Introduction to Security Dr. John P. Abraham Professor UTPA.

Slides:



Advertisements
Similar presentations
OSG Computer Security Plans Irwin Gaines and Don Petravick 17-May-2006.
Advertisements

SECURITY EVALUATION OF AN ORGANIZATION TA Md Morshedul Islam.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Hackers, Crackers, and Network Intruders: Heroes, villains, or delinquents? Tim McLaren Thursday, September 28, 2000 McMaster University.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
HACKER NOT CRACKER. HACKER IS  A person who enjoys exploring the details of programmable systems and how to stretch their capabilities  Most often programmers.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
9-Performing Vulnerability Assessments Dr. John P. Abraham Professor UTPA.
6/2/2015B.Ramamurthy1 Security B.Ramamurthy. 6/2/2015B.Ramamurthy2 Computer Security Collection of tools designed to thwart hackers Became necessary with.
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 1 Introduction to Security.
Chapter 1 Introduction to Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Computer Crime and Information Technology Security
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
BUSINESS B1 Information Security.
What does “secure” mean? Protecting Valuables
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Computer Security, Ethics and Privacy Chapter 11.
Last modified Certificate in Network Security.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Lesson 2 Computer Security Incidents Taxonomy. Need an accepted taxonomy because... Provides a common frame of reference If no taxonomy, then we: Can’t.
Intrusion Detection Reuven, Dan A. Wei, Li Patel, Rinku H.
Topic 5: Basic Security.
Chap1: Is there a Security Problem in Computing?.
Computer Skills and Applications Computer Security.
Security fundamentals Topic 1 Addressing security threats and vulnerabilities.
Computer Security By Duncan Hall.
Introduction to Security Niken D Cahyani Gandeva Bayu Satrya Telkom Institute of Technology Chapter -1.
Security+ Guide to Network Security Fundamentals, Fourth Edition
INTRODUCTION TO COMPUTER & NETWORK SECURITY INSTRUCTOR: DANIA ALOMAR.
1 TMK 264: COMPUTER SECURITY CHAPTER ONE: AN OVERVIEW OF COMPUTER SECURITY.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
1 Figure 1-3: Attack Trends Growing Incident Frequency  Incidents reported to the Computer Emergency Response Team/Coordination Center  1997: 2,134.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Seminar On Ethical Hacking Submitted To: Submitted By:
Computer Security Incidents
3.6 Fundamentals of cyber security
Network Security Fundamentals
Common Methods Used to Commit Computer Crimes
Threats By Dr. Shadi Masadeh.
CS 450/650 Fundamentals of Integrated Computer Security
Security in the Workplace: Information Assurance
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Forensics Week 11.
Security in Networking
Home Internet Vulnerabilities
Computer Security Incidents
Encryption and Hacking
DATA LOSS PREVENTION Mr. Collins Oduor.
Cybersecurity Threat Assessment
Chapter 1 Key Security Terms.
Presentation transcript:

Introduction to Security Dr. John P. Abraham Professor UTPA

Terminology Risk – The likelihood of an asset being stolen. Security – Measures to Prevent theft Vulnerability – Weakness in the security that allows a threat agent to exploit that weakness to get to the asset. Identity theft and cyberterrorism are growing concerns

Attackers – Hackers – Computer savvy persons innocently or purposely, with or without malicious intent gaining access to other peoples computers. – Script kiddies – intention is to create damage. Use already available scripts. – Spies – Someone who is paid to steal information. – Employees – Cybercriminals - organized group, mostly in eastern european countries.

Steps of attacks – Probe for information Type of hardware, software, version, user id, ping, ports scanning – Penetrate defenses – eg guessing passwords – Modify security settings – allowing re-entrance (privilege escalation tools) – Paralyze network and devices – modifying, deleting, copying files, crashing computer, etc.

Defense against attacks Layers of security Limiting access Diverse types of protection for each layer Obscurity (unavailability to the public) of details of a system.