 Malicious Code  Hacking  Natural Disaster  Theft.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Fundamentals of Networking Discovery 1, Chapter 8 Basic Security.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Viruses & Destructive Programs
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
1.1 System Performance Security Module 1 Version 5.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
8: Basic Security Networking for Home & Small Business.
About Phishing Phishing is a criminal activity using social engineering techniques.criminalsocial engineering Phishers attempt to fraudulently acquire.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
IT Ess I v.4x Chapter 1 Cisco Discovery Semester 1 Chapter 8 JEOPADY Q&A by SMBender, Template by K. Martin.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Information Systems Design and Development Security Risks Computing Science.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
IT Security  .
Instructor Materials Chapter 7 Network Security
Network security threats
CHAPTER 6 – BASIC SECURITY
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Faculty of Science IT Department By Raz Dara MA.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

 Malicious Code  Hacking  Natural Disaster  Theft

 The effect is caused by an agent, with the intention to cause damage.  The agent for malicious code is the writer of the code, or any person who causes its distribution.  There are various kinds of malicious code, include virus, Trojan horse, worm and many others.

 Hacking is a source of threat to security in computer. It is defined as unauthorized access to the computer system by a hacker.  Hackers are persons who learn about the computer system in detail. They write program referred to as hacks.  Hackers may use a modem or cable to hack the targeted computers.

 Computers are also threatened by natural or environmental disaster. Be it at home, stores, offices and also automobiles. Examples of natural and environmental disasters:  Flood  Fire  Earthquakes, storms and tornados  Excessive Heat  Inadequate Power Supply

 Two types of computer theft:  Computer is used to steal money, goods, information and resources.  Stealing of computer, especially notebook and PDAs.

 Once the hacker gains access to the network, four types of threat may arise:  Information theft  Identity theft  Data loss / manipulation  Disruption of service

 Information Theft  Breaking into a computer to obtain confidential information. Information can be used or sold for various purposes. Example: Stealing a organization’s proprietary information, such as research and development information  Identity theft  A form of information theft where personal information is stolen for the purpose of taking over someone’s identity. Using this information an individual can obtain legal documents, apply for credit and make authorized online purchases.

 Data Loss and Manipulation  Breaking into a computer to destroy or after data records. Example of data loss: sending a virus that reformats a computer hard drive. Example of data manipulation: breaking into a records system to change information, such as the price of an item.  Disruption of Service  Preventing legitimate users from accessing services to which they should be entitled.

Security threats from network intruders can come from both internal and external sources.  External Threats - External threats arise from individuals working outside of an organization. They do not have authorized access to the computer systems or network. External attackers work their way into a network mainly from the Internet, wireless links or dialup access servers.  Internal Threats - Internal threats occur when someone has authorized access to the network through a user account or have physical access to the network equipment. The internal attacker knows the internal politics and people. They often know what information is both valuable and vulnerable and how to get to it.

 Common methods of exploiting human weaknesses.  Social Engineering refers to a collection of techniques used to deceive internal users into performing specific actions or revealing confidential information.  Attacker takes advantage of unsuspecting legitimate users to gain access to internal resources and private information, such as bank account numbers or passwords.  Three of the most commonly used techniques in social engineering are: pretexting, phishing, and vishing.

 Pretexting  Target is typically contacted over the telephone. For example, if an attacker knows the target's social security number, they may use that information to gain the trust of their target. The target is then more likely to release further information.  Phishing  They typically contact the target individual (the phishee) via . The phisher might ask for verification of information, such as passwords or usernames in order prevent some terrible consequence from occurring.  Vishing / Phone Phishing  A new form of social engineering that uses Voice over IP (VoIP). With vishing, an unsuspecting user is sent a voice mail instructing them to call a number which appears to be a legitimate telephone-banking service. The call is then intercepted by a thief. Bank account numbers or passwords entered over the phone for verification are then stolen.

VIRUSWORMSTROJAN Characteristic- Replicates itself, and propagated with human intrusion - Replicate itself and propagated without human intrusion - Does not replicate itself. Distributionvia attachments, downloaded files, instant messages or via diskette, CD or USB devices. through or file transfer. by opening an attachment or downloading and running a file from the Internet. Effect to systemviruses can erase or files and applications, crash your system. system hang or slow create a back door into a system allowing hackers to gain access.

 DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended users. DoS attacks can target end user systems, servers, routers, and network links.  In general, DoS attacks seek to:  Flood a system or network with traffic to prevent legitimate network traffic from flowing  Disrupt connections between a client and server to prevent access to a service

Two common DoS attacks are:  SYN (synchronous) Flooding - a flood of packets are sent to a server requesting a client connection. The packets contain invalid source IP addresses. The server becomes occupied trying to respond to these fake requests and therefore cannot respond to legitimate ones.  Ping of death: a packet that is greater in size than the maximum allowed by IP (65,535 bytes) is sent to a device. This can cause the receiving system to crash.

It is designed to saturate and overwhelm network links with useless data. DDoS operates on a much larger scale than DoS attacks. Typically hundreds or thousands of attack points attempt to overwhelm a target simultaneously. The attack points may be unsuspecting computers that have been previously infected by the DDoS code. The systems that are infected with the DDoS code attack the target site when invoked.

A Brute force attack is another type of attack that may result in denial of services. With brute force attacks, a fast computer is used to try to guess passwords or to decipher an encryption code. The attacker tries a large number of possibilities in rapid succession to gain access or crack the code. Brute force attacks can cause a denial of service due to excessive traffic to a specific resource or by locking out user accounts.

 Discuss in group about the topic given below. 1. Spyware ( Group 1 n 2) 2. Tracking Cookies ( Group 3 n 4) 3. Adware ( Group 5 n 6) 4. Pop-Up ( Group 7 n 8) 5. Spam ( Group 9 n 10) *** Present on next class using Power Point

 Not all attacks do damage or prevent legitimate users from having access to resources. Many threats are designed to collect information about users which can be used for advertising, marketing and research purposes. These include Spyware, Tracking Cookies, Adware and Pop-ups. While these may not damage a computer, they invade privacy and can be annoying.

 Is a program that gathers personal information from your computer without your permission or knowledge.  This information is sent to advertisers or others on the Internet and can include passwords and account numbers.  Usually installed unknowingly when downloading a file, installing another program or clicking a popup.  It can slow down a computer and make changes to internal settings creating more vulnerabilities for other threats.  Very difficult to remove.

 Used to record information about an Internet user when they visit websites.  Cookies may be useful or desirable by allowing personalization and other time saving techniques.  Many web sites require that cookies be enabled in order to allow the user to connect.

 Adware is a form of spyware used to collect information about a user based on websites the user visits.  That information is then used for targeted advertising. Adware is commonly installed by a user in exchange for a "free" product.  When a user opens a browser window, Adware can start new browser instances which attempt to advertize products or services based on a user's surfing practices.  The unwanted browser windows can open repeatedly, and can make surfing the Internet very difficult, especially with slow Internet connections.  Adware can be very difficult to uninstall.

 Pop-ups and pop-unders are additional advertising windows that display when visiting a web site.  Unlike Adware, pop-ups and pop-unders are not intended to collect information about the user and are typically associated only with the web- site being visited.  Pop-ups: open in front of the current browser window.  Pop-unders: open behind the current browser window.  They can be annoying and usually advertise products or services that are undesirable.

 Spam is a serious network threat that can overload ISPs, servers and individual end- user systems.  A person or organization responsible for sending spam is called a spammer. Spammers often make use of unsecured servers to forward .  Spammers can use hacking techniques, such as viruses, worms and Trojan horses to take control of home computers. These computers are then used to send spam without the owner's knowledge.  Spam can be sent via or more recently via Instant messaging software.

What is a computer security?  A computer security risk is an event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.  Some breaches to computer security are accidental. Others are planned intrusions.  People who commit or responsible to wrong doing is a perpetrator. Perpetrator also exists in computer system.

 Anti-Virus - Antivirus software is a program that detects viruses in your computer memory, storage media or incoming files. It will identify, prevent and eliminate computer viruses and other malicious software. Examples of antivirus software are McAfee VirusScan, Norton AntiVirus, Trend Micro PC-cillin, and Doctor Solomon.  Anti-Spyware - Anti-spyware software is a program that detects, quarantines and removes spyware to prevent them from getting into your computer. Examples of anti-spyware software are Lavasoft Ad-Aware SE Personal, PC Health Plan, and Malware Scanner.  Data Backup - A data backup is a duplication of a file, program or disk that can be used if the original source is lost, damaged or destroyed.  Cryptography - Cryptography is a process associated with encryption and decryption. Cryptography is used when we want to send secured information  Firewall - A firewall restricts information that comes to your computer from other computers. It gives you more control over the data on your computer and provides a defense against people or programs (including viruses and worms) that try to connect to your computer without invitation.  Human Aspects - (Locked Windows, Locked Cabinets, Locked Grill, Alarm System, Log Book, Implementing user identification, Security Guard)