+ All Categories
Home > Documents > Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs...

Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs...

Date post: 27-Dec-2015
Category:
Upload: ernest-young
View: 214 times
Download: 2 times
Share this document with a friend
46
Transcript
Page 1: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.
Page 2: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Outline :IntroductionIntroduction

Network SecurityNetwork Security

Basic Components Of Computer SecurityBasic Components Of Computer Security

Online Security Vs Online SafetyOnline Security Vs Online Safety

Risks & ThreatsRisks & Threats

Steps to protect informationSteps to protect information

Steps to protect computerSteps to protect computer

Ethical ImpactEthical Impact

Case studyCase study

Statistics about Internet CrimeStatistics about Internet Crime

surveysurvey

conclusionconclusion

ReferencesReferences

Page 3: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

IntroductionIntroduction

Computer security is a branch of computer technology known as information security as applied to computers and networks.

computer security means the protection of computing systems and the data that they store or access

What is Computer Security ?

Page 4: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Network SecurityNetwork Security

Devices, tools, techniques and methodologies used to secure the network.

The basic component of network security is : Firewall . Encryption and Decryption : changing plaintext

into ciphertext using key (Encryption). Changing ciphertext back to plaintext using key (Decryption).

Two types of encryption : (Symmetric Encryption, Asymmetric Encryption) .

Page 5: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Symmetric Cipher Model

Page 6: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Public-Key Cryptography

Page 7: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Basic Components of CSBasic Components of CS

computer security involves providing appropriate levels of assurance of

– Availability of computing services and data/information stored in computing systems

– Confidentiality of data/information stored in computing

systems

– Integrity of computing systems and data/information stored therein

Page 8: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Online Security Versus Online Safety Online Security Versus Online Safety

Security: We must secure our computers with technology in the same way that we secure the doors to our offices

Safety: We must act in ways that protect us against the risks and threats that come with Internet use

Page 9: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Risks and ThreatsRisks and Threats

To Computer Security are :

Virus

Worm

Trojan Horse

Spyware

Hacking

Phishing

Spoofing

Denial of Service

Page 10: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Viruses/WormsSoftware programs designed to invade your computer, and copy, damage or delete your data

Trojan HorsesViruses that pretend to be programs that help you while destroying your data and damaging your computer

SpywareSoftware that secretly watches and records your online activities or send you endless pop-up ads

Page 11: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Did You Know …Did You Know …

All of these types of attacks are man-made and intentional.

There is no “natural” or “random” virus.

All of these ride the Internet services you invite in!

Internet services like : ( E-Mail, Peer To Peer Sharing, Online Gaming, Instant Messaging, Video and Audio Streaming )

Page 12: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

VirusesViruses

a program or piece of code that is loaded onto your computer (without your knowledge and against your wishes), that (generally) replicates itself and (generally) delivers a payload.

File Infector Virus : attaches itself to a file on the computer and is executed when that application is opened.

( 1972 )

Page 13: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

WormsWorms

A self-replicating computer program that uses networks to copy itself to other computers without user intervention.

infection by passively receiving object that gets itself executed.

Stand-alone.

( 1978 )

Page 14: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Trojan HorsesTrojan Horses

Hidden part of some otherwise useful software.

Generally, trojans do not replicate.

Today often on a Web page (Active-X, plugin)

( 1983 )

Page 15: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

SpywareSpyware

Application installed, usually without the user’s knowledge, intercepting or taking partial control for the author’s personal gain

Estimates as high as 90% of Internet connected computers are infected with spyware.

Unlike a virus does not self-replicate.

Page 16: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Spyware symptomsSpyware symptoms

Sluggish PC performance

An increase in pop-up ads

Mysterious new toolbars you can’t delete

Unexplained changes to homepage settings

Puzzling search results

Frequent computer crashes

Page 17: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

How does PC get infected ?How does PC get infected ?

Through CDs, DVDs, Floppy Disk, and Flash Memory

Accepting without reading

Opening e-mail attachments

Not running the latest updates

Pirating software, music, movies

No anti-virus spyware scanner

Page 18: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Steps To Protect InformationSteps To Protect Information

Practice Internet behavior that lowers your risk

Manage your business information carefully

Use technology to reduce nuisances

Raise the alarm when appropriate

Page 19: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Delete Spam without Opening ItDelete Spam without Opening It

Never reply to spam

Technology can help you identify spam so you can delete it

Many Internet providers delete it for you

Page 20: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Use Strong PasswordsUse Strong Passwords

Keep passwords private and create ones that are hard to “crack”

Never share your passwords with friends or be tricked into giving them away

Page 21: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Turn on an Internet firewall

Keep your operating system up to date

Install and maintain antivirus software

Install and maintain antispyware software

Steps To Protect ComputerSteps To Protect Computer

Page 22: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Turn on an Internet FirewallTurn on an Internet Firewall

An Internet firewall is like a moat around a castle, creating a barrier between your computer and the Internet

Page 23: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Keep Your System UpdatedKeep Your System Updated

Install all security updates as soon as they are available

Automatic updates provide the best protection

Page 24: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Install Antivirus SoftwareInstall Antivirus Software

Antivirus software can detect and destroy computer viruses before they can cause damage

Just like flu shots, for antivirus software to be effective, you must keep it up to dateDon’t let it expire

Page 25: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Example

Page 26: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Install & Maintain Antispyware SoftwareInstall & Maintain Antispyware Software

Use antispyware software so unknown people cannot lurk on your computer and potentially steal your information

Page 27: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Other Ways to Protect Your PCOther Ways to Protect Your PC

- Back up your files regularly

- Practice safe E-mail

- Read website privacy statements

- Close pop-ups using red “X”

- Lock your screen

- Install Spyware Blaster

- Update your Application

Page 28: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Back Up Your FilesBack Up Your Files

Save to CD or DVD

Use a Web-based backup service

Page 29: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Practice Safe E-MailPractice Safe E-Mail

Don’t open e-mail attachments unless you know what they contain and who sent them

Attachment ends with a .exe, .com, .bat, do not open the attachment unless you know for a fact that it is clean.

Don’t open, forward, or reply to suspicious e-mails

Delete spam

Page 30: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Close Pop-ups Using Red “X”Close Pop-ups Using Red “X”

Always use the red “X” in the corner of a pop-up screen

Never click “yes,” “accept” or even “cancel”, because it could be a trick that installs software on your PC

Page 31: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Install Spyware BlasterInstall Spyware Blaster

Spyware Blaster will added a large list of programs and sites into your Internet Explorer settings that will protect you from running and downloading known malicious programs.

Page 32: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Lock Your ScreenLock Your Screen

Locking your laptop or workstation while away from it is good security sense.Use a password to start up or wake-up your computer.

Page 33: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Update Your ApplicationUpdate Your Application

It is also possible for other programs on your computer to have security vulnerability that can allow malware to infect you. Therefore, it is also a good idea to check for the latest versions of commonly installed applications that are regularly patched to fix vulnerabilities.

Page 34: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Ethical Impact

Question: should schools offer a course that teaches students how to hack systems, why?

Violating intellectual property : By Software piracy (cracking).

Hacking others’ devices and stolen their effort .

Computer security reduce this violating.

Page 35: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Ethical Impact(cont)

Many people used a cracked SW and claim that they want to test it before they buy it (is that true , why ?)

Other people said : why we have to pay money while these cracked SW is free? ( is that true , why ?)

Page 36: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Ethical Impact(cont)

Violating privacy : hacking other computers will violate the privacy and making hacker see what he is not suppose to see .

Page 37: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Case Study (1) : About PhishingCase Study (1) : About Phishing

example of a phishing published in the Washington Post (2004 ). Story of William Jackson from Katy, Texas. Jackson received e-mail from what appeared to be ( PayPal ) payment offices.

The e-mail warned him that his account would be suspended until he updated it with financial information. The e-mail provided a link for Jackson to the website where he could update his information. He entered in credit card numbers, bank numbers, social security numbers and other personal identification information.

The website ended up being fraudulent and Jackson lost several hundred dollars. William Jackson could have lost much more money as a result of the Phishing website he had entered.

Page 38: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Case Study (2) : About SpywareCase Study (2) : About Spyware

In March ( 2005 ), British police foiled a plot to steal £220 million from ( Sumitomo Mitsui Bank ) in London.

Cybercriminals had compromised the bank’s computer systems and secretly deployed a keylogger program that was perhaps part of a Trojan horse. The spyware relayed password and access information to the criminals, who intended to transfer the funds electronically. A man in Israel was arrested after allegedly trying to transfer £13.9 million into an Israeli account.

Page 39: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Statistics about Internet CrimeStatistics about Internet Crime

This statistic is done in USA, that include many types of crime, such as auction fraud, spam, credit card fraud and so on.

Page 40: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

SurveySurvey

Page 41: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Survey(cont)Survey(cont)

Page 42: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Survey(cont)Survey(cont)

Page 43: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Survey(cont)Survey(cont)

Page 44: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

ConclusionConclusion

Now that you have completed this web quest on Computer Security you are now aware of the possible security treats to computer systems. Not only that, but you are now better able to protect your computers as well as recommend security measures to others

Page 45: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

ReferencesReferences

http://en.wikipedia.org/wiki/Computer_security

http://www.clearwisdom.net/emh/articles/2008/7/23/99177.html

http://its.ucsc.edu/security_awareness/intro.pdf

http://nurseweb.ucsf.edu/public/07fa-computer-security.ppt

http://www.acsac.org/secshelf/book001/02.pdf

Page 46: Outline :Introduction Network Security Basic Components Of Computer Security Online Security Vs Online Safety Risks & Threats Steps to protect information.

Thank You For Listening

Any Question ?


Recommended