Computer Security By Duncan Hall.

Slides:



Advertisements
Similar presentations
Avoid data leakage, espionage, sabotage and other reputation and business risks without losing employee performance and mobility.
Advertisements

1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Protection from Internet Theft By James Seegars. What Is Hacking? Definition – A)To change or alter(Computer Program) – B) To gain access to (a computer.
Is There a Security Problem in Computing? Network Security / G. Steffen1.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Chapter 1 Introduction to Security
Copyright © 2002 Pearson Education, Inc. Slide 5-1 PERTEMUAN 8.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Lecture 11 Reliability and Security in IT infrastructure.
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Threats to I.T Internet security By Cameron Mundy.
Program Objective Security Basics
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
What does “secure” mean? Protecting Valuables
Section 6 Theory Software Copyright, Viruses and Hacking.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
Security at NCAR David Mitchell February 20th, 2007.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Information Security What is Information Security?
INTERNET SAFETY FOR KIDS
Topic 5: Basic Security.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Chap1: Is there a Security Problem in Computing?.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Computer Skills and Applications Computer Security.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Introduction to Security Dr. John P. Abraham Professor UTPA.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
THE NEED FOR NETWORK SECURITY Hunar & Nawzad & Kovan & Abdulla & Aram.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
By Kyle Bickel.  Securing a host computer is making sure that your computer is secure when it’s connected to the internet  This be done by several protective.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Advanced System Security Dr. Wayne Summers Department of Computer Science Columbus State University
By: Mark Reed.  Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter 40 Internet Security.
Chapter 7. Identifying Assets and Activities to Be Protected
Network Security Fundamentals
Common Methods Used to Commit Computer Crimes
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Teaching Computing to GCSE
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Cybersecurity Awareness
Risk of the Internet At Home
Security Essentials for Small Businesses
Computer Security.
Presentation transcript:

Computer Security By Duncan Hall

Three protections of information When trying to protect information, you must make sure that your solution follows the three guidelines. Confidentiality: Ensures that only authorized parties can view the information and prevents the disclosure to others. Integrity: Ensures the information is correct and has not been tampered with by unauthorized persons or malicious software. Availability: Ensures that data is accessible when needed to authorized users.

Difficulties in defending against attacks Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities Delays in security updating Weak security update distribution Distributed attacks User confusion

What are the different kinds of attackers? Script Kiddies: People that use downloaded automated software. Spies: Someone who breaks in a computer and steals info without leaving a trace. Insiders: When someone from inside the organization attacks the organization. Cyberterrorists: People that usually perform a huge attack on a nations network to cause panic. Hacktivists: These people attack a specific website; usually in retaliation. Government agencies: Nations will often attack each other through the internet.

Some information terms Asset: item that has value. Ex. Employee database Threat: action that has the potential to cause harm. Ex. Data can be stolen. Threat agent: person or element with the power to carry out a threat. Ex. Hacker. Vulnerability: flaw that allows an attacker to bypass security. Ex. Software defect. Exploit: how the vulnerability can be taken advantage of. Ex. Virus sent to unprotected email server. Risk: the likelihood that a threat agent will exploit the vulnerability. Ex. Data will be stolen.

How does an attack work? Attackers will often impersonate people from organizations or employees from your company. To get information Step 1: The threat agent will often check the object he/she is about to attack check for vulnerabilities, trying to find the easiest way in. they will try to avoid the firewalls, and try to bypass them. Step 2: if they can’t find a easy way in they might turn to social engineering by contacting employees or executives for information. (passwords and usernames usually) Step 3: the attacker will then use the information he/she has gathered to exploit the vulnerability. Gaining entry. Step 4: attacker will try to steal data and deal additional damage towards your productivity. Step 5: sometimes the attacker will cover their tracks once they’re done to avoid being caught, making it harder to find them. This is often how social engineering works.

Who is likely to be attacked? CEOs or executives File servers Employees Web site servers Email servers

How can I defend myself against these attacks? No defense is perfect! Using to firewalls to filter out unwanted traffic Complex and long passwords Change passwords regularly Enforcing security using group policy Don’t open or download things from emails of people you don’t know Keep your software up to date Don’t store secure info on mobile devices (or something that can be stolen easily) Encrypt secure info and keep a copy of the encryption key in another location.