Introduction to Cybercrime and Security - Eastern...

19
DIYTP 2009

Transcript of Introduction to Cybercrime and Security - Eastern...

Page 1: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

DIYTP 2009

Page 2: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

What is Cybercrime?

Using the Internet to commit a crime. Identity Theft Hacking Viruses

Facilitation of traditional criminal activity Stalking Stealing information Child Pornography

Page 3: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Cybercrime Components

Computers

Cell Phones

PDA’s

Game Consoles

Page 4: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

High-Profile Cybercrime-related Cases

TJ Maxx data breach 45 million credit and debit card numbers

stolen Kwame Kilpatrick

Cell phone text messages BTK Serial Killer Kevin Mitnick

Page 5: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security

Confidentiality Only those authorized to view information

Integrity Information is correct and hasn’t been

altered by unauthorized users or software

Availability Data is accessible to authorized users

Page 6: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security

Figure 1.0 – CIA Triangle

Page 7: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Threats

Malware Software that has a malicious purpose

Viruses Trojan horse Spyware

Page 8: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Threats

Intrusions Any attempt to gain unauthorized access

to a system Cracking Hacking Social Engineering War-driving

Page 9: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Threats Denial-of-Service (DOS)

Prevention of legitimate access to systems

Also Distributed-Denial-of-Service (DDoS)

Different types: Ping-of-Death Teardrop Smurf SYN

Page 10: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Threats

Figure 1.1 – DoS and DDoS Models

Page 11: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Terminology People

Hackers White Hat – Good guys. Report

hacks/vulnerabilities to appropriate people.

Black Hat – Only interested in personal goals, regardless of impact.

Gray Hat – Somewhere in between.

Page 12: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Terminology Script Kiddies

Someone that calls themselves a ‘hacker’ but really isn’t

Ethical Hacker Someone hired to hack a system to find

vulnerabilities and report on them. Also called a ‘sneaker’

Page 13: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Terminology Security Devices

Firewall Barrier between network and the outside

world. Proxy server

Sits between users and server. Two main functions are to improve performance and filter requests.

Intrusion Detection Systems (IDS) Monitors network traffic for suspicious

activity.

Page 14: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Terminology Activities

Phreaking Breaking into telephone systems (used in

conjunction with war-dialing) Authentication

Determines whether credentials are authorized to access a resource

Auditing Reviewing logs, records, or procedures for

compliance with standards

Page 15: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Careers Information Security Analyst

US National Average Salary

Figure 1.2 – Median salary courtesy cbsalary.com

Page 16: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Certifications Entry-level

Security+ http://www.comptia.org/certifications/listed/security.aspx

CIW Security Analyst www.ciwcertified.com

Intermediate MSCE Security

http://www.microsoft.com/learning/en/us/certification/mcse.aspx#tab3

Professional CISSP www.isc2.org SANS www.sans.org

Page 17: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Education Community-college

Washtenaw Community College Computer Systems Security

http://www4.wccnet.edu/academicinfo/creditofferings/programs/degree.php?code=APCSS

Computer Forensics http://www4.wccnet.edu/academicinfo/creditofferings/programs/degree.php?code=APDRAD

Page 18: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...

Computer Security - Education 4-Year College

Eastern Michigan University Information Assurance

Applied Network Cryptography Management

http://www.emich.edu/ia/undergraduate.html

Page 19: Introduction to Cybercrime and Security - Eastern …igre.emich.edu/mytc/sites/default/files/ppt/… · PPT file · Web view · 2009-07-19Using the Internet to commit a crime. ...