120 likes | 228 Views
Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government. Using Quizlet. Choosing one word per page and two from some
E N D
“If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual”Gilberto Gil Crusader in Open source who works for the Brazilian government
Using Quizlet • Choosing one word per page and two from some • Make approximately 8 to 10 flash cards • Invite your friends to your flash cards • Learn all the terminology about computer crime using quizlet.com
Computer Crime • Computer Forensics • cybercrime • Cyberstalking • Identity theft • Social engineering • Spoofing • Phishing • Spammer
Computer Crime • Malware • Cross platform Viruses • Macro Virus • Macros • 1999 Melisa Virus • Cross scripting Virus • Worms
Computer Crime • Trojan Horse • Logic Bomb • Time Bomb • Spyware • Tracking software • Spybot • Drive by Downloads
Just as natural forests are more resistant to disease than are single-species tree farms, mixed computing environments are less susceptible to crippling attacks than is an organization in which everyone uses the same hardware and software.
Computer Crime • Antivirus • Security patches • MS Slammer • Hackers • Crackers • Webjackers • Zombie Computers • Bots • Botnets
Quotes • In 2007 a DDOS attack crippled the electronic infrastructure of the republic of Estonia, one of the most wired countries in the world • “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)
Computer Crime • DOS attacks (Denial of Service) • DDOS distributed DOS • Mafia Boy • Biometrics • Smart Card • Passwords • Access-control software • Access privileges
Quotes • “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics
Computer Crime • Firewalls • Encryption • Encryption Key • Decryption • Audit control software • Backups • Generations • RAID • Automatically mirror • Instant redundancy • Off site backup • On line backup (Speed Issues)