12
--CYBER SECURITY-- --CYBER SECURITY-- By: Jamea Miller By: Jamea Miller June 7, 2008 June 7, 2008

--CYBER SECURITY--

  • Upload
    pancho

  • View
    76

  • Download
    2

Embed Size (px)

DESCRIPTION

--CYBER SECURITY--. By: Jamea Miller June 7, 2008. What is Cyber Security?. We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks. Things to be aware of…. Hackers - PowerPoint PPT Presentation

Citation preview

Page 1: --CYBER SECURITY--

--CYBER SECURITY----CYBER SECURITY--

By: Jamea MillerBy: Jamea Miller

June 7, 2008June 7, 2008

Page 2: --CYBER SECURITY--

What is Cyber Security?

We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks.

Page 3: --CYBER SECURITY--

Things to be aware of…Things to be aware of…

HackersHackers IntrudersIntruders AttackersAttackers--All of these are people who’s actions could --All of these are people who’s actions could

cause harm to your computer and the cause harm to your computer and the information stored on your computer-- information stored on your computer--

These people’s intentions are not all the same, These people’s intentions are not all the same, meaning that some of them intend harm and meaning that some of them intend harm and others don’t.others don’t.

Page 4: --CYBER SECURITY--

BASIC MALICIOUS CODE BASIC MALICIOUS CODE TERMSTERMS

VIRUS — a virus requires that you take an action before VIRUS — a virus requires that you take an action before it can infect your computer, such as opening an infected it can infect your computer, such as opening an infected e-mail, or clicking on particular linke-mail, or clicking on particular link

WORMS — a worm doesn’t have to be responded to to WORMS — a worm doesn’t have to be responded to to infect your computer. They feed off of software infect your computer. They feed off of software weaknesses and vulnerability. After the worm is inside weaknesses and vulnerability. After the worm is inside the software, it searches for other computers to infect. the software, it searches for other computers to infect. Worms operate through e-mail and web pages as wellWorms operate through e-mail and web pages as well

TROJAN HORSES — a trojan horses is software that is TROJAN HORSES — a trojan horses is software that is disguised as something else. Because of the disguise, disguised as something else. Because of the disguise, users allow them onto the software without knowing that users allow them onto the software without knowing that harm is being done.harm is being done.

Page 5: --CYBER SECURITY--

……..about firewalls..about firewalls

FIREWALLS PROVIDE PROTECTION FIREWALLS PROVIDE PROTECTION AGAINST ATTACKERS BY ACTING AS A AGAINST ATTACKERS BY ACTING AS A WALL BETWEEN YOUR COMPUTER OR WALL BETWEEN YOUR COMPUTER OR NETWORK AND UNNECESSARY NETWORK AND UNNECESSARY INTERNET TRAFFIC.INTERNET TRAFFIC.

Page 6: --CYBER SECURITY--

There are 2 types of firewallsThere are 2 types of firewalls

► HARDWAREHARDWARE-CALLED NETWORK FIREWALLS-CALLED NETWORK FIREWALLS

-EXTERNAL DEVICES-EXTERNAL DEVICES-POSITIONED BETWEEN COMPUTER OR NETWORK -POSITIONED BETWEEN COMPUTER OR NETWORK

AND YOUR CABLE OR DSL MODEMAND YOUR CABLE OR DSL MODEM-USEFUL FOR PROTECTING MULTIPLE COMPUTERS-USEFUL FOR PROTECTING MULTIPLE COMPUTERS

-AVAILABLE FOR LESS THAN $100.-AVAILABLE FOR LESS THAN $100.

Page 7: --CYBER SECURITY--

There are 2 types of firewallsThere are 2 types of firewalls

►SOFTWARESOFTWARE-INTERNAL DEVICE-INTERNAL DEVICE

-ONLY NECESSARY IF YOU DO NOT HAVE A BUILT IN -ONLY NECESSARY IF YOU DO NOT HAVE A BUILT IN FIREWALLFIREWALL

-BEST TI INSTALL FROM A CD, DVD, OR FLOPPY DISK-BEST TI INSTALL FROM A CD, DVD, OR FLOPPY DISK-HAVING THIS FIREWALL ON THE SAME COMPUTER AS -HAVING THIS FIREWALL ON THE SAME COMPUTER AS

THE INFORMATION YOUR TRYING TO PROTECT MAY THE INFORMATION YOUR TRYING TO PROTECT MAY STOP THE FRIELWALL FROM BLOCKING THINGS STOP THE FRIELWALL FROM BLOCKING THINGS

BEFORE THEY REACH YOUR SYSTEM- information BEFORE THEY REACH YOUR SYSTEM- information attained attained

from…http://www.us-cert.gov/cas/tips/ST04-from…http://www.us-cert.gov/cas/tips/ST04-004.html004.html

Page 8: --CYBER SECURITY--

SPYWARESPYWARE

SPYWARE IS A SOFTWARE THAT WHNE INSTALLED SPYWARE IS A SOFTWARE THAT WHNE INSTALLED ON YOUR COMPUTER SENDS YOU POP UP ON YOUR COMPUTER SENDS YOU POP UP ADS,MONITOR THE SITED YOU VISIT AND ADS,MONITOR THE SITED YOU VISIT AND REDIRECT YOUR BROWSER TO CERTAIN REDIRECT YOUR BROWSER TO CERTAIN WEBSITES…SOME VERSIONS OF SPYWARE CAN WEBSITES…SOME VERSIONS OF SPYWARE CAN EVN MONITOR EVERY KEYSTROKE TAKEN.EVN MONITOR EVERY KEYSTROKE TAKEN.

SPYWARE ALERT!!!!SPYWARE ALERT!!!! ENDLESS POP UP WINDOWSENDLESS POP UP WINDOWS

RANDOM WINDOW ERROR MESSAGESRANDOM WINDOW ERROR MESSAGES NEW TOOLBARS APPEAR IN YOUR WEB BROWSERNEW TOOLBARS APPEAR IN YOUR WEB BROWSER

BEING REDIRECTED TO WEBSITES OTHER THAN WHAT BEING REDIRECTED TO WEBSITES OTHER THAN WHAT YOU TYPED INTO YOUR WEB BROWSERYOU TYPED INTO YOUR WEB BROWSER

Page 9: --CYBER SECURITY--

WHY PASSWORDS ARE WHY PASSWORDS ARE IMPORTANTIMPORTANT

PASSWORDS ARE THE KEY TO “LOCKED” PASSWORDS ARE THE KEY TO “LOCKED” INFORMATION. IF A PASSWORD IS WEAK, IT INFORMATION. IF A PASSWORD IS WEAK, IT IS EASIER TO FIGURE OUT AND EASIER IS EASIER TO FIGURE OUT AND EASIER FOR THE PROTECTED INFROMATION TO BE FOR THE PROTECTED INFROMATION TO BE ATTAINEDATTAINED

Page 10: --CYBER SECURITY--

A STRONG PASSWORD A STRONG PASSWORD CONSISTS OF…CONSISTS OF…

A COMBINATION OF UPPER AND LOWER CASE A COMBINATION OF UPPER AND LOWER CASE LETTERSLETTERS

NO PERSONAL INFORMATIONNO PERSONAL INFORMATION A COMBINATION OF LETTERS, NUMBERS, AND A COMBINATION OF LETTERS, NUMBERS, AND

SPECIAL SYMBOLSSPECIAL SYMBOLS

USE DIFFERENT PASSWORDS FOR DIFFERENT USE DIFFERENT PASSWORDS FOR DIFFERENT SYSYTEMS!!SYSYTEMS!!

Page 11: --CYBER SECURITY--

IN CONCLUSION……IN CONCLUSION……

CYBER SECURITY IS VERY IMPORTANT CYBER SECURITY IS VERY IMPORTANT TO THE LIFE AND EFFICIENCY OF TO THE LIFE AND EFFICIENCY OF YOUR COMPUTER AND NETWORKYOUR COMPUTER AND NETWORK

Page 12: --CYBER SECURITY--

INFORMATION ATTAINED INFORMATION ATTAINED FROM THE FOLLOWINGFROM THE FOLLOWING

http://www.us-cert.gov/cas/tips/ST04-002.hhttp://www.us-cert.gov/cas/tips/ST04-002.htmltml

http://search.us-cert.gov/search?http://search.us-cert.gov/search?q=PASSWORDS&entqr=0&ud=1&sort=datq=PASSWORDS&entqr=0&ud=1&sort=date%3AD%3ALe%3AD%3AL%3Ad1&output=xml_no_dtd&oe=UTF-%3Ad1&output=xml_no_dtd&oe=UTF-8&ie=UTF-8&ie=UTF-8&client=default_frontend&proxystyleshee8&client=default_frontend&proxystylesheet=default_frontend&hq=inurl%3Awww.us-t=default_frontend&hq=inurl%3Awww.us-cert.gov%2F&site=default_collectioncert.gov%2F&site=default_collection

GOOGLE IMAGESGOOGLE IMAGES