Internet Security: Les Smee Georgia Tech Research Institute.

Slides:



Advertisements
Similar presentations
Presented by: Blue Green Systems. Inspiration Why people buy/sell online  Convenience  Better Prices  Variety  Fewer Expenses  Comparison of Prices.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Implications and Security Issues of the Internet By Neelesh Patel.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Information Systems Ethics, Computer Crime, and Security
Netiquette Rules.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Internet Safety Basics Never share names, schools, ages, phone numbers, or addresses. Never open an from a stranger – it may contain viruses that.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Chapter 9 Information Systems Ethics, Computer Crime, and Security
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
1 Computer Security: Protect your PC and Protect Yourself.
Security Advice Georgie Pepper Campsmount Acadamy.
Internet Security In the 21st Century Presented by Daniel Mills.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
GTRI_B-1 filename - 1 Personal Computer Safety Les Smee Georgia Tech Research Institute.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CHC DI Group. What We Will Cover Securing your devices and computers. Passwords. s. Safe browsing for shopping and online banks. Social media.
© 2006 Consumer Jungle Minimizing Online Risks. © 2006 Consumer Jungle 15 Steps to Minimizing Online Risks 1.Update your operating system 2.Use a firewall.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Learning In A Techno World How Safe is Your Cyberspace?
Spyware Sue Scott Technology Librarian. What is Spyware Malware – (Malicious Software) A general term to encompass unwanted software on a personal computer.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
The Internet Netiquette and Dangers. Outline Netiquette Dangers of the Internet.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Staying Safe Online Aberdeen Grammar School. Things to do online Keep in touch with friends and family using , twitter and social networking sites.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Types of Electronic Infection
Safer Online Shopping and Practices Presenter: Brian Moats Students Active In Leadership.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Internet Security and Your Computer Welcome to Boot Camp.
Internet Safety Internet Safety LPM
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Cyber Safety Jamie Salazar.
Society & Computers PowerPoint
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Any criminal action perpetrated primarily through the use of a computer.
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
By: Jasmin Smith  ability to control what information one reveals about one’s self over the Internet.
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
STOP. THINK. CONNECT. Online Safety Quiz. Round 1: Safety and Security.
Smart, Safe, and Secure Online Spam commercial messages that you didn’t ask for (a company trying to sell things by sending out thousands of messages at.
Copyright © 2008 AusCERT 1 Practical Computer Security See the notes section throughout the slide presentation for additional information.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Todays’ Agenda Private vs. Personal Information Take out your notebook and copy the following information. Private information – information that can be.
Phillip Schneider Information Services Librarian Gail Borden Public Library District Cybersecurity: Keeping Your Computers & Devices Safe.
Presentation transcript:

Internet Security: Les Smee Georgia Tech Research Institute

Famous Hacking Claim to fame: Figured out how to make free phone calls using a plastic prize whistle he found in a cereal box. Cap'n Crunch introduced generations of hackers to the glorious concept of phone "phreaking." John Draper Handle: Cap'n Crunch

Famous Hacking Robert Morris Handle: rtm Claim to fame: The son of the chief scientist at the National Computer Security Center part of the National Security Agency (NSA) this Cornell University graduate student introduced the word "hacker" into the vernacular when he accidentally unleashed an Internet worm in Thousands of computers were infected and subsequently crashed.

Famous Hacking Kevin Mitnick Handle: Condor Claim to fame: The first hacker to have his face immortalized on an FBI "Most Wanted" poster. His status as a repeat offender, a teenage hacker who couldn't grow up, earned Mitnick the nickname "The Lost Boy of Cyberspace." Inspired the movie “War Games” by hacking NORAD.

Hacking Methods Viruses: computer programs with the sole purpose of destroying data Boot Infectors Program Infectors

Hacking Methods cont. Worms: Reproducing Virus s itself to entire address book

Hacking Methods cont. Trojans: Appears safe but look out

Hacking Methods cont. Cracking: using a known vulnerability of a running program to gain additional access/privileges to a system

Prevent Hacking Software updates Port Scan Turn off the computer

Antivirus Antivirus software - Norton - McAfee - AVG (Free) Updates (auto) Routine Scans Scan files before use

Firewalls Software (Good) - Norton - ZoneAlarm - McAfee - Sygate Hardware (Better) - Linksys - Dlink Both (Best)

Encryption History  Cryptography  Military use

Encryption cont. Symmetric-key encryption  Must know all computers involved  “Shift by 2” example Public-key encryption  Public key  Private key  PGP

Encryption cont. Public-key on a grand scale  digital certificates  certificate authority  Secure Sockets Layer (SSL) - developed by Netscape

Encryption cont. How it works  128 bit = = 3,402,823,669,209,384,634,633,746,074,300,000,0 00,000,000,000,000,000,000,000,000,000,000  Hashing

Encryption cont. What to look for  Padlock on IE Status Bar 

Wireless Networks WEP Easy to hack Fixed soon?

Cookies Small text file to identify you “doubleclick” Controlling Cookies

IE Security Avoid profiles “Do you trust content from …?” Running scripts (pros and cons)

Spyware Often comes with useful program Weather program, clock sync program Causes pop-ups Gives out information Ad-aware Spybot

Not secure Easy to intercept Auto Running Programs Filters Spam - report

Don’ts Use full name as sender Give out passwords Use primary for posting in public forums Respond to spam unsubscribe address Buy from spammers Include name in address

Passwords No simple words or phrases Longer is better “Remembering” passwords Change regularly Combine letters, numbers, other characters

Network Monitoring Keystroke Virtual Desktop Idle Time (deleted?) 50% Admit to monitoring

Snooping on Kids History (cleared?) “Documents” Check on them Filters

Internet Filtering Block by key word Block by url Products -Net Nanny -CyberPatrol -ISP provided

Filtering Software Differences Customizable filtering Filters other software applications. Blocks chat rooms and forums Prevents sending personal information in Produces activity logs Produces periodic screen shots

Chatting for Kids Never give real name and location Never meet anyone offline Never post publicly Remember people lie Private chat? Monitored chat rooms Use manners

Shopping Online Look for the secure transaction symbol Check for a money back guarantee from the seller and the product's warranty before buying. Use a credit card instead of a bank debit card. On auction sites be sure to check the feedback area about the seller.

Shopping Online cont. When you make a purchase online, get some proof that you did. Try to determine if the company is genuine before ordering. Does it have brick and mortar stores? Does it have a good reputation? You can contact The Better Business Bureau ( and The National Associations Of Attorneys General ( online to investigate a company.

“You have zero privacy anyway” -Scott McNealy (Sun Microsystems)