Date post: | 04-Aug-2015 |
Category: |
Education |
Upload: | nader-alkeinay |
View: | 69 times |
Download: | 1 times |
My Background • Degree in Software engineering from Coventry
university • Master in information system from Coventry
university .• Currently doing my PhD in computer science
specialized in social networks and there privacy at USIM
• CEO and founder for : – IslamTag social network – Zcholar academic network – TenRM Marketplace – GOBIG venture – 2ech Magazin – Postsaler FB marketing
Objective • Explain the different types of computer
crime and the difficulties of discovery and prosecution.
• Describe the aspects of securing corporate data, including software and data security, disaster recovery plans, and security legislation.
• Describe in general terms how viruses work, the damage they can cause, and procedures used to prevent this damage.
• Explain the threats to personal privacy posed by computers and the Internet. Describe actions you can take to maximize your privacy
The Internet “A World of Opportunities”• A way to communicate with friends, family, +
colleagues
• Access to information and entertainment
• A means to learn, meet people, and explore
Security VS Privacy Keep data secure• Destruction• Accidental damage• Theft• Espionage
Keep data private• Salaries• Medical information• Social security
numbers• Bank balances
What they Hack ?• Corporate networks
– Over half largest corporations were invaded
– Competitors?• Government networks
– Dept of Defense attacked more than 200,000 times per year
– Computer attack abilities of other nations?
• Web sites
Viruses/WormsSoftware programs designed to invade your computer, and
copy, damage or delete your data
Trojan HorsesViruses that pretend to be programs that help you while destroying
your data and damaging your computer
SpywareSoftware that secretly watches and records your online activities or send you endless
pop-up ads
Leading Threats to PC Security
Social engineeringCon artist – persuade others to give away their passwords over the phone
Electronic pickpocketsUse computers to transfer or change assets to their advantage
PredatorsThese people use the
Internet to trick children into meeting with them
in person.
File-share AbuseUnauthorized sharing of music, video, and other
files may be illegal, and download
malicious software.
Cyberbullies Both children and adults may use the Internet to
harass or intimidate other people.
Invasion of PrivacyIf kids fill out online forms, they
may share information you don’t want strangers to have about them or your family.
Disturbing Content
If kids explore unsupervised, they could stumble upon
images or information you may not want them exposed to.
Primary Online Risks for Children
www.microsoft.com/protect
SpamUnwanted e-mail,
instant messages, and other online communication
PhishingE-mail sent by online criminals to trick you
into going to fake Web sites and revealing
personal information
Identity TheftA crime where con
artists get your personal information
and access your cash and/or credit
HoaxesE-mail sent by online
criminals to trick you into giving them money
Primary Threats to Personal Online Safety
www.microsoft.com/protect
So…
What You Have• Key• Badge• Token• Plastic card – magnetized strip• Active badge – signals wearer’s
location using infrared signals
So…
What You Are • Biometrics – science of
measuring individual body characteristics
• Fingerprints• Voice pattern• Retina of the eye• Entire face
Help Protect Information
Practice Internet behavior that lowers your risk
Manage your business information carefully
Use technology to reduce nuisances, and raise the alarm when appropriate
Delete Spam without Opening It
• Never reply to spam• Technology can help
you identify spam so you can delete it
• Many Internet providers delete it for you
Use Strong Passwords• Keep passwords
private and create ones that are hard to “crack”
• Never share your passwords with friends or be tricked into giving them away
Install Antivirus Software• Anti-virus software
can detect and destroy computer viruses before they can cause damage
• Just like flu shots, for anti-virus software to be effective, you must keep it up to date
Don’t let it expire
Back up your files regularly
Think before you click
Read website privacy statements
Close pop-ups using red “X”