12
Computer Security and Risks

Computer Security and Risks

Embed Size (px)

DESCRIPTION

Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government. Using Quizlet. Choosing one word per page and two from some - PowerPoint PPT Presentation

Citation preview

Page 1: Computer Security and Risks

Computer Security and Risks

Page 2: Computer Security and Risks

“If the law doesn't fit reality anymore, law has to be changed. That’s not a new

thing. That’s civilization as usual”Gilberto Gil Crusader in Open source

who works for the Brazilian government

Page 3: Computer Security and Risks

Using Quizlet• Choosing one word per page and two from

some• Make approximately 8 to 10 flash cards• Invite your friends to your flash cards• Learn all the terminology about computer

crime using quizlet.com

Page 4: Computer Security and Risks

Computer Crime

• Computer Forensics• cybercrime• Cyberstalking• Identity theft• Social engineering• Spoofing• Phishing• Spammer

Page 5: Computer Security and Risks

Computer Crime

• Malware• Cross platform Viruses• Macro Virus• Macros• 1999 Melisa Virus• Cross scripting Virus• Worms

Page 6: Computer Security and Risks

Computer Crime

• Trojan Horse• Logic Bomb• Time Bomb• Spyware• Tracking software• Spybot• Drive by Downloads

Page 7: Computer Security and Risks

Just as natural forests are more resistant to disease than are single-

species tree farms, mixed computing environments are less susceptible to

crippling attacks than is an organization in which everyone uses

the same hardware and software.

Page 8: Computer Security and Risks

Computer Crime

• Antivirus• Security patches• MS Slammer• Hackers• Crackers• Webjackers• Zombie Computers• Bots• Botnets

Page 9: Computer Security and Risks

Quotes• In 2007 a DDOS attack crippled the electronic

infrastructure of the republic of Estonia, one of the most wired countries in the world

• “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)

Page 10: Computer Security and Risks

Computer Crime

• DOS attacks (Denial of Service)• DDOS distributed DOS• Mafia Boy• Biometrics• Smart Card• Passwords• Access-control software• Access privileges

Page 11: Computer Security and Risks

Quotes

• “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics

Page 12: Computer Security and Risks

Computer Crime• Firewalls• Encryption• Encryption Key• Decryption• Audit control software• Backups• Generations• RAID• Automatically mirror• Instant redundancy• Off site backup• On line backup (Speed Issues)