Download presentation
Presentation is loading. Please wait.
Published byBryan Wilcox Modified over 9 years ago
1
Computer Crime crime accomplished through knowledge or use of computer technology. Computers are tools – we choose how to use / apply the technology.
2
How Much Crime? Indetected Unreported Unprosecuted on the rise
3
Who? insiders / former insiders pranksters / hackers spies & thieves organized crime
4
Theft identity information money equipment software piracy intellectual property theft
5
MalWare malicious software. Trojan Horse - Logic / Time Bomb Virus – self replicates Worm – infects a network Spyware – transmits info
6
Dealing with Viruses 18,000+ viruses – 250 in the wild antivirus software networks – help the spread security patches – plug the holes dependence – increase the impact standardization – increase susceptibility
7
Hackers early hackers vs. today. motivation : curiosity challenge illustrate security weaknesses stealing information webjackers & hacktivism denial of service attacks
8
Security protecting computer systems & the information they contain. unwanted access, damage, modification, or destruction. computers do exactly what they are programmed to do : can be reprogrammed, and you must tell them how to protect themselves.
9
Access Restriction something you : –have : key, badge, card –know : password, id code, combination –do : habits, unique to you –are : biometrics used in combination
10
Passwords not using dictionary words mixed case requiring additional symbols requiring frequent changes
11
Encryption translation info to an unreadable form. protect digital data – computers, electronic commerce, wireless systems, Bluetooth devices, bank machines.
12
Firewalls gateway, entry point. lots of different approaches, filter some traffic. only let appropriate packets / traffic through.
13
Audit-control Software leaving & monitoring electronic footprints watch for suspicious behaviour
14
Protecting Against Failure Backups – multiple generations Surge Protector – power surges UPS – uninterrupted power supply Mirroring data / RAID
15
People are Risky don’t see themselves as a risk. work around security.
16
Reliability when we rely on computers, and something goes wrong, the impact can be significant : Therac 25 Y2K – $100 billion cannot find all of the bugs they harder bugs are to find, the worse they are may be. increased complexity compounds the problem.
17
Security vs. Privacy balancing. examples : –e-mail at work –cell phone with GPS –active badge
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.