Department of Mathematics Computer and Information Science 1
Basics of Cyber Security and Computer Forensics
Christopher I. G. Lanclos
Department of Mathematics Computer and Information Science 2
Outline• What is cyber security?
• Online safety
• Computer forensics
• Password protection
• Malware
• Steganography
• Summary
• Questions
Department of Mathematics Computer and Information Science 3
What is cyber security?
• Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack
• Computer systems are always under constant attack
• Work to navigate the Internet cautiously and securely
Department of Mathematics Computer and Information Science 5
Online safety
• Participating in Internet activities in a responsible and safe manner
• Being aware of where you are online and who has access to personal information
• Understand that anything placed on the Internet never goes away
Department of Mathematics Computer and Information Science 6
Essentials of online safety cont…
• Threats to online safety– Phishing
– Cyber predators
– Cyber bullying
Department of Mathematics Computer and Information Science 7
Phishing
• Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity
Department of Mathematics Computer and Information Science 8
Cyber predators
• Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes
Department of Mathematics Computer and Information Science 9
Cyber bullying
• Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet
• Solution– Inform a trusted adult
Department of Mathematics Computer and Information Science 10
Computer forensics
• Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information
• Emerged during this time as a method to recover and investigate digital evidence for use in court
Department of Mathematics Computer and Information Science 11
Who are the bad guys?
• Blackhat hacker– An individual with extensive computer knowledge
whose purpose is to breach or bypass internet security
– Common name for individuals who commit computer crimes
• Forensic equipment and software are used to protect against attacks
Department of Mathematics Computer and Information Science 12
Computer forensics equipment
• Write Blocker– Devices that allow acquisition of information on
a drive without creating the possibility of accidentally damaging the drive contents
Department of Mathematics Computer and Information Science 13
Computer forensics software
• EnCase– Computer forensics products used to analyze
digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations
Department of Mathematics Computer and Information Science 14
Malware
• Software that is intended to damage or disable computers and computer systems
• Launch attacks without the knowledge of users
Department of Mathematics Computer and Information Science 15
Types of Malware• Keylogger
– Software or hardware that captures keystrokes on a computer
• Worm– Type of malware that independently copies its self and attacks computer
systems
• Trojan horse– A harmful program that pretends to be something useful and helpful to a user
• Logic Bomb– Program inserted into software, that triggers when a set of specific conditions
occur
Department of Mathematics Computer and Information Science 16
Password protection
• Extremely important to protecting online accounts
• Should not include very common names (names of pets, people, or simple words in the dictionary)
Department of Mathematics Computer and Information Science 17
What happens to simple password?
• Easier passwords can be attacked
• Dictionary attacks can be used to guess simple to moderate complexity passwords
Department of Mathematics Computer and Information Science 19
How do we protect ourselves?
• Increase the length and variety of passwords• To create a strong password include:– Lowercase and uppercase letters– Numbers– Special characters– Length of seven characters or longer
• Example– Weak password- rover– Strong password- R043f112$*
Department of Mathematics Computer and Information Science 20
Steganography
• Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient
• Use for a variety of reasons– Sending messages between friends– U.S. soldiers communicating secretly– Terrorists planning secret attacks on countries