Computer Security and Risks

Preview:

DESCRIPTION

Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government. Using Quizlet. Choosing one word per page and two from some - PowerPoint PPT Presentation

Citation preview

Computer Security and Risks

“If the law doesn't fit reality anymore, law has to be changed. That’s not a new

thing. That’s civilization as usual”Gilberto Gil Crusader in Open source

who works for the Brazilian government

Using Quizlet• Choosing one word per page and two from

some• Make approximately 8 to 10 flash cards• Invite your friends to your flash cards• Learn all the terminology about computer

crime using quizlet.com

Computer Crime

• Computer Forensics• cybercrime• Cyberstalking• Identity theft• Social engineering• Spoofing• Phishing• Spammer

Computer Crime

• Malware• Cross platform Viruses• Macro Virus• Macros• 1999 Melisa Virus• Cross scripting Virus• Worms

Computer Crime

• Trojan Horse• Logic Bomb• Time Bomb• Spyware• Tracking software• Spybot• Drive by Downloads

Just as natural forests are more resistant to disease than are single-

species tree farms, mixed computing environments are less susceptible to

crippling attacks than is an organization in which everyone uses

the same hardware and software.

Computer Crime

• Antivirus• Security patches• MS Slammer• Hackers• Crackers• Webjackers• Zombie Computers• Bots• Botnets

Quotes• In 2007 a DDOS attack crippled the electronic

infrastructure of the republic of Estonia, one of the most wired countries in the world

• “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)

Computer Crime

• DOS attacks (Denial of Service)• DDOS distributed DOS• Mafia Boy• Biometrics• Smart Card• Passwords• Access-control software• Access privileges

Quotes

• “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics

Computer Crime• Firewalls• Encryption• Encryption Key• Decryption• Audit control software• Backups• Generations• RAID• Automatically mirror• Instant redundancy• Off site backup• On line backup (Speed Issues)

Recommended