Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect...

24
Tutorial Chapter 5

Transcript of Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect...

Page 1: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

Tutorial

Chapter 5

Page 2: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

2

Question 1:

What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

Page 3: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

3

Answer: Adware: collects info about users to determine what

adverts to display in browser Phishing: sending fraudulent e-mails to direct recipients

to false web-sites to capture private info keystroke loggers: monitor and record keystrokes to

collect credit card numbers while doing online shopping Sniffing: capturing and recording network traffic to

intercept information Spoofing: attempt to gain access to a network by posing

as an authorized user to find sensitive information.

Page 4: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

4

Question 2:

What are the three dimensions of the CIA triangle used to design a security system?

Page 5: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

5

Answer:

C- Confidentiality,

I- integrity, and

A- availability

Page 6: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

6

Question 3:

Give two examples of intentional threats to network security.

Page 7: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

7

Answer:

Hacker attacks and Attacks by disgruntled employees—

spreading a virus or a worm on the company network.

Page 8: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

8

Question 4:

1. Give four examples of biometric security.

2. Which one is the most effective?

Page 9: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

9

Answer:

Facial recognition, fingerprints, hand geometry, and Iris analysis.

Iris analysis is probably most effective.

Page 10: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

10

Question 5:

What two types of encryption were introduced in this chapter?

Page 11: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

11

Answer:

Asymmetric (also called public key encryption) and

symmetric.

Page 12: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

12

Question 6:

What is business continuity planning? Why is it used?

Page 13: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

13

Answer:

Outline procedures for keeping an organization operational in the event of a natural disaster or network attack.

To lessen the effects of a natural disaster or a network attack or intrusion.

Page 14: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

14

Question 7:

Assume you have been asked to put together a security policy for your local bank: Outline your top five recommendations to the

bank. What are some of the risks to online banking? How can the security and privacy of online

banking be improved?

Page 15: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

15

Answer 1: Developing clear, detailed security policy and

procedures Providing security training and security

awareness for key decision makers and computer users

Periodically assessing the security policy’s effectiveness

Developing an audit procedure for system access and use

Page 16: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

16

Cont:

Overseeing enforcement of the security policy

AND: designing an audit trail procedure for incoming and outgoing data.

Page 17: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

17

Answer 2:

Confidentiality: information can be accessed by other than sender or recipient

Authentication: how can the recipient be sure that the data is actually from the sender

Integrity: How can the recipient know that the contents have not be changed during transmission

Nonrepudiation: the sender can denied sending the data The receiver can denied having received the data

Page 18: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

18

Answer 3:

Authentication: Is important because the person logging in isn’t

necessarily the account holder What the receiver knows to be accurate, and what

the sender is providing: mother’s maiden name, ID, DOB

Confirmation: Verifying transaction, usually a digital signed

confirmation with a private key

Page 19: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

19

Cont:

Non-repudiation Dispute over the transaction. Digital signatures

are used to bind the two partners. The customer receives a proof of deposit/

withdrawal, and bank is assured of client’s identity.

Page 20: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

20

True/False?

A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet.

A Trojan program consists of self-propagating program code that is triggered by a specified time or event

Page 21: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

21

Selection:

14.

15.

Page 22: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

22

Case Study 1: what is it about?

Destroyed files and stole passwords Around the world in 2 hours; 3 times faster

than Melissa virus NASA and CIA Damages Tracing Cybercrime

Page 23: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

23

Questions:

Calculation of costs? Laws for prosecuting hackers? How can organizations guard against

virusses?

Page 24: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?

24

Homework:

Case Study 2