Upload
edwina-lane
View
227
Download
0
Tags:
Embed Size (px)
Citation preview
Basic Terms
Security – protection of assets from unauthorized access, use, alteration, or destruction.
Physical Security Logical/Computer Security
What other examples?
Identity Theft Trailer – Identify Theft Video
Every two seconds, another American becomes a victim of identity fraud.
30% chance it is a family member or relative
Identity Theft Video
Take a Quiz
http://www.onguardonline.gov/media/game-0005-id-theft-faceoff
8
Who are these people?
HackersEnjoyed writing complex code
CrackersSkilled who uses
to obtain unauthorized
access
Script KiddiesOnline tool kits
Corporate Spies Unethical Employees
Cyberextortionists
Cyberterrorists
White hat (good guys)
Black hat (illegal activity) and Grey
Software Bugs in Programs
Active Content: Java, Java Script, Active X Components.
SQL InjectionsWeb Browsers
HTML
13
Hacking Techniques: First StopSocial engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety
15
Internet and Network Attacks
Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate http://www.hoaxmail.co.uk/
Keylogger
http://download.cnet.com/Big-Brother-Keylogger/3000-27064_4-10663860.html?tag=mncol;6
Denial–of-Service (DOS) Attacks disrupts computer access to Internet
serv ices
Zombies
Video 4: Estonia
17
Hacking Techniques - Viruses
Computer Virus
• Affects a computer negatively by altering the way the computer works
Worm
• Copies itself repeatedly, using up resources and possibly shutting down the computer or network
Trojan Horse
• A malicious program that hides within or looks like a legitimate program
Rootkit
• Program that hides in a computer and allows someone from a remote location to take full control
22
Glamour Hollywood
Video 6What computer program does
Agent Smith represent?
Video 7: Hack Fails in the Movies
Video 8: Real Hacking
23
Let’s Make a Virushttp://myhistoryweb.blogspot.com/2009/03/10-virus-notepad-script.html
http://www.wikihow.com/Create-a-Fake-and-Harmless-Virus-Without-Using-Notepad
24
How do I know I have been attacked?
An infected computer has one or more of the following symptoms:Operating
system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual
message or image
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not
work properly
Unknown programs or
files mysteriously
appear
System properties
change
Operating system does not start up
Operating system shuts
down unexpectedly
Authentication
Certificates - mathematical
Single-factor authentication (password)
Multifactor authentication (2 or more – debit card)