Download presentation
Presentation is loading. Please wait.
Published byJulianna Newton Modified over 9 years ago
1
Introduction to ITE Chapter 9 Computer Security
2
Why Study Security? This is a huge area for computer technicians. Security isn’t just anti-virus. Everyone who uses a computer is affected. This is a huge area for computer technicians. Security isn’t just anti-virus. Everyone who uses a computer is affected.
3
Computer Security Threats can be internal or external. They involve unauthorized access as well as malicious attacks on hardware or systems. Threats can be internal or external. They involve unauthorized access as well as malicious attacks on hardware or systems.
4
Some Types of Threats Viruses Are intentionally written to disrupt computers. Come into the computer via email, IM’s, transferred files and even web pages. Once on a computer viruses reproduce and attack other files. Viruses Are intentionally written to disrupt computers. Come into the computer via email, IM’s, transferred files and even web pages. Once on a computer viruses reproduce and attack other files.
5
Some Types of Threats Worms Worms are similar to viruses, except they need not attach themselves to files in order to spread. Worms do not destroy files, but instead consume bandwidth. They slow network operations. Worms Worms are similar to viruses, except they need not attach themselves to files in order to spread. Worms do not destroy files, but instead consume bandwidth. They slow network operations.
6
Some Types of Threats Trojans Trojans enter the system as part of software that appears to serve a legitimate purpose. Trojans can be set up to damage files or send data to an outside computer. Trojans Trojans enter the system as part of software that appears to serve a legitimate purpose. Trojans can be set up to damage files or send data to an outside computer.
7
Some Types of Threats Adware Displays advertising on your computer. You don’t even have to be on- line for the ads to pop-up. Phishing Phishing tries to persuade people to provide personal information like social security or bank account numbers. Adware Displays advertising on your computer. You don’t even have to be on- line for the ads to pop-up. Phishing Phishing tries to persuade people to provide personal information like social security or bank account numbers.
8
Some Types of Threats Spyware Spyware reports your on-line activity to an outside entity. It may also report personal information it finds on your computer. Spyware Spyware reports your on-line activity to an outside entity. It may also report personal information it finds on your computer.
9
Some Types of Threats DoS Denial of Service attacks. Data is sent to a network computer in such large numbers that the machine is effectively shut down. DDoS Distributed Denial of Service attacks. Use additional computers called “Zombies” to assist in the attack. DoS Denial of Service attacks. Data is sent to a network computer in such large numbers that the machine is effectively shut down. DDoS Distributed Denial of Service attacks. Use additional computers called “Zombies” to assist in the attack.
10
More DoS types Ping of death Email bomb So many emails sent at once that the server becomes overwhelmed. Ping of death Email bomb So many emails sent at once that the server becomes overwhelmed.
11
Other Problems Spam Junk emails Spam filters can remove many of these. Social Engineering Depend upon the stupidity of the user. SYN attacks Opens up random ports and ties up hardware Spam Junk emails Spam filters can remove many of these. Social Engineering Depend upon the stupidity of the user. SYN attacks Opens up random ports and ties up hardware
12
Other Problems Man-in-the-Middle Intercepts communications Replay Captures keystrokes and sends the data to outside sources. DNS Poisoning DNS Servers are altered to redirect traffic to counterfeit sites. Man-in-the-Middle Intercepts communications Replay Captures keystrokes and sends the data to outside sources. DNS Poisoning DNS Servers are altered to redirect traffic to counterfeit sites.
13
Destroying Sensitive Data Erasing data normally only erases the first letter of the first work of the file name. There is software that can completely erase a drive or the drive can be physically destroyed. Erasing data normally only erases the first letter of the first work of the file name. There is software that can completely erase a drive or the drive can be physically destroyed.
14
Security Levels Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked anytime they are on an unsecured network Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked anytime they are on an unsecured network
15
Physical Security Laptops and hard drives can be stolen for their data. Sensors similar to those used in stores can be used to track equipment. Laptops and hard drives can be stolen for their data. Sensors similar to those used in stores can be used to track equipment.
16
Secured Networks Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network. Passwords need to be secure. “Nothing in the dictionary” is a common rule. Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network. Passwords need to be secure. “Nothing in the dictionary” is a common rule.
17
Wireless Networks Wireless Networks have their own issues. Wireless networks can be secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router. Wireless Networks have their own issues. Wireless networks can be secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.
18
OS Updates New vulnerabilities are constantly being discovered. OS Updates often patch these security holes. Anti-spy and anti-virus programs need to be updated often. New vulnerabilities are constantly being discovered. OS Updates often patch these security holes. Anti-spy and anti-virus programs need to be updated often.
19
The troubleshooting process Section 9.5 outlines the troubleshooting process. Most of these are simple common-sense approaches. Please read through them on your own, it’s only a few screens. Section 9.5 outlines the troubleshooting process. Most of these are simple common-sense approaches. Please read through them on your own, it’s only a few screens.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.