Introduction to Information and Computer Science Security Lecture a This material (Comp4_Unit8a) was developed by Oregon Health and Science University,

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Configuring Windows Vista Security Lesson 8. Skills Matrix Technology SkillObjective DomainObjective # Setting Up Users Configure and troubleshoot parental.
Computer Viruses.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Quiz Review.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Hierarchical file system Hierarchical file system - A hierarchical file system is how drives, folders, and files are displayed on an operating system.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 1 This material was developed by Oregon Health & Science University,
Introduction to Information and Computer Science Internet and the World Wide Web Lecture c This material (Comp4_Unit2c) was developed by Oregon Health.
Component 4: Introduction to Information and Computer Science Unit 2: Internet and the World Wide Web.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
®® Microsoft Windows 7 Windows Tutorial 5 Protecting Your Computer.
 a crime committed on a computer network, esp. the Internet.
Technology Standards Review. Where do you click to begin entering the address for the Web site to which you would like to go?
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Lesson 11: Configuring and Maintaining Network Security
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Matt Broman Kodiac Gamble Devin Nichol SECTION 4.2 INFORMATION SECURITY.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 3 This material was developed by Oregon Health & Science University,
Network System Security - Task 2. Russell Johnston.
What they are and how to protect against them
IT Security  .
Instructor Materials Chapter 7 Network Security
Introduction to Computer Science
Answer the questions to reveal the blocks and guess the picture.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Teaching Computing to GCSE
Risk of the Internet At Home
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Presentation transcript:

Introduction to Information and Computer Science Security Lecture a This material (Comp4_Unit8a) was developed by Oregon Health and Science University, funded by the Department of Health and Human Services, Office of the National Coordinator for Health Information Technology under Award Number IU24OC

Security Learning Objectives List and describe common security concerns (Lecture a) Describe safeguards against common security concerns (Lecture b) Describe security concerns for wireless networks and how to address them (Lecture b and c) List security concerns/regulations for health care applications (Lecture c) Describe security safeguards used for health care applications (Lecture c) Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Concerns About Security Loss, stolen, or compromised data Identity theft and impersonation Downtime for businesses –Loss of revenue Blackmail –Threat to disclose medical information Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Common Threats to Security Wikipedia: –“Malware... (malicious software) is... designed to infiltrate a computer system without the owner's informed consent.” (Wikipedia, 2007) Types of malware include: –Trojans –Viruses –Hoaxes –Worms –Phishing –Macro viruses –Hackers Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Trojan Horse Trojan horse―malware program that usually impersonates a known good file installed on system by replacing (deleting) \good file Name comes from Greek Trojan Horse myth The Trojan then does its dirty work on certain date, through user action or on command Trojans can destroy or copy data, install adware, or install browser toolbar Trojans can record keystrokes and send this to attacker and scan computer ports Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Viruses A virus is a computer program that can harm a computer and make it inoperable. Some viruses are only an annoyance. Viruses usually do not replicate (make copies of) themselves on other computers Removing a virus usually cleans computer Sending a virus via may replicate virus In 2008, Fun.exe virus spread itself via throughout the world and was very difficult to remove as it made many copies of itself on an infected computer Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Macro Viruses Macro viruses usually infect Microsoft Office files and install themselves when users click files. A macro is a small program, usually written in VBA (Visual Basic for Applications) Macro viruses spread when users click files in which the macro virus resides Macro viruses may also delete files, etc. on infected system Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Personal Information Attacks Phishing Attempt to trick user into revealing personal information to attacker so they can impersonate user Pronounced like “fishing”; attacker is fishing for information about user User may receive that appears to be from financial institution, eBay, or Amazon, asking for login to verify transaction. Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Personal Information Attacks (continued) Clicking link in brings user to Web site that looks like real Web site No reputable organization will ever ask for this Report attack to organization so they are aware and can act Most software includes ability to monitor for phishing and move suspected to non-functional (junk ) folder Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Worms A worm is a program that works to create lots of network traffic Some worms are not malware as they crawl network searching for reporting information Most worms replicate themselves, making network unusable ILOVEYOU worm successfully attacked millions of computers (users who clicked attachment) in May 2000 Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

False Information Hoaxes Hoaxes usually a harmless attempt to convince user of something that is not true Usually come in form of an Some hoaxes invite user to send money to someone in another part of world or ask for contributions to find missing children Use search engine to determine whether ’s message is true by entering subject line in search engine Result will usually indicate whether is hoax Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

False Information (continued) Uncloak hoax Use trusted Internet sites to detect hoaxes Snopes.com - Urban Legends Online Never forward chains without verifying their source Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

How do Hackers Operate? Packet sniffers can read Internet traffic Wireshark―free protocol analyzer software tool that can display unencrypted network traffic on monitor screen. – Install malware Adware―Continuous ads on screen Spyware―Reports on sites visited Guess at user names and passwords Don’t use easy-to-guess passwords Do change default usernames and passwords (wireless routers) Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

What is Network Security? According to Wikipedia: –“In the field of networking, the specialist area of network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources.” In plain English: –Network security is about rules set up for use of equipment, software, and data and how to follow these rules –Use of assets revolves around authentication, authorization, and providing permissions to network assets. If user can’t prove identity, he or she can’t gain access to network, equipment, or data. Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Authentication User provides valid username and password –Referred to as “credential” Computer authenticates credentials against user account and password database –If user logs in successfully, user is authenticated! If credentials entered match what is in database, user is authenticated –Servers authenticate users using special type of database known as directory –Directory stores information about all users, user groups, computers, printers, and so on Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Authorization Next, authenticated users are authorized Authorization means that computer indicates precisely what user can do: –Print files using specified printers –Access specified network drives –View and/or change documents in folders –Use company Actions are usually recorded for audit Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Permissions (Windows) Authorized objects are associated with permissions –Part of authorizing object is determining permissions Permissions determine what object can or cannot do on computer or network Two types of permissions typically used: –Sharing: Allows one object to connect to or use another object over network –NTFS: Determines what one object can or cannot do to another object Permissions are a complex topic Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Permissions (Windows) Sharing and NTFS permissions work together –User creates folder on his computer so his sister can copy pictures he took –Next, he shares folder and sets his permissions to “read” –Lastly, he sets NTFS permissions to “read” so that she can view and copy pictures –Without this configuration, his sister will not be able to view or copy files from his computer Non-Windows OS protect devices and files similarly Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Permissions Example Right-click folder and select Properties from menu Pictures folder is shared Click Advanced Sharing to configure sharing permissions for this folder (2011, PD-US) Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Permissions Example (continued) Click Security tab to configure NTFS permissions Group or user names are listed in ACL Administrators have Full Control over this folder and its contents –This means that a user who is a member of the Windows Administrator’s group can do anything to this folder and its contents –Anything means view, add new files, delete existing files, change existing files, create new sub- folders, etc (2011, PD-US) Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Security Summary – Lecture a List and describe common security concerns Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a

Security References – Lecture a References Wikipedia. Malware. [Internet] Jun [cited 2011 Nov 07]. Available from: Images Slide 19: Screenshot of a shared folder's properties window. Image source: the creator of this presentation. (2011, PD-US) Slide 20: Screen shot of the folder named Picture properties dialog box. Image source: the creator of this presentation. (2011, PD-US) Health IT Workforce Curriculum Version 3.0/Spring Introduction to Information and Computer Science Security Lecture a