Presentation is loading. Please wait.

Presentation is loading. Please wait.

INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

Similar presentations


Presentation on theme: "INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief."— Presentation transcript:

1 INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

2 WHAT IS SECURITY? All types of security, including the shield of computers, is the process of protecting something from unauthorized users. In the “technology world”, it includes the protection of hardware, software, and data. Everyone should be aware of the potential consequences of security problems!

3

4

5 ARE YOU WHO YOU SAY YOU ARE? Authentication- This is what requires users to prove their identify to a system These techniques can be divided into three different categories. Something you know, something you have, and something you are.

6 Something you KnowSomething you HaveSomething you Are Passwords and Pins Use more than 12 Characters Change passwords frequently Never write them down A physical object Key Security Tokens (resembles a keychain that the is owned by the owner and easily carried) Biometrics Fingerprints, Iris Patterns, face shape, and voice patterns.

7 HACKING (CRACKING) Gaining Unauthorized access to computer systems Social Engineering- Involves simply tricking the user into revealing their password or other data. A Password Cracker- a program designed to guess passwords Packet Sniffer- program that captures data as it travels over networks.

8

9 VIRUSES Are malicious programs designed to replicate themselves and cause damage to computer systems. Triggered when a user opens the program or attachment. Deleting or overwriting files Wiping the hard disk

10 WormsTrojan HorsesSpyware Similar to viruses, but spread without any user interaction Instead of spreading on their own, Trojan horses rely on tricking the user into downloading and running them Form of malware which monitor the users activities without their knowledge or permission.

11 INFILTRATING THE PENTAGON Lost thumb drive found in the parking lot of a US Military base An employee inserted it into a military laptop Leading to the “most significant breach ever of US military computer networks This flash drive was placed in the car park by a foreign intelligence agency, and was infected with Agent.BTZ worm Took over a year to remove the work from compromised systems.

12 SPAM Unwanted messages that are sent to many users at once Spammers technique is to entice users to opening the emails  One Day after Michael Jackson’s death, spam emails began to offer information about his death. Impacts of spam are the potential exposure to malware infected attachments, which can have a serious impact on businesses. This can slow down email servers, consuming disk space and bandwidth.

13 PHISHING AND IDENTITY THEFT Phishing is the way hackers attempt to impersonate genuine organizations in order to fool the user into providing sensitive data and passwords. Identity Theft is the stealing of somebody's personal data in order to impersonate them. Both of these actions are used to draw money from victims accounts or commit further crime.

14 ENCRYPTION Is needed to protect data from unauthorized access when it is sent over an untrusted network, like the internet. They use specific keys to transform a message into a form not understandable until the message is received.

15 PHYSICAL SECURITY Measures are intended to prevent intruders from gaining access to a computer system Basic physical security includes locks on computer room doors and computer cabinets, as well as alarms and body guards.

16 WORKS CITED "Information Technology in a Global Society (ITGS) Textbook." ITGS Textbook. N.p., n.d. Web. 08 Oct. 2015.


Download ppt "INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief."

Similar presentations


Ads by Google