CS 3043 Social Implications Of Computing 10/15/2015© 2009 Keith A. Pray 1 Class 10 Errors, Failures, And Risk Keith A. Pray Instructor socialimps.keithpray.net.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Chapter 1 We’ve Got Problems…. Four Horsemen  … of the electronic apocalypse  Spam --- unsolicited bulk o Over 70% of traffic  Bugs ---
CS 3043 Social Implications Of Computing 5/3/2015© 2008 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
SECURITY CHECK Protecting Your System and Yourself Source:
Crime and Security in the Networked Economy Part 4.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Chapter 9: Privacy, Crime, and Security
Chapter 8 Chapter 8 Digital Defense: Securing Your Data and Privacy
Security, Privacy, and Ethics Online Computer Crimes.
James Tam Computer Security Concepts covered Malicious computer programs Malicious computer use Security measures.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
CS426Fall 2010/Lecture11 Computer Security CS 426 Lecture 1 Overview of the Course.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Assessing the Threat How much money is lost due to cyber crimes? –Estimates range from $100 million to $100s billions –Why the discrepancy? Companies don’t.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
1 Computer Security: Protect your PC and Protect Yourself.
Chapter Nine Maintaining a Computer Part III: Malware.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 4 FREEDOM OF SPEECH.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Information Security. What is Information Security? A. The quality of being secure B. To protect the confidentiality, integrity, and availability of information.
Staying Safe Online Keep your Information Secure.
Seminar On Cellular Virus
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
CS 3043 Social Implications Of Computing © 2010 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
W HAT DOES EXPLOIT MEAN ? A ND THE S ASSER WORM Seminar on Software Engineering, Short Presentation Christian Gruber.
Marketing Management Online marketing
Area Of Study 2 Information And Communications Technology(ICT)
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Computer Security! By Bailey Hoover. Opening: “Computer viruses are an urban legend.” -Peter Norton Actually: Virus: software reproduces itself; causes.
Types of Electronic Infection
CS 3043 Social Implications Of Computing 10/19/2015© 2004 Keith A. Pray 1 Class 9 Intellectual Property Keith A. Pray Instructor socialimps.keithpray.net.
Protecting Your Business! SBA Ft. Lauderdale November 15, 2006 Gregory Levine, Sr. Director Marketing.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
CS 3043 Social Implications Of Computing © 2009 Keith A. Pray Class 3 Professional Ethics Keith A. Pray Instructor socialimps.keithpray.net.
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
CS 3043 Social Implications Of Computing 11/24/2015© 2004 Keith A. Pray 1 Class 12 Risks Keith A. Pray Instructor socialimps.keithpray.net.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS 3043 Social Implications Of Computing Keith A. Pray Instructor socialimps.keithpray.net CLASS 9 ERRORS FAILURES RISKS © 2014 Keith A. Pray.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
INTRODUCTION & QUESTIONS.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
IT Security  .
Seminar On Cellular Virus
Week 7 - Wednesday CS363.
Presentation transcript:

CS 3043 Social Implications Of Computing 10/15/2015© 2009 Keith A. Pray 1 Class 10 Errors, Failures, And Risk Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 2 10/15/2015 Overview 1. Errors, Failures, And Risks 2. Assignment 3. Students Present 4. Brannen Hough – Patriot Missile

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 3 10/15/2015 Overview 1. Errors, Failures, And Risks 2. Assignment 3. Students Present 4. Brannen Hough – Patriot Missile

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 4 10/15/2015 Term Project For your emerging information processing technology :  Be sure you address how likely will that technology be adopted at large in the next year? The next 5? The next 10?  Predict how the technology will effect people and society at large after 1 year. 5 years. 10 years. You could use a timeline to base your predictions. Feel free to update your timeline with new material you find useful. Chapter 7 should be very helpful as well. Paper  Minimum 1 page per subject/chapter in book  1 paper section per subject/chapter  Each Section should follow the same guidelines as our 1 page paper assignments, outside references included.

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 5 10/15/2015 Overview 1. Errors, Failures, And Risks 2. Assignment 3. Students Present 4. Brannen Hough – Patriot Missile

CS 3043 Social Implications Of Computing Cyber Police – Ethan Truong Cyber Crime Categories Case Study: Titan Rain Case Study: Conficker Worm © 2009 Keith A. Pray 6 10/15/2015

CS 3043 Social Implications Of Computing Categories – Ethan Truong Unauthorized access Virus/Worm attack DoS/DDoS Logic bomb Trojan attack Cyberstalking Salami attack Data diddling bombing spoofing Intellectual property crime © 2009 Keith A. Pray 7 10/15/2015

CS 3043 Social Implications Of Computing Case Study: Titan Rain – Ethan Truong Exploited vulnerabilities in several military information systems  Sites included U.S. Army Information Systems Engineering Command at Fort Huachuca, Arizona and Defense Information Systems Agency in Arlington, Virginia (5) The US Department of Defense charged the United States Strategic Command to defend the Global Information Grid © 2009 Keith A. Pray 8 10/15/2015

CS 3043 Social Implications Of Computing Case Study: Conficker Worm – Ethan Truong Infects at least 5 million machines (2)  including The French Navy (3) and UK Ministry of Defense (4) Microsoft offers $250,000 for information leading to Conficker author(s) © 2009 Keith A. Pray 9 10/15/2015

CS 3043 Social Implications Of Computing References – Ethan Truong nlx= fgsouYpSj99UzKMMVJyynQ 2 nlx= fgsouYpSj99UzKMMVJyynQ fighter-planes-grounded-by-computer-virus.html 3 fighter-planes-grounded-by-computer-virus.html © 2009 Keith A. Pray 10 10/15/2015

CS 3043 Social Implications Of Computing Cell Phone Viruses John Sivak Overview What are they? How do I get them? Why should I care? What can I do? © 2009 Keith A. Pray 11 10/15/2015

CS 3043 Social Implications Of Computing What are they? John Sivak Really Trojans Also affects PDAs Can spread through Bluetooth/MMS/online downloads © 2009 Keith A. Pray 12 10/15/2015

CS 3043 Social Implications Of Computing Why should I care? John Sivak Cabir  First cell phone virus  Transmitted via Bluetooth  Mostly Harmless Variants © 2009 Keith A. Pray 13 10/15/2015

CS 3043 Social Implications Of Computing Why should I care? John Sivak Skulls  Disables almost everything Mosquito  Sends text messages without user's knowledge Brador  Has access to everything in your phone © 2009 Keith A. Pray 14 10/15/ © 2009 Keith A. Pray

CS 3043 Social Implications Of Computing John Sivak © 2009 Keith A. Pray 15 10/15/ © 2009 Keith A. Pray

CS 3043 Social Implications Of Computing What can I do? John Sivak © 2009 Keith A. Pray 16 10/15/2015 Take precautions Know what you are downloading Antivirus software

CS 3043 Social Implications Of Computing John Sivak © 2009 Keith A. Pray 17 10/15/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 18 10/15/2015 Risks of Computer Systems Tim Flynn 1. What are we risking? 2. How risks can cause damage 3. How we benefit from taking risks 4. Closure

CS 3043 Social Implications Of Computing What are we risking? Tim Flynn 1. Lives 2. Money 3. Trust © 2009 Keith A. Pray 19 10/15/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 20 10/15/2015 Damage risks can cause Tim Flynn 1. Personal computers 2. Company computer systems 3. Banking systems 1. Bank of America

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 21 10/15/2015 Benefits from taking risks Tim Flynn 1. Education 2. New / Improved technologies

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 22 10/15/2015 Closure Tim Flynn 1. Risks and failures are inevitable 1. But we should still try to avoid risks 2. Are the risks worth the benefits? 3. Questions?

CS 3043 Social Implications Of Computing A look at when Technology bites the dust. © 2009 Keith A. Pray 23 10/15/2015 By: Anton Zalutsky

CS 3043 Social Implications Of Computing Microsoft Vista Vista was designed to increase security of XP. Most people still preferred XP Vista has hardware requirements? Vista ran slower than XP © 2009 Keith A. Pray 24 10/15/2015 Anton Zalutsky

CS 3043 Social Implications Of Computing 1985: Gateway and Dell were both mega billion dollar businesses. 2004: HP and Dell were 75% of the market while Gateway was 25% 2007: Gateway was bought out by Acer for $710 million Never entered Laptop Industry, Diversification into consumer electronics Didn’t do well in selling PC’s to corporations © 2009 Keith A. Pray 25 10/15/2015 Anton Zalutsky

CS 3043 Social Implications Of Computing World’s largest video sharing site Estimated loss of $470 million in 2009 YouTube’s expenses are $711 million © 2009 Keith A. Pray 26 10/15/2015 Anton Zalutsky

CS 3043 Social Implications Of Computing Segway "It will be to the car what the car was to the horse and buggy" –Dean Kamen 2002: Launch of the Segway Failed to price correctly © 2009 Keith A. Pray 27 10/15/2015 Anton Zalutsky

CS 3043 Social Implications Of Computing Learn from your mistakes! Don’t release a product if its not ready! Follow the shifting of Technology! Have a business model! Pricing your product is as important as the idea! © 2009 Keith A. Pray 28 10/15/2015 Anton Zalutsky

CS 3043 Social Implications Of Computing References: cms, Times Article on failures cms world/how-vista-mistakes-guided-changes- windows-development-890, Vista mistakes world/how-vista-mistakes-guided-changes- windows-development Segway All pictures were grabbed from google image search and I don’t take credit for any of them! © 2009 Keith A. Pray 29 10/15/2015

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 30 10/15/2015 Overview 1. Errors, Failures, And Risks 2. Assignment 3. Students Present 4. Brannen Hough – Patriot Missile

CS 3043 Social Implications Of Computing 10/15/2015© 2009 Keith A. Pray 31 Class 10 The End Keith A. Pray Instructor socialimps.keithpray.net

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 32 10/15/2015 Risk What is it? Chance of it happening?  Random, Historical statistics, Analysis Give examples of risks with computer systems

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 33 10/15/2015 Predicting Risk What are the factors? Enough data to be statistically significant? Can you reduce or increase your own risk?  Chance  Severity

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 34 10/15/2015 Reliability Of Statistics Are other factors controlled? Is enough time covered? Is all data reported?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 35 10/15/2015 Cost-Benefit Analysis How much does it cost? What do I get for this cost?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 36 10/15/2015 Risk-Benefit Analysis What could go wrong? How likely is it? How costly are the consequences?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 37 10/15/2015 Limitations to Risk-Benefit Analysis Hard to quantify probabilities Hard to quantify costs Who bears the costs? Are the potential benefits worth it?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 38 10/15/2015 Some Measures Mean Time To Failure (MTTF) Mean Time Between Failures (MTBF) Mean Time To Repair (MTTR)

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 39 10/15/2015 Relying Too Much Limits of modeling reality Limits of precision Limits of algorithms Limits of interpretation

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 40 10/15/2015 Value of Intuition Are results reasonable?

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 41 10/15/2015 Producing Good Software Good specifications Good usability Good design Robustness Good implementation Testing

CS 3043 Social Implications Of Computing © 2009 Keith A. Pray 42 10/15/2015 Plan For The Long Term Version control Future development New platforms Patches Security Training Customer support