INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

16
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Transcript of INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

Page 1: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Page 2: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

WHAT IS SECURITY?• All types of security, including the shield of computers, is

the process of protecting something from unauthorized users.

• In the “technology world”, it includes the protection of hardware, software, and data.

• Everyone should be aware of the potential consequences of security problems!

Page 3: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Page 4: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Page 5: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

ARE YOU WHO YOU SAY YOU ARE?• Authentication- This is what requires users to prove their

identify to a system

• These techniques can be divided into three different categories. Something you know, something you have, and something you are.

Page 6: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

Something you Know Something you Have Something you Are

Passwords and Pins• Use more than 12

Characters• Change passwords

frequently • Never write them down

A physical object• Key• Security Tokens (resembles a

keychain that the is owned by the owner and easily carried)

Biometrics• Fingerprints, Iris Patterns, face

shape, and voice patterns.

Page 7: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

HACKING (CRACKING)• Gaining Unauthorized access

to computer systems

• Social Engineering- Involves simply tricking the user into revealing their password or other data.

• A Password Cracker- a program designed to guess passwords

• Packet Sniffer- program that captures data as it travels over networks.

Page 8: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
Page 9: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

VIRUSESAre malicious programs designed to replicate themselves and cause damage to computer systems.

Triggered when a user opens the program or attachment.

Deleting or overwriting filesWiping the hard disk

Page 10: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

Worms Trojan Horses Spyware

Similar to viruses, but spread without any user interaction

Instead of spreading on their own, Trojan horses rely on tricking the user into downloading and running them

Form of malware which monitor the users activities without their knowledge or permission.

Page 11: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

INFILTRATING THE PENTAGON• Lost thumb drive found in the parking lot of a US Military

base

• An employee inserted it into a military laptop

• Leading to the “most significant breach ever of US military computer networks

• This flash drive was placed in the car park by a foreign intelligence agency, and was infected with Agent.BTZ worm

• Took over a year to remove the work from compromised systems.

Page 12: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

SPAM• Unwanted messages that are sent to many users at once

• Spammers technique is to entice users to opening the emails One Day after Michael Jackson’s death, spam emails began to offer

information about his death.

• Impacts of spam are the potential exposure to malware infected attachments, which can have a serious impact on businesses. This can slow down email servers, consuming disk space and bandwidth.

Page 13: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

PHISHING AND IDENTITY THEFT

• Phishing is the way hackers attempt to impersonate genuine organizations in order to fool the user into providing sensitive data and passwords.

• Identity Theft is the stealing of somebody's personal data in order to impersonate them.

• Both of these actions are used to draw money from victims accounts or commit further crime.

Page 14: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

ENCRYPTION

Is needed to protect data from unauthorized access when it is sent over an untrusted network, like the internet. They use specific keys to transform a message into a form not understandable until the message is received.

Click icon to add picture

Page 15: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

PHYSICAL SECURITY• Measures are intended to prevent intruders from gaining

access to a computer system

• Basic physical security includes locks on computer room doors and computer cabinets , as well as alarms and body guards.

Page 16: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.

WORKS CITED

"Information Technology in a Global Society (ITGS) Textbook." ITGS Textbook. N.p., n.d. Web. 08 Oct. 2015.