What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.

Slides:



Advertisements
Similar presentations
Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Advertisements

POSSIBLE THREATS TO DATA
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Lecturer: Fadwa Tlaelan
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
1 Topic 1 – Lesson 3 Network Attacks Summary. 2 Questions ► Compare passive attacks and active attacks ► How do packet sniffers work? How to mitigate?
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
7.1 Copyright © 2011 Pearson Education, Inc. 7 Chapter Securing Information Systems.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Threats To A Computer Network
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Web server security Dr Jim Briggs WEBP security1.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Risks, Security, and Disaster Recovery
 a crime committed on a computer network, esp. the Internet.
C8- Securing Information Systems
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction of Internet security Sui Wang IS300.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1.2 Security. Computer security is a branch of technology known as information security, it is applied to computers and networks. It is used to protect.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Topic 5: Basic Security.
Malicious Software.
Computer Skills and Applications Computer Security.
Understand Malware LESSON Security Fundamentals.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Risks Computing Science.
Management Information Systems by Prof. Park Kyung-Hye Chapter 14 (15th Week) Risks, Security, and Disaster Recovery 14.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Security Risks Todays Lesson Security Risks Security Precautions
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
IT Security  .
Instructor Materials Chapter 7 Network Security
Chapter 17 Risks, Security and Disaster Recovery
NET 311 Information Security
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
UNIT 18 Data Security 1.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Chapter # 3 COMPUTER AND INTERNET CRIME
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized access, data theft,and defacing of web pages  There has been a surge in denial of service attacks hijacking of computers.

Risks to Information System  Risks to application and data 1.Theft of information 2.Data alteration, data destruction, and defacement 3.Computer viruses and logic bombs 4.No malicious misshapes

Risks to Information System

Risks to Online Operations  Many hackers try daily to interrupt online businesses  Types of attacks include:  Unauthorized access  Data theft  Defacing of Web pages  Denial of service  Hijacking

Risks to online operation  Denial of Service (DoS)  Too many requests are received to log on to a Web site’s pages  If perpetrated from multiple computers it is called distributed denial of service (DDoS)  Spoofing  Deception of users to make them think they are logged on at one site while they actually are on another

Risks to data and applications  theft of data: may be for identity theft, corporate espionage, etc. identity theft: using another person's credentials  social engineering: using human weaknesses to gain access to confidential information  keystroke logging: intercepts keystrokes and either stores them or sends them someplace on the Internet (very useful for stealing usernames, passwords, account information, etc.)  phishing: fraudulent messages (typically s) which lure recipients into going to a fake website to try to get them to enter confidential information  pharming: replacing a real website with an impostor to try to get people to enter confidential information  data alteration: sometimes hard to notice. but can be very damaging

 data destruction: usually very noticeable, and can be alleviated somewhat by having good backup procedures in place  web defacement: basically vandalism, similar to graffiti, but can cost businesses a lot in lost revenue  tarpit: a host on the network designed to expect attacks and respond very slowly, allowing the attacker to not get much done and spend enough time on the machine to be tracked  honey pot: a host on the network designed to lure attackers in so waiting monitors can attempt to track the attacker  honey token: a piece of data which is extremely unlikely to be accessed legitimately, but which an attacker is likely to access; it has special monitoring to immediately alert system administrators when it is accessed with information about where the access request originated

 virus: software designed to spread from one computer to another based on something a user does, such as open a file  worm: software that can spread itself through a network without human intervention  Trojan horse: a malicious program disguised as a potentially helpful or useful program; the program may even appear to be carrying out useful tasks while the malicious part of the code silently carries out its tasks or waits for the right time to spring into action; Trojans are a form of virus  logic bomb: a program where malicious code lies dormant waiting for a specific time or set of conditions to become active and cause damage  DoS (denial of service): prevents the use of online resources; often done by flooding servers with so many requests that the servers can't handle legitimate traffic; can also be done by locking out access to a server or application

 DDoS(distributed denial of service): a DoS attack where many computers are used to send the flood of requests; the attacking computers are usually machines which have been previously attacked and have malicious software waiting for commands from some other machine on the Internet  zombie: a zombie is a machine which has been attacked and has been infected with malicious software which awaits commands to carry out DDoS attacks; the user is usually unaware of the problem  hijacking: taking control of a computer or website without the owners consent; zombies are hijacked computers

 Hijacking: using some or all of a computer’s resources without the consent of its owner  Often done for making a DDoS attack  Done by installing a software boot on the computer  Main purpose of hijacking is usually to send spam  Bots are planted by exploiting security holes in operating systems and communications software  A boot usually installs forwarding software

Denial of Service  Denial of service (DoS): an attacker launches a large number of information requests  Slows down legitimate traffic to site  Distributed denial of service (DDoS): an attacker launches a DoS attack from multiple computers  Usually launched from hijacked personal computers called “zombies”  No definitive cure for this  A site can filter illegitimate traffic

 Risks to ISs include risks to hardware, data, and networks, and natural disaster and vandalism  Risks to data and applications include theft of information, identity theft, data alteration, data destruction, defacement of Web sites, viruses, worms, logic bombs, and no malicious mishaps  Risks to online systems include denial of service and hijacking Summary