INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Chapter 1: Fundamentals of Security JV Note: Images may not be relevant to information on slide.
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
BUSINESS PLUG-IN B6 Information Security.
Computer Viruses.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
BOTNETS/Cyber Criminals  How do we stop Cyber Criminals.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
the protection of computer systerms and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
BUSINESS B1 Information Security.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Viruses & Destructive Programs
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
C8- Securing Information Systems
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
ITGS Security. Security Authentication Computer security –The process of protecting hardware, software and data from unauthorized access, while allowing.
Topic 5: Basic Security.
Safety and Security issues of using ICT Alys brooks.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Be Safe Online. Agree, Disagree, Maybe if…  Worksheet Activity  Discussion.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
3.6 Fundamentals of cyber security
IT Security  .
Security Risks Malware (Malicious software)
Social Engineering Charniece Craven COSC 316.
Network security threats
Malware, Phishing and Network Policies
Prepared By : Binay Tiwari
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Chapter Goals Discuss the CIA triad
Privacy, Security, and Ethics
Presentation transcript:

INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

WHAT IS SECURITY? All types of security, including the shield of computers, is the process of protecting something from unauthorized users. In the “technology world”, it includes the protection of hardware, software, and data. Everyone should be aware of the potential consequences of security problems!

ARE YOU WHO YOU SAY YOU ARE? Authentication- This is what requires users to prove their identify to a system These techniques can be divided into three different categories. Something you know, something you have, and something you are.

Something you KnowSomething you HaveSomething you Are Passwords and Pins Use more than 12 Characters Change passwords frequently Never write them down A physical object Key Security Tokens (resembles a keychain that the is owned by the owner and easily carried) Biometrics Fingerprints, Iris Patterns, face shape, and voice patterns.

HACKING (CRACKING) Gaining Unauthorized access to computer systems Social Engineering- Involves simply tricking the user into revealing their password or other data. A Password Cracker- a program designed to guess passwords Packet Sniffer- program that captures data as it travels over networks.

VIRUSES Are malicious programs designed to replicate themselves and cause damage to computer systems. Triggered when a user opens the program or attachment. Deleting or overwriting files Wiping the hard disk

WormsTrojan HorsesSpyware Similar to viruses, but spread without any user interaction Instead of spreading on their own, Trojan horses rely on tricking the user into downloading and running them Form of malware which monitor the users activities without their knowledge or permission.

INFILTRATING THE PENTAGON Lost thumb drive found in the parking lot of a US Military base An employee inserted it into a military laptop Leading to the “most significant breach ever of US military computer networks This flash drive was placed in the car park by a foreign intelligence agency, and was infected with Agent.BTZ worm Took over a year to remove the work from compromised systems.

SPAM Unwanted messages that are sent to many users at once Spammers technique is to entice users to opening the s  One Day after Michael Jackson’s death, spam s began to offer information about his death. Impacts of spam are the potential exposure to malware infected attachments, which can have a serious impact on businesses. This can slow down servers, consuming disk space and bandwidth.

PHISHING AND IDENTITY THEFT Phishing is the way hackers attempt to impersonate genuine organizations in order to fool the user into providing sensitive data and passwords. Identity Theft is the stealing of somebody's personal data in order to impersonate them. Both of these actions are used to draw money from victims accounts or commit further crime.

ENCRYPTION Is needed to protect data from unauthorized access when it is sent over an untrusted network, like the internet. They use specific keys to transform a message into a form not understandable until the message is received.

PHYSICAL SECURITY Measures are intended to prevent intruders from gaining access to a computer system Basic physical security includes locks on computer room doors and computer cabinets, as well as alarms and body guards.

WORKS CITED "Information Technology in a Global Society (ITGS) Textbook." ITGS Textbook. N.p., n.d. Web. 08 Oct