Presentation is loading. Please wait.

Presentation is loading. Please wait.

First Look at Security and Privacy Jeremiah Burleson.

Similar presentations


Presentation on theme: "First Look at Security and Privacy Jeremiah Burleson."— Presentation transcript:

1 First Look at Security and Privacy Jeremiah Burleson

2 Terms the Pro’s use Bomb, which causes a program to trigger damage under certain conditions; data diddling, or changing data before or as it enters the system; a denial of service (DoS) attack, in which a site is bombarded with so many requests that legitimate users cannot access it; piggybacking, which is accessing a system via a legitimate user; salami, or embezzling small “slices” of money; scavenging, or searching company trash cans and dumpsters; a trapdoor, which allows subsequent unauthorized entry to a legitimate program; a Trojan horse, which places illegal instructions in the middle of a legitimate program; and zapping, or using software to bypass security systems. These are just some of the words they use in order to break the law and to mess up, steal, or destroy files. Bomb, which causes a program to trigger damage under certain conditions; data diddling, or changing data before or as it enters the system; a denial of service (DoS) attack, in which a site is bombarded with so many requests that legitimate users cannot access it; piggybacking, which is accessing a system via a legitimate user; salami, or embezzling small “slices” of money; scavenging, or searching company trash cans and dumpsters; a trapdoor, which allows subsequent unauthorized entry to a legitimate program; a Trojan horse, which places illegal instructions in the middle of a legitimate program; and zapping, or using software to bypass security systems. These are just some of the words they use in order to break the law and to mess up, steal, or destroy files.

3 Minor Background Information The word hacker originally referred to a person with a very high level of computer expertise, but now the term usually describes a person who gains access to computer systems illegally. Experts prefer the term cracker for persons engaging in illegal activities. Using social engineering, a tongue-in- cheek term for con artist actions, hackers persuade unsuspecting people to give away their passwords over the phone. The word hacker originally referred to a person with a very high level of computer expertise, but now the term usually describes a person who gains access to computer systems illegally. Experts prefer the term cracker for persons engaging in illegal activities. Using social engineering, a tongue-in- cheek term for con artist actions, hackers persuade unsuspecting people to give away their passwords over the phone.

4 White-hat hackers Also known as tiger teams or sometimes “intrusion testers” or “hackers for hire,” are highly trained technical people who are paid to try to break into a computer system before anyone else does. These are used as safeguards to find the glitches inside of companies in order to protect their investments. Many times supervisors will not tell there employees so that they can see if the hacker will get caught. For example, at banks and other places that hackers are in the public at. Also known as tiger teams or sometimes “intrusion testers” or “hackers for hire,” are highly trained technical people who are paid to try to break into a computer system before anyone else does. These are used as safeguards to find the glitches inside of companies in order to protect their investments. Many times supervisors will not tell there employees so that they can see if the hacker will get caught. For example, at banks and other places that hackers are in the public at.

5 Changing of Computer Crimes Credit Card Fraud- Customer numbers are floating all over public networks, in varying states of protection. Some are captured and used fraudulently. Credit Card Fraud- Customer numbers are floating all over public networks, in varying states of protection. Some are captured and used fraudulently. Data Communications Fraud- This category covers a broad spectrum, including piggybacking on some else’s network. Data Communications Fraud- This category covers a broad spectrum, including piggybacking on some else’s network. Unauthorized access to computer files- This general snooping category covers everything from accessing confidential employee records to the theft of trade secrets and product pricing structures. Unauthorized access to computer files- This general snooping category covers everything from accessing confidential employee records to the theft of trade secrets and product pricing structures. Unlawful copying of copyrighted software- Whether the casual sharing of copyrighted software among friends or assembly line copying by organized crime, unlawful copying incurs major losses for software vendors. Unlawful copying of copyrighted software- Whether the casual sharing of copyrighted software among friends or assembly line copying by organized crime, unlawful copying incurs major losses for software vendors.

6 Computer Forensic and Prosecution Computer forensics refers to uncovering computer-stored information suitable for use as evidence in courts of law. Computer forensics refers to uncovering computer-stored information suitable for use as evidence in courts of law. Prosecution of computer crime is often difficult because law enforcement officers, attorneys, and judges are unfamiliar with the issues involved. However, in 1986 Congress passed the latest version of the Computer Fraud and Abuse Act, and most states have passed some form of computer crime law. Prosecution of computer crime is often difficult because law enforcement officers, attorneys, and judges are unfamiliar with the issues involved. However, in 1986 Congress passed the latest version of the Computer Fraud and Abuse Act, and most states have passed some form of computer crime law.

7 Access to Authorized people 1) what you have (a key, badge, or plastic card) 1) what you have (a key, badge, or plastic card) 2) what you know (a system password or identification number) 2) what you know (a system password or identification number) 3) what you do (such as signing your name) 3) what you do (such as signing your name) 4) what you are (your fingerprints, voice, and retina, as known through biometrics, the science of measuring individual body characteristics). An active badge, a clip-on employee identification card with an embedded computer chip, signals its wearer's location by sending out infrared signals, which are read by sensors throughout the building. 4) what you are (your fingerprints, voice, and retina, as known through biometrics, the science of measuring individual body characteristics). An active badge, a clip-on employee identification card with an embedded computer chip, signals its wearer's location by sending out infrared signals, which are read by sensors throughout the building.

8 Extra Websites http://www.ftc.gov/bcp/conline/edcams/in fosecurity/ http://www.ftc.gov/bcp/conline/edcams/in fosecurity/ http://www.ftc.gov/bcp/conline/edcams/in fosecurity/ http://www.ftc.gov/bcp/conline/edcams/in fosecurity/ http://www.panix.com/ http://www.panix.com/ http://www.panix.com/ http://www.ssa.gov/privacy.html http://www.ssa.gov/privacy.html http://www.ssa.gov/privacy.html These sights also can connect you to other helpful sights that you might need to look at. These sights also can connect you to other helpful sights that you might need to look at.


Download ppt "First Look at Security and Privacy Jeremiah Burleson."

Similar presentations


Ads by Google