Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto.

Slides:



Advertisements
Similar presentations
4 Information Security.
Advertisements

Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Computer Security and Risks 11.  2001 Prentice Hall11.2 Chapter Outline On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy,
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
BUSINESS PLUG-IN B6 Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Lecture 10 Security and Control.
Lecture 10 Security and Control.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Our Digital World Second Edition
Chapter 8 Security and Control.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
10.1 © 2006 by Prentice Hall 10 Chapter Security and Control.
Securing Information Systems
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computer Crime & Security Hackers & Crackers & Worms! Oh my!!
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
Safe computing and Malware Presentation done by Tylor Hardwick, Alex Gilsdorf, Code Forrester, Xander Winans.
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
Kholoud AlSafadi Ethical Issues in Information Systems and the Internet.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
7.1 © 2007 by Prentice Hall 7 Chapter Securing Information Systems.
CHAPTER 4 Information Security. Key Information Security Terms Information Security refers to all of the processes and policies designed to protect an.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
Chapter 12 Computer Security and Risks.  2002 Prentice Hall 2 Topics “Computers are power, and direct contact with power can bring out the best or worst.
Internet Security facilities for secure communication.
Computer Security, Ethics and Privacy Chapter 11.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Security MGMT Summer 2012 Night #4, Lecture Part 2.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Attack and Malicious Code Andrew Anaruk. Security Threats Denial of Service (DoS) Attacks Spoofing Social Engineering Attacks on Encrypted Data Software.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B6 Information Security.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
MIS 7003 MIS Core Course The MBA Program The University of Tulsa Professor: Akhilesh Bajaj Security: Personal & Business © Akhilesh Bajaj 2004,2005, 2007,
Security and Ethics Safeguards and Codes of Conduct.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
CHAPTER 4 Information Security.
Tomorrow’s Technology and You
Securing Information Systems
برنامج أمن أنظمة الحاسب
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Presentation transcript:

Computer Security and Risks

“If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government

Using Quizlet Choosing one word per page and two from some Make approximately 8 to 10 flash cards Invite your friends to your flash cards Learn all the terminology about computer crime using quizlet.com

Computer Crime Computer Forensics cybercrime Cyberstalking Identity theft Social engineering Spoofing Phishing Spammer

Computer Crime Malware Cross platform Viruses Macro Virus Macros 1999 Melisa Virus Cross scripting Virus Worms

Computer Crime Trojan Horse Logic Bomb Time Bomb Spyware Tracking software Spybot Drive by Downloads

Just as natural forests are more resistant to disease than are single- species tree farms, mixed computing environments are less susceptible to crippling attacks than is an organization in which everyone uses the same hardware and software.

Computer Crime Proxy server SSL Audit Trails Antivirus Security patches MS Slammer Hackers Crackers Webjackers Zombie Computers Bots Botnets

Quotes In 2007 a DDOS attack crippled the electronic infrastructure of the republic of Estonia, one of the most wired countries in the world “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)

Computer Crime DOS attacks (Denial of Service) DDOS distributed DOS Mafia Boy Biometrics Smart Card Passwords Access-control software Access privileges

Quotes “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics

Computer Crime Firewalls Encryption Encryption Key Decryption Audit control software Backups Generations RAID Automatically mirror Instant redundancy Off site backup On line backup (Speed Issues)