CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

A Software Keylogger Attack By Daniel Shapiro. Social Engineering Users follow “spoofed” s to counterfeit sites Users “give up” personal financial.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Mr C Johnston ICT Teacher
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
LittleOrange Internet Security an Endpoint Security Appliance.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Network Security in a Business Setting By: Brian Haumschild.
Securing Information Systems
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Chapter 15: Security (Part 1). The Security Problem Security must consider external environment of the system, and protect the system resources Intruders.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
PROTECTION ON THE INTERNET NADIA SNOW VIRUS Is a file made to do harm or criminal activity there are many types: -worms -Trojan horse -Spyware How they.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
IT Essentials 1 Chapter 9 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
IS Network and Telecommunications Risks Chapter Six.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Cyber Security, Internet, and Wireless Networks Shigang Chen, Associate Professor Dept of Computer & Information Science & Engineering University of Florida.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
What is Spam? d min.
The First Step in Cybersecurity. Past Threats and Incident of Cybersecurity 76 % of organizations polled by CompTIA said they experienced them [a cybersecurity.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
AQA A2 COMP 3: Internet Security. Lesson Aim By the end of the lesson: By the end of the lesson: Describe different security issues and recommend tools/techniques.
Internet Security. 2 Computers on the Internet are almost constantly bombarded with viruses, other malware and other threats.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College.
Return to the PC Security web page Lesson 4: Increasing Web Browser Security.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Activity Diagrams Copyright © 2009 John Wiley & Sons, Inc. Copyright © 2005 Pearson Education Copyright © 2009 Kannan Mohan CIS 4800 Kannan Mohan Department.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Securing Information Systems
Instructor Materials Chapter 7 Network Security
Lecture 5. Security Threats
Business Risks of Insecure Networks
Answer the questions to reveal the blocks and guess the picture.
Securing Information Systems
Zara: Fast Fashion from Savvy Systems
Today’s Risk. Today’s Solutions. Cyber security and
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
Across the world McAfee providing the update protection solutions to the computer users. As same to the error above, wait for few minutes and think some.
ACROSS THE WORLD MCAFEE PROVIDING THE UPDATE PROTECTION SOLUTIONS TO THE COMPUTER USERS. AS SAME TO THE ERROR ABOVE, WAIT FOR FEW MINUTES AND THINK SOME.
Information Security CIS 9002 Kannan Mohan Department of CIS
Network Intrusion Responder Program
Reconnaissance Report Trillium Technologies
Networking for Home and Small Businesses – Chapter 8
Key Issues in Information Systems
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Computer Security (Summary)
Amazon.com CIS 2200 Kannan Mohan Department of CIS
Presentation transcript:

CIS 2200 Kannan Mohan Department of CIS Zicklin School of Business, Baruch College

2 Examine the various security threats posed by IT and solutions that can be used to address these threats

Network Infiltration at TJX Breach at Target Lessons Security as organizational priority Blend of technical and personnel issues 3

Insiders Social engineering Phishing Passwords 5

Viruses Worms Trojans Adware Spyware Keylogger Denial of Service Attacks 6

Firewalls Intrusion detection Updates Encryption 7

(Laudon and Laudon, 2009)