1 / 14

COMPUTER SECURITY PROBLEMS

COMPUTER SECURITY PROBLEMS. Engelber Ruiz Lien Ly Period 3. Computer security. 12 years ago, computer and network security was not at all well known. Today, most people are aware or know about the need of computer and network security, but not sure what is really means.

saman
Download Presentation

COMPUTER SECURITY PROBLEMS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COMPUTER SECURITY PROBLEMS Engelber Ruiz Lien Ly Period 3

  2. Computer security • 12 years ago, computer and network security was not at all well known. • Today, most people are aware or know about the need of computer and network security, but not sure what is really means. • Internet security is something that has become more and more needed over the last few years. As viruses become smarter and stronger, we need higher protection.

  3. What is computer security Is information security as applied to computers and networks. Computer security involves providing appropriate levels of : Availability, confidentiality, integrity, auditability and non-repuldiablity.

  4. Media stories • Without proper wireless network security precautions in place, you can easily have valuable personal data stolen, your computers infected with spyware and crashed, or just be randomly harassed. “ A router change is just a joke for a serious hacker. Since March 25, my life has been turned upside down by an aggressive hacker. I have lost the ability to communicate with friends and family, as doing so would place them in danger. First Facebook, then losing Yelp which at 300 reviews was my social connection. My passwords were repeatedly disabled - making me a security risk receiving notes like - "Please refrain from logging in for 72 hours". A Trojan Horse with Remote Access connected to my Skype and Photo Booth on my MacBook Pro (!). Viruses included remote keyboard control and key logging. How did this get so far? I was recuperating from surgery on April 12, and it just got way out of hand. I sent the MBP out for wiping in May, and my IPhone 5 was taken hostage and remotely jail broken. 3 weeks later, it all resurfaced, and now my equipment is at a hired investigator. A nightmare. A malicious, diabolical issue cosing thousands.....” —maureen0123

  5. Why do we need computer security? Computer security is what keeps your computer safe from virus and people trying to hack into the information you have on your computer while you are online Without computer security, online banking, trading, purchasing may be insecure. Having computer security helps prevent credit card and identity thief.

  6. Common computer security issues • Virus : Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate. • Hacking : In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.

  7. Types of computer security threats • Corruption of functions or operations • Denial of service • SPAM • Hacking • Unauthorized users • Misrepresentation of spoofing • Unauthorized invocation of services

  8. Goals of computer security • Guarantee that the data is what we expect. • The information must just be accessible for authorized people. • Computer should work without unexpected problems. • Guarantee that only authorized people get access to resources.

  9. Protect Your PasswordsHere are a few principles for creating strong passwords and keeping them safe: * The longer the password, the tougher it is to crack. Use at least 10 characters; 12 is ideal for most home users. * Mix letters, numbers, and special characters. Try to be unpredictable – don’t use your name, birthdate, or common words. * Don’t use the same password for many accounts. If it’s stolen from you – or from one of the companies with which you do business – it can be used to take over all your accounts. * Don’t share passwords on the phone, in texts or by email. Legitimate companies will not send you messages asking for your password. If you get such a message, it’s probably a scam. * Keep your passwords in a secure place, out of plain sight.

  10. Some proven system security measures • Running updated anti-virus software • Setting restrictive file access permissions • Limiting privileges to the minimum needed to get the job done • Requiring everyone to select and use a good password • Setting appropriate password aging parameters • Using third-party authentication.

  11. Proven network security measures • Limiting services that run • Intrusion detection • Vulnerability scanning • Firewalls • Network authentication measures • Appropriate network architectures

  12. How to achieve security In addition, users have to practice “Safe computing” • Not opening attachments • Not downloading from unsafe websites • Avoiding scams • Cryptography • Firewall • Antivirus software

  13. Crytography • The art of protecting information by transforming it (encrypting it) into an unreadable format. • Cryptography is used to protect e-mail messages, credit card information, and corporate data.

  14. Conclusion • Defense in depth ( multi-tiered defenses) work best • Always weigh costs versus benefits when considering security measures • Neglecting security is the worst thing you can do • Computer and information security continue to grow in importance • The gap between attackers’ capabilities and ability to defend against them is widening

More Related