Article by Simon Garfinkel Presentation by Adam Miller.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
 Someone who exercises playful ingenuity  Misusers of the internet who try to obtain or corrupt information; people who try to prevent it.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
CHINESE HACKERS. Where do they come from? In 2007 private security firm Mandiant was hired by the New York Times to trace cyber-attacks on their network.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
COMP 2903 A21 – The Evolution of Cyber Warfare Danny Silver JSOCS, Acadia University.
Unit 6: Risk and Avoiding Risk Crystal Clark Christopher Moore Lynsey Saylor.
What Can YOU Do to Help Prevent Healthcare Fraud? Sponsored by: Idaho Commission on Aging Senior Medicare Patrol Program Presented by: (Presenter name,
Internet Privacy Jillian Brinberg, Maggie Kowalski, Sylvia Han, Isabel Smith-Bernstein, Jillian Brinberg.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
China Hacks Pentagon Computers September 3 rd, 2007.
CYBER CRIME AND SECURITY TRENDS
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
Data Storage. Database structure 1 What is a database system? Answer 1 a database is a system for managing a collection of data. Answer 2 data bases are.
Maritime Cyber Risks – What is real, what is fiction?
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
TITLE : E-SAFETY NAME : ABDUL HAFIQ ISKANDAR BIN ROZLAN PROGRAM : SR221 NO.STUDENT :
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
PART THREE E-commerce in Action Norton University E-commerce in Action.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
Cyber crime & Security Prepared by : Rughani Zarana.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
SX1009 & SX1509 Rights in the Digital Society Wendy Moncur / Phil Marston Dept. of Computing Science.
IIA Fraud Presentation (Press Space Bar to Continue)
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Unethical use of Computers and Networks
Criticism Of Google By: Kyle Singler. Privacy Policies One of the main concerns regarding online search is that an individual’s information is kept private.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Name:Neha Madgaonkar Roll no:  What are intruders?  Types  Behavior  Techniques.
Cassidy Culligan Digital Citizenship Project ED 505.
By: Christopher Tait, Leonard Froehlich, Rebecca Mendel, Mitchell Wolfe, Alex Zufelt, and Carmen Presser.
Ethics. Technology  Technology is not an immutable force – people make decisions about what technologies and products to develop and how to use them.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Get Safe Online Expert advice for everyone In association with.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Digital Citizen Project By: Frances Murphey Technology and Education.
Computer crimes.
Can North Korea Build More Nuclear Weapons?. A North Korean People’s Army naval unit tests a new type of anti-ship cruise missile in this undated photo.
INTRODUCTION & QUESTIONS.
Digital Citizenship Laura Assem, Director of Technology.
4 th 9-weeks Review. Government and Economy CE.11 a-d Workforce and Careers CE.10 d CE.12 a-d.
Security Mindset Lesson Introduction Why is cyber security important?
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Broadband Challenges 2017 Christopher Tamarin
Add video notes to lecture
Fundamentals of Information Systems
Protect Your Computer Against Harmful Attacks!
Call AVG Antivirus Support | Fix Your PC
Protecting Your Credit
LO1 - Know about aspects of cyber security
Monetary Policy for a Green New Deal
Presentation transcript:

Article by Simon Garfinkel Presentation by Adam Miller

 The Constitution ◦ There are no laws specifically stating the right to privacy ◦ Amendments imply privacy rights  Third, Fourth, and Fifth Amendments (Restriction of soldiers being quartered in homes, unreasonable search and seizures, and being a witness against yourself, respectively)  The Computer ◦ Consumer data banks  Computers made it easier to store vast amounts of personal data (credit agencies)  Concerns that data would be misused or errors in the data would negatively impact a person’s life without his or her knowledge of the data being kept about them

 Computer (cont.) ◦ Govt. developed Code of Fair Information Practice  Straight forward code; no secret data banks, individuals must be able to view their records, must have a way to correct errors, and data banks must be reliable and secure  The Internet ◦ All activity on the Internet is mediated  Companies could use information stored for financial gain  Federal Trade Commission prevents businesses from using or selling your information by writing “privacy policies”

 Life after 9/11 ◦ Raised the question: Privacy or Security? ◦ Total (Terrorist) Information Awareness  Used advances in technology to attempt to catch terrorists before they attack  Congress shut down organization because it treated everyone as a suspect  Facebook ◦ When using Facebook applications, the user is asked to “Allow access?”  How much information is being pulled by the app?  By agreeing, you are saying you trust the app and Facebook’s security and privacy controls

 Where We Are Now ◦ Data theft by insiders can be solved  Paying employees enough  Auditing their work  Limiting authority  Harshly punishing those who abuse employer’s trust ◦ Answering the question of Security or Privacy  The problem isn’t that the information is out there, it’s that it isn’t secure  Spending now on better security in systems will prevent having to spend a lot more when faulty security is breached

 The Constitution explicitly states your right to privacy. True or False? False Which of these is NOT a way to prevent data theft by insiders? A: Having employees keep data on personal storage devices B: Auditing employee work C: Paying them enough D: Limiting the authority of any one employee Answer: A

 TIDE (Terrorist Identities Datamart Environment  Stores intelligence information (field reports, captured documents, foreign ally news, data about individuals) that government feels could harm US  Exponential Growth (100,000 files in 03; 435,000 now) By Shawn McSweeney

 Half of triggered names in 04 and 05 were misidentified (10 of thousands in total)  Cat Stevens Story  Security Issues

 Roughly how many pieces of data does TIDE currently store? ◦ A. 100,000 ◦ B. 435,000 ◦ C. 755,000 ◦ D. 2.3 Million  A quarter of the triggered watch list names were misidentified.

“People often claim that one of every three large-scale software systems gets canceled mid-project. Of those that do make it out the door, three-quarters are never implemented: some do not work as intended; others are just shelved.” By Stephanie Moore

 Common Mistakes in Software Creation ◦ “Metaphysical Absence” ◦ Unreachable deadlines ◦ Shortages of “can-do” attitudes

 Obtain the correct tools  Keep it simple  Don’t stifle creativity!

 Questions 1. The nonexistence of abstract thought is known as: a. technical confusinon b. metaphysical absence c. daydreaming d. psychological absence Answer: B 2. Setting unreachable goals will motivate employees to give their best efforts. True or False? Answer: False

By Greg Bruno Presentation by: Khaing Oo

 Spring of 2007, Russia  Estonian monument was moved by the Red Army from capital city to the outskirt of town  Bogus Requests-Requests for information from computers around the world  Banks, Media Outlets, and Ministries were hacked  Most publicized hack in recent history

 Most active for hacking computers  Washington accused China of hacking into government computer networks  June 2007-Hacked into Pentagon Network  Suspected of hacking in Britain, France, Germany, South Korea, and Taiwan  Russian and China both denied the accusations.

 William Arkin, Defense Analyst ◦ “Our abilities to penetrate into enemy computer networks, our ability to exploit communication networks, to manipulate digital information, is real.”  U.S. has technologies capable of penetrating and jamming enemy networks

 Request information while masking the location of primary attacker  Use of malware, spyware, and other programs to steal information without user’s knowledge  Cyber attacks aimed at critical infrastructure- less common, but more serious and damaging ◦ Nuclear Power Plant Control Systems ◦ Banks and Subways

 Until recently, U.S. government did not emphasize on safety from cyber attacks  Difficulty in finding the cyber threat  This is getting more serious and more time demanding  U.S. is a big target  Cyber attacks on the U.S. economy may be the worst case  U.S. claimed that their systems are secure and safe

 What country is mostly blame for cyber attacks?  TRUE or FALSE: U.S. have technologies capable of penetrating and jamming enemy networks?

 Article by William J. Astore  Presentation by Raphael Martinez

Full spectrum dominance Air Force stated goal: gain control and access to any and all networked computers Contractor bids: “dominant cyber offensive engagement” Headquarters throughout United States Surveys and propaganda

 Uncertain technical benefits  Inflated prices  SPADOC (ugly baby)-updated computer system  Air Force Mission Support System- Pilots planning missions with latest technology  Out dated and Basic Disaster

 Total Dominance isn’t realistic  Too Expensive  Day late and Billion Dollars short

 The goal of the Air Force is to gain control and access to any and all networked computers. T or F?  True  Air Force computer systems are relatively inexpensive and cost-efficient. T or F?  False