IST 210 Is “Secure Database” an Oxymoron. IST 210 2 New technology We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

UNIT 20 The ex-hacker.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
What you don’t know CAN hurt you!
Unit 9 Network Fundamentals. Describe a network Explain the benefits of a network Identify risks in computing Describe the roles of clients & servers.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Networking DSC340 Mike Pangburn. Networking: Computers on the Internet  1969 – 4  1971 – 15  1984 – 1000  1987 – 10,000  1989 – 100,000  1992 –
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Information about the computer By Sophia and Christina C.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Threats to I.T Internet security By Cameron Mundy.
Prepared by:-Nirmal Dhruvi
Chapter 4: Computer Networks
Protecting Yourself Online (Information Assurance)
Cyber Crimes.
INFORMATION TECHNOLOGY Personal Electronic Devices Information Technology College of Public and Community Service University of Massachusetts at Boston.
Copyright © 2006, Dr. Carlos Cordeiro and Prof. Dharma P. Agrawal, All rights reserved. 1 Carlos Cordeiro Philips Research North America Briarcliff Manor,
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Scams & Schemes Common Sense Media.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Exploring the Network.
Bluetooth Presented by Venkateshwar R Gotur CMPT
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
Scams and Schemes Essential Question: What is identity theft, and how can you protect yourself from it?
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Wireless Security Tabatha Lakkala Outline 2  Wireless Access Points  Define Wireless Access Points  Hidden and not so hidden dangers  How to protect.
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
Understand how a router works and its purpose
Introduction to Networking. What is a Network? Discuss in groups.
By John Rodriguez COSC 356 SEC April 2015 Wireless Network Attacks.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
The Benefits of Using Virtual Merchant. EMV cards have been extremely popular in recent times and it’s one of the greatest technological advances in recent.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
ICT Unit 4: Network and the effects of using them
Understand how a router works and its purpose
Network and hardware revision
Network fundamentals Unit 10
CompTIA Security+ Study Guide (SY0-401)
IT Security  .
Unit 4 IT Security.
Wireless Network Security
Lesson 2- Protecting Yourself Online
Video: Digital citizenship is defined as the norms of appropriate,
Information Technology Services Education and Awareness Team
The Internet of Unsecure Things
CSCD 330 Network Programming Spring
Understanding Browsers
CSCD 330 Network Programming Spring
Level 2 Diploma Unit 11 IT Security
CSCD 330 Network Programming Spring
Information Technology Services Education and Awareness Team
Lesson 2- Protecting Yourself Online
Wireless Spoofing Attacks on Mobile Devices
Wireless technology Berto Cantu 7/30/2019.
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

IST 210 Is “Secure Database” an Oxymoron

IST New technology We all demand more from our technology Devices’ functions start to converge PDA/Phone/Pager devices Networks are extending a DBMSs functionality This can have unintended, and often negative consequences

IST Bluetooth Becoming pervasive Acura, BMW and Daimler-Chrysler vehicles Nokia, Sony-Ericsson and Motorola cell phones Laptops PDAs The convenience and cool-factor are undeniable Lara Croft in Tomb Raider Wireless modems Wireless GPS modules Headsets and car phone kits

IST Bluejacking or Bluesnarfing There’s a new sport - “Warnibbling” Using “Bluesnarf”, attackers can Download your contact list Your last-dialed number list Use your equipment without your knowledge or consent Wireless Internet access Outgoing phone calls Text messages Bluejacking Anonymous text messages to your phone

IST Wireless LANs A whole new list of problems and threats Wireless LAN attacks War Driving/War Flying (!) War Chalking Other issues Drive-by spamming Drive-by worming Printer abuse VoIP over Theft of data and more

IST Attacking the WLANs War Driving and War Chalking This is a concept that has recently gained much popularity Hackers will “war walk” or “war drive” around an area When they find a WLAN, they will make a chalk mark On a building or a sidewalk This mark gives information about the WLAN found The diagram at right is a wallet card showing some of the symbols and their meanings The objectives? Free Internet access, mostly Corporate or entity LAN hacking, sometimes Stealing service – for example, hijacking someone’s MAC address at Starbucks VoIP eavesdropping

IST Drive-by Spamming New phenomenon Attackers equip a van with a toroidal antenna And a server farm Scout business districts and neighborhoods looking for WLANs Once they find an open network, they connect and look for a mail server Often, attackers dump upwards of 1,000,000 s per day through corporate mail servers Drive-by Worming

IST What kind of security is needed? Layered security approach “Defense in depth” Separation of networks from one another WLAN/Data/VoIP/Control System VLANs Monitoring and management can help Clean up-front design Don’t put all your eggs in one basket

IST Conclusion Cool tech can often lead to uncool problems Opportunity is a matter of perspective Just because I’m paranoid… Be careful with your Bluetooth phone A combination of different methods works best Nothing is 100% effective

IST Security is like a lot of things... It can never be 100% effective. It contributes nothing to the performance. You can never be sure you actually need it at the time. You don’t know whether it has worked until after the event – sometimes long after! The only way to measure its effectiveness is in terms of its failures. A combination of methods gives the greatest reduction in risk. You should never rely on someone else’s precautions - to be certain, you have to take care of it yourself.