31
Chapter 6 Security

Physical Security Logical/Computer Security What other examples?

Embed Size (px)

Citation preview

Chapter 6Security

Basic Terms

Security – protection of assets from unauthorized access, use, alteration, or destruction.

Physical Security Logical/Computer Security

What other examples?

Types of Crimes

Identity Theft Trailer – Identify Theft Video

Every two seconds, another American becomes a victim of identity fraud.

30% chance it is a family member or relative

Identity Theft Video

Who are the people that

hack?

Started with Phone Phreaking – 1950’s (popular 1960-1970s)

Video: 1

8

Who are these people?

HackersEnjoyed writing complex code

CrackersSkilled who uses

to obtain unauthorized

access

Script KiddiesOnline tool kits

Corporate Spies Unethical Employees

Cyberextortionists

Cyberterrorists

White hat (good guys)

Black hat (illegal activity) and Grey

Hackers

Who Am I assignmentVideo 2

10

How do people hack?

Software Bugs in Programs

Active Content: Java, Java Script, Active X Components.

SQL InjectionsWeb Browsers

HTML

12

Hacking Techniques

13

Hacking Techniques: First StopSocial engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety

An example of Social Engineeringvideo 3

15

Internet and Network Attacks

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate http://www.hoaxmail.co.uk/

Keylogger

http://download.cnet.com/Big-Brother-Keylogger/3000-27064_4-10663860.html?tag=mncol;6

Denial–of-Service (DOS) Attacks disrupts computer access to Internet

serv ices

Zombies

Video 4: Estonia

17

Hacking Techniques - Viruses

Computer Virus

• Affects a computer negatively by altering the way the computer works

Worm

• Copies itself repeatedly, using up resources and possibly shutting down the computer or network

Trojan Horse

• A malicious program that hides within or looks like a legitimate program

Rootkit

• Program that hides in a computer and allows someone from a remote location to take full control

Logic Bombs & Zero Day

Virus

Mobile Phones / Facebook Viruses

Photos/Emails/

Bluetooth/AppsLinks/

programs downloaded

21

Glamour HollywoodVideo 5

Does unplugging stop the virus?

22

Glamour Hollywood

Video 6What computer program does

Agent Smith represent?

Video 7: Hack Fails in the Movies

Video 8: Real Hacking

24

How do I know I have been attacked?

An infected computer has one or more of the following symptoms:Operating

system runs much slower than usual

Available memory is less than expected

Files become corrupted

Screen displays unusual

message or image

Music or unusual sound plays randomly

Existing programs and files disappear

Programs or files do not

work properly

Unknown programs or

files mysteriously

appear

System properties

change

Operating system does not start up

Operating system shuts

down unexpectedly

How to Protect

Yourself

Antivirus

Firewalls

Authentication

Certificates - mathematical

Single-factor authentication (password)

Multifactor authentication (2 or more – debit card)

Public Key Infrastructure Demo

Three Volunteers

Passwords

Keep information secure