Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security By Duncan Hall.

Similar presentations


Presentation on theme: "Computer Security By Duncan Hall."— Presentation transcript:

1 Computer Security By Duncan Hall

2 Three protections of information
When trying to protect information, you must make sure that your solution follows the three guidelines. Confidentiality: Ensures that only authorized parties can view the information and prevents the disclosure to others. Integrity: Ensures the information is correct and has not been tampered with by unauthorized persons or malicious software. Availability: Ensures that data is accessible when needed to authorized users.

3 Difficulties in defending against attacks
Universally connected devices Increased speed of attacks Greater sophistication of attacks Availability and simplicity of attack tools Faster detection of vulnerabilities Delays in security updating Weak security update distribution Distributed attacks User confusion

4 What are the different kinds of attackers?
Script Kiddies: People that use downloaded automated software. Spies: Someone who breaks in a computer and steals info without leaving a trace. Insiders: When someone from inside the organization attacks the organization. Cyberterrorists: People that usually perform a huge attack on a nations network to cause panic. Hacktivists: These people attack a specific website; usually in retaliation. Government agencies: Nations will often attack each other through the internet.

5 Some information terms
Asset: item that has value. Ex. Employee database Threat: action that has the potential to cause harm. Ex. Data can be stolen. Threat agent: person or element with the power to carry out a threat. Ex. Hacker. Vulnerability: flaw that allows an attacker to bypass security. Ex. Software defect. Exploit: how the vulnerability can be taken advantage of. Ex. Virus sent to unprotected server. Risk: the likelihood that a threat agent will exploit the vulnerability. Ex. Data will be stolen.

6 How does an attack work? Attackers will often impersonate people from organizations or employees from your company. To get information Step 1: The threat agent will often check the object he/she is about to attack check for vulnerabilities, trying to find the easiest way in. they will try to avoid the firewalls, and try to bypass them. Step 2: if they can’t find a easy way in they might turn to social engineering by contacting employees or executives for information. (passwords and usernames usually) Step 3: the attacker will then use the information he/she has gathered to exploit the vulnerability. Gaining entry. Step 4: attacker will try to steal data and deal additional damage towards your productivity. Step 5: sometimes the attacker will cover their tracks once they’re done to avoid being caught, making it harder to find them. This is often how social engineering works.

7 Who is likely to be attacked?
CEOs or executives File servers Employees Web site servers servers

8 How can I defend myself against these attacks?
No defense is perfect! Using to firewalls to filter out unwanted traffic Complex and long passwords Change passwords regularly Enforcing security using group policy Don’t open or download things from s of people you don’t know Keep your software up to date Don’t store secure info on mobile devices (or something that can be stolen easily) Encrypt secure info and keep a copy of the encryption key in another location.


Download ppt "Computer Security By Duncan Hall."

Similar presentations


Ads by Google