Please discontinue use of cell phone and turn off ringer Chapter 11 Computer Crime and Information Security Information Security and Vulnerability Machine-Level Security Network Security Wireless Network Security Internet Security Information Security Overview
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Information Security and Vulnerability
Wireless Network Security
Two-thirds of Internet experts expect a devastating attack on the Internet between now and 2015.
See what the White House has to say on the subject at http://www.whitehouse.gov/pcipb/
What is at stake and what are the threats?
Depending on the circumstance, private information may include your:
All too common headlines…
“Hackers attacked computer servers of a California university and may have gained access to the personal information of 59,000 people affiliated with the school…”At stake:Personal Private Information
Washington, June 8, 2006 – Over the last two years, Abu Musab al-Zarqawi established the Web as a powerful tool of the global jihad, mobilizing computer-savvy allies who inspired extremists in Iraq and beyond with lurid video clips of the bombings and beheadings his group carried out.At stake:National and Global Security
Food for thought…
The Internet is a powerful tool both for those who wish to build bridges between distant cultures and those that wish to tear them down.
China Hacking: http://abcnews.go.com/TheLaw/story?id=3966047
The Cyber Cold War
“Microsoft warned on Tuesday of seven newly found flaws in its software that could allow an attacker to steal data and take over a personal computer running the Windows operating system…”Threat:Software and Network Vulnerabilities
Food for thought…
Perfect software would be impossible to hack.
Microsoft’s Trustworthy Computing
Computer forensics is the process of examining computing equipment to determine if it has been used for illegal unauthorized or unusual activities.
Securing all components of the global digital information infrastructure is referred to as ________________.
Credit card companies interested in protecting customers from _______________ watch for purchases that are out of the ordinary and notify the customer to confirm that the purchase was not made by a thief.
Music, software, designs, artwork, and literature are all forms of _____________ that are typically protected by copyright or trademark.
Hackers make use of _________________ to gain illegal access to computer systems.
If you purchase and download an MP3 song from Amazon.com, then email the MP3 file to a friend you are ________________.
More about tokens:
Check out Face Recognition
Demo: Encrypting a PPT file (tools > options > security)
More on Encryption: http://en.wikipedia.org/wiki/Encryption
Food for thought…
A recent study showed that only 57% of computer users back up stored data including digital photos, personal documents, work documents, music, and financial records.
DO YOU BACKUP?
HAVE YOU LOST DATA DUE TO HARDWARE FAILURE?
Which of the following is NOT a safe password practice
select a strong password
change your password regularly
use the same password for different accounts
don’t write your password down
London’s Heathrow airport has implemented ____________ through the use of a retinal scanner that checks the identity of workers as they clock into work.
Through the use of _____________ files can be rendered unreadable while stored or in transit over a network.
The one action that can save your data from being destroyed by hackers, viruses, system and hardware crashes, and spyware is _______________.
FSU Network Usage Policies: http://www.vpfa.fsu.edu/policies/bmanual/itpolicy.html
Newly purchased access points typically have no security features enabled making it easy for any wireless device to connect.
More on Wi-fi in CH5
“Hackers have turned toward more criminal and lucrative areas of directingattacks to specific individuals or organizations, often financially, competitively, politically or socially motivated.” http://www.physorg.com/news5580.html
Firewall software from McAfee and Symantec are considered to be more robust than Windows Firewall. This McAfee screen shot shows several attacks on this PC over the course of one day.Defending Against Hackers
Viruses and worms are considered malicious software, or malware, Check out the latest malware at http://www.mcafee.com/us/threat_center
Yeah right! This didn’t come from Microsoft. The attachment is not a patch, nor an innocent text file (as it appears) but an executable file containing a virus.
Knowledge and caution play a big part in protecting PCs against viruses and worms:
The Internet service provider Earthlink said it uncovered an average of 28 spyware programs on each of its member’s PCs that were scanned
Adware is spyware that displays advertisements.
Experts say hundreds of thousands of computers are added to the ranks of zombies each week.
It has been estimated that 80 to 90 percent of spam originates from zombie computers.
Storm worm botnet for rent
Spoofing is the act of assuming the identity of another person or organization typically through email or on the Web.
If you clicked the link it would take you to a spoofed Citibank Webpage that looks like the real thing, and ask you to supply personal information like your username and password.
Holding the mouse pointer over the link in the original email shows that it really links to http://220.127.116.11:87 most likely a hacker’s Website.
The objective of this e-mail is to warn all Hotmail users about a new virus that is spreading by MSN Messenger. The name of this virus is jdbgmgr.exe and it is sent automatically by the Messenger and by the address book too. The virus is not detected by McAfee or Norton and it stays quiet for 14 days before damaging the system.
The virus can be cleaned before it deletes the files from your system. In order to eliminate it, it is just necessary to do the following steps:
1. Go to Start, click "Search"
2.- In the "Files or Folders option" write the name jdbgmgr.exe
3.- Be sure that you are searching in the drive "C"
4.- Click "find now"
5.- If the virus is there (it has a little bear-like icon with the name of jdbgmgr.exe DO NOT OPEN IT FOR ANY REASON
6.- Right click and delete it (it will go to the Recycle bin)
7.- Go to the recycle bin and delete it or empty the recycle bin.
IF YOU FIND THE VIRUS IN ALL OF YOUR SYSTEMS SEND THIS MESSAGE TO ALL OF YOUR CONTACTS LOCATED IN YOUR ADDRESS BOOK BEFORE IT CAN CAUSE ANY DAMAGE.
Do the search. Oh no! I’ve got the Teddy Bear virus! Better delete it!
That file with the silly little Teddy bear icon is actually a necessary system file in Windows!
For more on this topic check out www.vmyths.com
Security experts at Sophos recommend that home Windows users switch to Macs. From the 2006 Sophos Security Threat Management Report: “The vast majority of malware continues to be written for Windows…It seems likely that Macs will continue to be the safer place for computer users for some time to come - something that home users may wish to consider if they're deliberating about the next computer they should purchase."
By default, Wi-fi access points are set up with what level of security enabled?