Download presentation
Presentation is loading. Please wait.
Published byEdwina Lane Modified over 9 years ago
2
Physical Security Logical/Computer Security What other examples?
4
Every two seconds, another American becomes a victim of identity fraud. 30% chance it is a family member or relative Identity Theft Video
7
Video: 1
8
8 Hackers Enjoyed writing complex code Crackers Skilled who uses to obtain unauthorized access Script Kiddies Online tool kits Corporate SpiesUnethical EmployeesCyberextortionists Cyberterrorists White hat (good guys) Black hat (illegal activity) and Grey
9
Who Am I assignment Video 2
10
10
11
Active Content: Java, Java Script, Active X Components. SQL Injections Web Browsers HTML
12
12
13
Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety 13
15
15 http://download.cnet.com/Big-Brother-Keylogger/3000-27064_4- 10663860.html?tag=mncol;6
16
Zombies Video 4: Estonia
17
17 Computer Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control
21
21
22
22
23
23 http://myhistoryweb.blogspot.com/2009/03/10-virus-notepad-script.html http://www.wikihow.com/Create-a-Fake-and-Harmless-Virus-Without-Using- Notepad
24
24 Operating system runs much slower than usual Available memory is less than expected Files become corrupted Screen displays unusual message or image Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.