1 / 30

Introduction

Introduction. IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Rebecca Flynn. Title of presentation. Here are the topics that we will cover – Edel – Cybercrime Rebecca- Patrick- Encryption.

jimbo
Download Presentation

Introduction

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Rebecca Flynn

  2. Title of presentation • Here are the topics that we will cover – • Edel – Cybercrime • Rebecca- • Patrick- Encryption

  3. IT Tralee • Firstly we will tell you a little about our college and Tralee itself.

  4. IT Tralee • The Institute of Technology, Tralee, has been to the forefront of learning since its establishment and has gained a reputation as a centre of distinction for teaching, learning and research. • The Institute offers a range of full-time and part-time programmes ranging from certificate through to honours degree and post-graduate Masters and Doctoral level. Enhancing the taught programmes at the Institute is a world class programme of research.

  5. Tralee • Tralee is the county town of County Kerry, in the south west corner of Ireland. The name Tralee comes from the Irish 'Trá Lí', or 'Trá Laoi', which means 'strand of the Lee' (river)

  6. Tralee • Tralee is the largest town in Kerry. The town's population including suburbs was 22,744 in the 2006 census.

  7. Tourism • Tralee is a major tourism destination and has seen some €55 million of tourism investment over the past several years. The town has developed a range of quality all weather visitor attractions. Tralee is also famous for the Rose of Tralee International Festival which is held annually in August.

  8. Sport • Tralee & Kerry has a strong sporting tradition and has a number of successful Gaelic Football Clubs and also a strong interest in Basketball.

  9. Education • In common with all parts of Ireland, most schools at all levels in Tralee are managed and owned by the churches. At secondary level most schools are explicitly Roman Catholic in ethos, except Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.

  10. A little bit of home

  11. Cybercrime By Edel Walsh

  12. What is cyber crime When a computer or network is a tool of the criminal • Examples include: • Spamming • Unauthorized access • Malicious code • Denial-of-service attacks • Etc

  13. Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, which include: • illegal access • Illegal interception • Data interference • Systems inference • Misuse of devices • Forgery • Electronic fraud

  14. Research in 2006 • Every 10 seconds in Britain • 3.24 million times • 90% of crimes stay unreported

  15. Shirley McGuirea specialist in psychology of the University of San Francisco performed a study on 4800 students who hack and invade computer systems.

  16. The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement.

  17. The love-bug virus Thursday, 4 May, 2000 • It crippled government and business computers in Asia and Europe • American State Department and the CIA, and major companies like Ford and Time-Warner. • first appeared in Hong Kong in the late afternoon • Analysts estimate hundreds of millions of dollars of damage has been caused in the US • 1.27 million computer files were infected worldwide

  18. The Love Bug e-mail appeared on computer screens in both houses of Congress in Washington and at the Pentagon. • It spread at great speed. One DJ in Texas received the e-mail virus 1,500 times.

  19. The FBI have opened a criminal investigation. Reports suggest the virus may have originated in the Philippines. ISP Sky Internet Inc. in the Philippines are reported by ZDNet News to be hunting for a code writer who signed the virus code "Spyder, Manila, Philippines" and added the comment: "I hate go to school."

  20. Encryption By Patrick O’ Mahony

  21. Encryption • The Internet has grown at an incredibly fast rate and has excited both consumers and businesses with promises of changing the way we live and work. Lets be honest, there is a lot of information that we would not like other people to see, such as: • Bank Account Details • Credit Card Information • Social Security Number • Personal E-Mails • Employee or Business Records

  22. Encryption • E-Business relies on the ability to send and receive information securely. • Internet and computer security comes in a variety of methods but the most popular effective ones all rely on encryption. This process encodes information in such a way that only the person or computer with the “Key” can decode it.

  23. Encryption • Encryption is based on the ancient science of cryptography.

  24. Encryption • Computer encryption systems are divided into two categories: • Public-Key Encryption • Symmetric-Key Encryption

  25. Encryption • Public-Key Encryption –

  26. Encryption • Symmetric-Key Encryption –

  27. Encryption • Authentication – • This process works in tandem with encryption to create a secure environment on your computer. There are several ways to authenticate a person or their information on a computer – • Passwords • Digital Signatures • Biometrics

  28. Encryption • Biometrics uses biological information to verify the user’s identity. Some methods of Biometrics are : • Voice Identification • Face Scan • Retina Scan • Fingerprint Scan

  29. Encryption • Some good links – • www.entrust.com • www.pgp.com • www.ssh.fi/tech/crypto/intro.html • www.tatanka.com • www.elock.com • www.qmw.ac.uk

More Related