Computer Security and Risks
-
Upload
marny-anderson -
Category
Documents
-
view
23 -
download
4
description
Transcript of Computer Security and Risks
![Page 1: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/1.jpg)
Computer Security and Risks
![Page 2: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/2.jpg)
“If the law doesn't fit reality anymore, law has to be changed. That’s not a new
thing. That’s civilization as usual”Gilberto Gil Crusader in Open source
who works for the Brazilian government
![Page 3: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/3.jpg)
Using Quizlet• Choosing one word per page and two from
some• Make approximately 8 to 10 flash cards• Invite your friends to your flash cards• Learn all the terminology about computer
crime using quizlet.com
![Page 4: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/4.jpg)
Computer Crime
• Computer Forensics• cybercrime• Cyberstalking• Identity theft• Social engineering• Spoofing• Phishing• Spammer
![Page 5: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/5.jpg)
Computer Crime
• Malware• Cross platform Viruses• Macro Virus• Macros• 1999 Melisa Virus• Cross scripting Virus• Worms
![Page 6: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/6.jpg)
Computer Crime
• Trojan Horse• Logic Bomb• Time Bomb• Spyware• Tracking software• Spybot• Drive by Downloads
![Page 7: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/7.jpg)
Just as natural forests are more resistant to disease than are single-
species tree farms, mixed computing environments are less susceptible to
crippling attacks than is an organization in which everyone uses
the same hardware and software.
![Page 8: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/8.jpg)
Computer Crime
• Antivirus• Security patches• MS Slammer• Hackers• Crackers• Webjackers• Zombie Computers• Bots• Botnets
![Page 9: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/9.jpg)
Quotes• In 2007 a DDOS attack crippled the electronic
infrastructure of the republic of Estonia, one of the most wired countries in the world
• “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)
![Page 10: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/10.jpg)
Computer Crime
• DOS attacks (Denial of Service)• DDOS distributed DOS• Mafia Boy• Biometrics• Smart Card• Passwords• Access-control software• Access privileges
![Page 11: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/11.jpg)
Quotes
• “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics
![Page 12: Computer Security and Risks](https://reader035.fdocuments.us/reader035/viewer/2022071716/56812ace550346895d8ea998/html5/thumbnails/12.jpg)
Computer Crime• Firewalls• Encryption• Encryption Key• Decryption• Audit control software• Backups• Generations• RAID• Automatically mirror• Instant redundancy• Off site backup• On line backup (Speed Issues)