Unformatted text preview:

Discovering ComputersChapt 11 Objectives: Security & PrivacyProtect Yourself Online !Hacking & Firewalls CartoonComputer Viruses are on the increaseQuestion about VirusesVirus AnswerStuxNet Computer Worm/VirusPredator Drone Virus (Oct 2011)SCADA Network AttacksSCADA AttacksSCADA Nodes in Network DiagramReporting Cyber Threats & AttacksSymantec SecurityOnline Fraud is on the Rise !Information Privacy: Computer ForensicsSlide 17Forensics: Sources of Digital EvidenceDigital Deception: CAPTCHAStop the Malware at the Server !Computer Security RisksLost Devices (Laptops, USB Flash drives)Computer Security: VirusesThe SMART ENGINE virus (2011)The SMART ENGINE virus (2011)DNSChanger is a Trojan (2012)DNSChanger is a Trojan (2012)The First Internet WormComputer Viruses, Worms, and Trojan HorsesComputer Viruses, Worms, and Trojan HorsesComputer Security: Cyber AttacksCybersecurity (DHS)Cyber Extortion (May 2009)Cyber Extortion (May 2009)Cyber Extortion (the coming wave ?)Cyber Extortion (the coming wave ?)Cyber Extortion (the coming wave ?)DNS Servers (non-root servers)DNS Root Servers (19) on the InternetDNS Root Servers on the InternetDNS Cache Poisoning AttacksDNS Cache Poisoning AttacksComputer Viruses, Worms, and Trojan HorsesTypes of Network AttacksNetwork Attacks: Intrusion RoutesOverview of Network Attack TypesOverview of Network Attack TypesSocial Engineering: A True StoryViruses and WormsSQL Injection Attacks (May 2008)What is a “Hacker”, a “ Cracker” ?Hacker Software Tool Starter KitsHacker Software Tool Starter KitsAutomobile VirusesA few Automobile MicroprocessorsMobile Phone (Cell Phone) VirusesiPods: Pod Slurping & BlueSnarfingMobile Devices: Protecting DataComputer Security: VirusesComputer Viruses, Worms, and Trojan HorsesComputer VirusTrojan HorseWormKeystroke LoggerKeyKatcher: Hardware KeyloggerBackdoorRootkitsBots & BotnetsBotnetsThe Conficker Botnet (January 26, 2009)Computer Viruses, Worms, and Trojan HorsesComputer Viruses, Worms, and Trojan HorsesCreating Macros in Microsoft Word…Antivirus SoftwareComputer Viruses, Worms, and Trojan HorsesComputer Viruses, Worms, and Trojan HorsesQuarantine (Definition)AntiVirus Programs can Innoculate a FileComputer Viruses, Worms, and Trojan HorsesAbout Anti-Virus Programs…CryptographyCryptogram ExampleCryptogram DecodedAnother CryptogramAnother CryptogramSteganography: Hiding Secret MessagesSteganography: Hiding Secret MessagesSteganography Text ExampleSteganography ExamplesSteganography ExamplesSteganography: Hiding Secret MessagesConcealar SoftwareHow is Steganography used today ?How is Steganography used today ?Possible Use by Terrorist GroupsUnauthorized Access and Use: FirewallsUnauthorized Access and Use: FirewallsUnauthorized Access: Firewalls: WindowsUnauthorized Access: ZoneAlarm FirewallUnauthorized Access and UseUnauthorized Access and UseIntrusion Detection SoftwareIntrusion Detection Software: HoneypotsUnauthorized Access and Use: PasswordsUnauthorized Access and Use: PasswordsUnauthorized Access and Use: PasswordsMore about Passwords…Passwords: More informationCheck your Password StrengthPINs: Unauthorized Access and UseBiometrics: Unauthorized Access and UseFBI Biometrics Database: Privacy ConcernsHardware Theft and VandalismSoftware TheftSoftware TheftSafeguards against Software TheftWindows 7 Product KeySoftware Piracy and Software TheftSoftware PiracyInformation TheftInformation TheftAsymmetric Encryption (Public Key/Private Key)Symmetric Encryption (Same Keys)Asymmetric Key EncryptionSymmetric Key EncryptionData EncryptionData Encryption SoftwareSoftware to Erase Data FilesCauses of System FailuresSystem Failure: UPS & Surge ProtectorsSystem Failure: Surge ProtectorsBacking Up — The Ultimate SafeguardTypes of Backup ProceduresIncremental BackupsDifferential BackupsInternet Security RisksSlide 137Internet Security RisksInternet Security RisksOther Certificate AuthoritiesCertificate Authority DefinitionInternet Security RisksSecure Electronics Transactions (SET™)Secure HTTP (S-HTTP)Internet Security RisksPGP Email Encryption SoftwareInternet Security Risks: Secure EmailEmail Out-of-Office Auto RepliesHashing Software and Uses (Security)Hashing Software and Uses (Security)Wireless SecurityEthics and SocietyInformation PrivacyInformation PrivacyInformation PrivacyInformation Privacy: CookiesSession & Temporary CookiesPersistent CookiesFirst Party CookiesThird Party CookiesTracking CookiesInformation PrivacyInformation PrivacySpywareSocial Networking (Facebook)RisksMicrosoft targets SpywareTrojan Horse & Key LoggersKeystroke Logger ReportInformation PrivacyWhat is “Phishing” ? (Fishing)Phishing ExamplePhishing from Fake PayPal Web siteWhat is “Phishing” ? (Fishing)Phishing: Financial ImpactPhishing and CriminalsPharmingPharming: Phony Web SitesIdentity TheftControlling Spam (Junk Email)Controlling Spam (Junk Email)Control Spam: Set up 2 Gmail AccountsControlling Spam (Junk Email)Information Privacy LawsThe DMCA of 1998Information Privacy: Content FilteringInternet Content Rating AssnInformation Privacy (COPA)Computer Crimes: Child PornographyReporting Online PredatorsInternet Security: P vs. NP ProblemPolynomialsEnd of Chapter 11Firewalls (optional)What is a Firewall ?Internal and Personal FirewallsPacket FilteringProxy ServersProxy Gateways on NetworksNetwork Address Translation (NAT)Network Address Translation (NAT)Accessing Internet ServicesTroubleshooting Access Through FirewallsNetwork Security ZonesFirewall TopologiesPacket Filtering TopologyDual-Homed Bastion HostTriple-Homed Bastion HostScreened Subnet: End: Optional MaterialEnd Chapter 11: Computer SecurityDiscovering Computers CHAPTER 11CYBER SECURITYChapt 11 Objectives: Security & PrivacyDescribe the types of computer security risksDescribe the types of computer security risksIdentify ways to safeguard against computer viruses, worms, and Trojan horsesIdentify ways to safeguard against computer viruses, worms, and Trojan horsesDiscuss techniques to prevent unauthorized computer access and useDiscuss techniques to prevent unauthorized computer access and useIdentify safeguards against hardware theft and vandalismIdentify safeguards against hardware theft and vandalismExplain the ways software manufacturers protect against software piracyExplain the ways software manufacturers protect against software piracyDefine encryption (public key/private key) and explain why it is necessaryDefine encryption (public key/private key) and


View Full Document

NOVA ITE 100 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?