1 / 12

Computer Security Issues

Computer Security Issues. Ed Queen and Brent Barber. What are some computer security issues?. Electronic Forgery Falsified financial press releases Bank statements Expense claims

brian
Download Presentation

Computer Security Issues

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security Issues Ed Queen and Brent Barber

  2. What are some computer security issues? • Electronic Forgery • Falsified financial press releases • Bank statements • Expense claims • “Electronic forgery is becoming a greater risk as more company information is stored electronically. But many organisations are ignoring the issue.” http://www.securityfocus.com/news/11228

  3. What are some computer security issues? • Identity Theft • “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain.” http://www.usdoj.gov/criminal/fraud/idtheft.html • Can be done by: • “Shoulder surfing” • “Dumpster diving” • “Spam”

  4. Computer Viruses: The Infection • Viruses • Worms • Trojan Horses

  5. Computer Viruses: The Infection • Viruses • Must be executed • Must have a host • Replicates disk to disk, file to file, system to system

  6. Computer Viruses: The Infection • Worms • Self-replicating program • Does not need a host • Replicates system to system

  7. Computer Viruses: The Infection • Trojan Horses • Does something unexpected • Non-replicating

  8. Prevention Strategies • Firewalls • Hardware vs. Software

  9. Prevention Strategies • Virus Protection Software • Spyware/Adware Software • Common Sense

  10. Prevention Strategies • Center for Education and Research in Information Assurance and Security – Purdue University (CERIAS)

  11. Resources • http://www.securityfocus.com • http://http://www.usdoj.gov • http://www.smallbusinesscomputing.com • http://download.zonelabs.com • http://www.hotbrick.com • http://www.linksys.com • http://www.microsoft.com/ • http://www.worldstart.com • http://us.mcafee.com • http://www.n-tv.de • http://www.pritchettcartoons.com • http://horiuchi.akria.ne.jp • http://www.flexbeta.net • http://iisw.cerias.purdue.edu

More Related