dump” files intended for use by programmers to identify problems  Exploitation of “back doors” left by programmers

MKTG 476 SECURITY Lars Perner, Instructor 12 Phishing  Consumer receives an e- mail asking that he or she log in to take care of account issues  This contains a legitimate-looking hyperlink title but the actual link is to a take site  1% of consumers are estimated to fall for the hoax  The consumer logs into a fake site, providing login, password, and other info

MKTG 476 SECURITY Lars Perner, Instructor 13 Phishing--Remedies  Consumer education  Software safeguards –Warning if the internal link does not match the title  Feasible only when the title features an actual address  filters – programs –Server –Anti-virus software  Quick identification of phishing sites –Cooperation with host –Denial-of-service attacks if needed –Massive entry of fake data  Tracing of logins based from origin of phishing e- mail or site

MKTG 476 SECURITY Lars Perner, Instructor 14 Pharming  The user attempts to go to a legitimate web site address but is redirected –Through hacking of DNS servers (match domain names with numerical IP address) –Through false report of changed server to DNS registrar –Malicious code in “trojan horse” or virus to redirect traffic

MKTG 476 SECURITY Lars Perner, Instructor 15 Viruses  “Malicious code” that attacks a computer to –Cause damage (vandalism) –Serve as spam or denial of service attack server –Transmit data  Spread through –Software (as trojan horse or through infection of legitimate software) – attachments –Online activity

MKTG 476 SECURITY Lars Perner, Instructor 16 Trojan Horses  Legitimate-looking software intended to spread malicious code  User downloads software and once run, malicious code is run with results similar to those of viruses

MKTG 476 SECURITY Lars Perner, Instructor 17 “Spyware”  Software that sends back user information through Internet connection  Legal vs. illegal –Legitimate and authorized by user –Non-malicious intent but not authorized –Malicious  May be spread through program, trojan, or virus

MKTG 476 SECURITY Lars Perner, Instructor 18 Spam  Unsolicited messages  Unsolicited contacts have always happened but telemarketing and bulk mail are more expensive than  Very low response rate but very low cost of distribution  Usually sent by –Unauthorized vendors –Fraudulent persons/vendors

MKTG 476 SECURITY Lars Perner, Instructor 19 Determining When Is Likely to Be Welcome  Individual vs. mall mailing  Established relationship with receiver –Logistical communication –Offering of new services –Promoting services by others  Opt-in policies

MKTG 476 SECURITY Lars Perner, Instructor 20 Spam Remedies  Termination by host – generally sent through SMTP servers located at the Internet Service Provider (ISP) site –Problems  Foreign governments may not cooperate  Spammer may move on to other addresses quickly  Anti-spam programs –Locations  In servers  On the user’s computer  At local server –Problems  Distinguishing legitimate messages from non- legitimate –Imperfect algorithms  Regulatory –Legal limits –Litigation of offenders in reachable jurisdictions