Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution.

Slides:



Advertisements
Similar presentations
Viruses. Viruses, Trojans, Worms Virus - a program that attaches itself to a host, and copies itself onto new files/disks Macro viruses - small program.
Advertisements

You Oxford University Computing Services Us. OUCS is at 13 Banbury Road.
Chapter 7 Operating Systems and Utility Programs.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
Johnson Logistics Solutions Office of Systems and Information Technology.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Web Servers Security: What You Should Know. The World Wide Web (WWW) is one of the best ways to develop an e-commerce business presence and interact with.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Data Security Issues in IR Eileen Driscoll Institutional Planning and Research Cornell University
Wireless Networking By Brian Bogue. Change Access Password.
Principles of Information Technology
A Computer is a machine that… Receives inputs Processes info. Gives outputs.
Information about the computer By Sophia and Christina C.
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
1 Computer Security: Protect your PC and Protect Yourself.
Connecting To A Remote Computer Via ‘Remote Desktop Web Connection’ Compatible With ‘Most Any’ Computer.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Protecting ICT Systems
1 NTC/TCS Training Dallas 2010 TWO Set-ups Wired and Wireless.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Networks and Hackers Copyright © Texas Education Agency, All rights reserved. 1.
1.1 System Performance Security Module 1 Version 5.
Chapter 3.  Help you understand different types of servers commonly found on a network including: ◦ File Server ◦ Application Server ◦ Mail Server ◦
A Secure Home System By: Metin Tuzmen. User facts Most people do not know how to use a computer. Most people have disbelieves about computers There are.
Computer Viruses.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
Types of Electronic Infection
Operating System. 1. How Operating Systems Work Operating System Functions At the simplest level, an operating system does two things: It manages the.
Computer Defining denial of service, worm, virus and hoax. Examples of negligence or incompetence that leads to crime. CI R M E By: Megan Price.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Networks.
Remote Controller & Presenter Make education more efficiently
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Technology Competency Computer Infestations Mr. Locke.
What is e-safety? It is about measures and best practices for Netizens to guard their personal safety and the security of their networks.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
(and other interesting facts). My Computer is Slow Internet Active Directory Video Issues.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Ten Common Computer Problems That Can Easily Be Fixed By: Sam Merrifield.
 Computer News/Tip  Google Docs  Printer Sharing  Scanning  Faxing  Your Computer Problems.
CONTENTS What is Virus ? Types of computer viruses.
TO WHAT EXTENT DO DIGITAL TECHNOLOGIES INFLUENCE THE PRODUCTION AND RECEPTION OF GRAPHIC DESIGN?
Computer Skills and Applications Computer Security.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Networks. Learning Objectives: By the end of this lesson you should be able to:
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer virus Done: Aaesha Mohammed ID: H
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
To connect to the Internet, you must record the computers’ MAC Address. Follow these instructions. Click on Start Then Run.
LO2 Understand the key components used in networking.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Introduction to Networking. What is a Network? Discuss in groups.
CIW Lesson 8 Part B. Malicious Software application that installs hidden services on systems term for software whose specific intent is to harm computer.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Year 10.
TWO Set-ups Wired and Wireless.
الانترنت والبريد الإلكتروني
Instructor: Mort Anvari
To connect to the Internet, you must record the computers’ MAC Address. Follow these instructions. Click on Start Then Run.
Presentation transcript:

Security Experience (1) When ~ 1998 What – Sun workstations connected to the Internet How – hacker invaded and corrupted our Unix operating systems Solution – Disconnect machines from the internet and reinstall the operating system Vulnerability – connecting computers to the internet

Security Experience (2) When ~ 2002 What – “I love you virus” destroyed a lot of the files on my desktop and related disk drives How – attachment activated when message was opened Solution – filtering programs for Vulnerability – interconnected systems

Security Experience (3) When ~ 2004 What – Contamination of NSF’s computer network How – Virus brought in through external laptops Solution – the NSF screening procedure for security patches and viruses Vulnerability – Wireless network connecting laptops to a resident network

Computer interconnectivity creates vulnerability for security breaches A major “crash” creates incentive to improve security Sources of Vulnerability Experience (1) – interconnection of computers using the internet Experience (2) – interconnection of systems through address books Experience (3) – interconnection of foreign laptops via wireless to a resident network

Issues How to balance security and accessibility of information? Who is responsible for providing security packages for open source software? Will Grid computing as a new interconnection technology create new vulnerabilities for security breaches? What security breach could produce a major crash in Grid computing?