Presentation is loading. Please wait.

Presentation is loading. Please wait.

Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.

Similar presentations


Presentation on theme: "Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus."— Presentation transcript:

1 Introduction to ITE Chapter 9 Computer Security

2 Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.  Everyone who uses a computer is affected.  This is a huge area for computer technicians.  Security isn’t just anti-virus.  Everyone who uses a computer is affected.

3 Computer Security  Threats can be internal or external.  They involve unauthorized access as well as malicious attacks on hardware or systems.  Threats can be internal or external.  They involve unauthorized access as well as malicious attacks on hardware or systems.

4 Some Types of Threats  Viruses  Are intentionally written to disrupt computers.  Come into the computer via email, IM’s, transferred files and even web pages.  Once on a computer viruses reproduce and attack other files.  Viruses  Are intentionally written to disrupt computers.  Come into the computer via email, IM’s, transferred files and even web pages.  Once on a computer viruses reproduce and attack other files.

5 Some Types of Threats  Worms  Worms are similar to viruses, except they need not attach themselves to files in order to spread.  Worms do not destroy files, but instead consume bandwidth. They slow network operations.  Worms  Worms are similar to viruses, except they need not attach themselves to files in order to spread.  Worms do not destroy files, but instead consume bandwidth. They slow network operations.

6 Some Types of Threats  Trojans  Trojans enter the system as part of software that appears to serve a legitimate purpose.  Trojans can be set up to damage files or send data to an outside computer.  Trojans  Trojans enter the system as part of software that appears to serve a legitimate purpose.  Trojans can be set up to damage files or send data to an outside computer.

7 Some Types of Threats  Adware  Displays advertising on your computer.  You don’t even have to be on- line for the ads to pop-up.  Phishing  Phishing tries to persuade people to provide personal information like social security or bank account numbers.  Adware  Displays advertising on your computer.  You don’t even have to be on- line for the ads to pop-up.  Phishing  Phishing tries to persuade people to provide personal information like social security or bank account numbers.

8 Some Types of Threats  Spyware  Spyware reports your on-line activity to an outside entity.  It may also report personal information it finds on your computer.  Spyware  Spyware reports your on-line activity to an outside entity.  It may also report personal information it finds on your computer.

9 Some Types of Threats  DoS  Denial of Service attacks.  Data is sent to a network computer in such large numbers that the machine is effectively shut down.  DDoS  Distributed Denial of Service attacks.  Use additional computers called “Zombies” to assist in the attack.  DoS  Denial of Service attacks.  Data is sent to a network computer in such large numbers that the machine is effectively shut down.  DDoS  Distributed Denial of Service attacks.  Use additional computers called “Zombies” to assist in the attack.

10 More DoS types  Ping of death  Email bomb  So many emails sent at once that the server becomes overwhelmed.  Ping of death  Email bomb  So many emails sent at once that the server becomes overwhelmed.

11 Other Problems  Spam  Junk emails  Spam filters can remove many of these.  Social Engineering  Depend upon the stupidity of the user.  SYN attacks  Opens up random ports and ties up hardware  Spam  Junk emails  Spam filters can remove many of these.  Social Engineering  Depend upon the stupidity of the user.  SYN attacks  Opens up random ports and ties up hardware

12 Other Problems  Man-in-the-Middle  Intercepts communications  Replay  Captures keystrokes and sends the data to outside sources.  DNS Poisoning  DNS Servers are altered to redirect traffic to counterfeit sites.  Man-in-the-Middle  Intercepts communications  Replay  Captures keystrokes and sends the data to outside sources.  DNS Poisoning  DNS Servers are altered to redirect traffic to counterfeit sites.

13 Destroying Sensitive Data  Erasing data normally only erases the first letter of the first work of the file name.  There is software that can completely erase a drive or the drive can be physically destroyed.  Erasing data normally only erases the first letter of the first work of the file name.  There is software that can completely erase a drive or the drive can be physically destroyed.

14 Security Levels  Security is an issue on many levels  Physical (Hardware)  File Access  Data protection  Media (Wired or Wireless)  Machines can be hacked anytime they are on an unsecured network  Security is an issue on many levels  Physical (Hardware)  File Access  Data protection  Media (Wired or Wireless)  Machines can be hacked anytime they are on an unsecured network

15 Physical Security  Laptops and hard drives can be stolen for their data.  Sensors similar to those used in stores can be used to track equipment.  Laptops and hard drives can be stolen for their data.  Sensors similar to those used in stores can be used to track equipment.

16 Secured Networks  Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.  Passwords need to be secure. “Nothing in the dictionary” is a common rule.  Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.  Passwords need to be secure. “Nothing in the dictionary” is a common rule.

17 Wireless Networks  Wireless Networks have their own issues.  Wireless networks can be secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.  Wireless Networks have their own issues.  Wireless networks can be secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.

18 OS Updates  New vulnerabilities are constantly being discovered.  OS Updates often patch these security holes.  Anti-spy and anti-virus programs need to be updated often.  New vulnerabilities are constantly being discovered.  OS Updates often patch these security holes.  Anti-spy and anti-virus programs need to be updated often.

19 The troubleshooting process  Section 9.5 outlines the troubleshooting process.  Most of these are simple common-sense approaches.  Please read through them on your own, it’s only a few screens.  Section 9.5 outlines the troubleshooting process.  Most of these are simple common-sense approaches.  Please read through them on your own, it’s only a few screens.


Download ppt "Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus."

Similar presentations


Ads by Google