30
Introduction Introduction IT Tralee IT Tralee Republic of Ireland Republic of Ireland Speakers – Edel Walsh Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Embed Size (px)

Citation preview

Page 1: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

IntroductionIntroduction

IT TraleeIT TraleeRepublic of IrelandRepublic of Ireland

Speakers – Edel WalshSpeakers – Edel Walsh Patrick O’ MahonyPatrick O’ Mahony Rebecca FlynnRebecca Flynn

Page 2: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Title of presentationTitle of presentation

Here are the topics that we will cover Here are the topics that we will cover ––

Edel – CybercrimeEdel – Cybercrime Rebecca-Rebecca- Patrick- EncryptionPatrick- Encryption

Page 3: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

IT TraleeIT Tralee

Firstly we will tell you a little about Firstly we will tell you a little about our college and Tralee itself.our college and Tralee itself.

Page 4: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

IT TraleeIT Tralee

The Institute of Technology, Tralee, has been to The Institute of Technology, Tralee, has been to the forefront of learning since its establishment the forefront of learning since its establishment and has gained a reputation as a centre of and has gained a reputation as a centre of distinction for teaching, learning and research. distinction for teaching, learning and research.

The Institute offers a range of full-time and part-The Institute offers a range of full-time and part-time programmes ranging from certificate time programmes ranging from certificate through to honours degree and post-graduate through to honours degree and post-graduate Masters and Doctoral level. Enhancing the taught Masters and Doctoral level. Enhancing the taught programmes at the Institute is a world class programmes at the Institute is a world class programme of research.programme of research.

Page 5: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn
Page 6: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

TraleeTralee

TraleeTralee is the county town of County is the county town of County Kerry, in the south west corner of Kerry, in the south west corner of Ireland. The name Tralee comes from Ireland. The name Tralee comes from the Irish 'Trá Lí', or 'Trá Laoi', which the Irish 'Trá Lí', or 'Trá Laoi', which means 'strand of the Lee' (river) means 'strand of the Lee' (river)

Page 7: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

TraleeTralee

Tralee is the largest town in Kerry. Tralee is the largest town in Kerry. The town's population including The town's population including suburbs was 22,744 in the 2006 suburbs was 22,744 in the 2006 census. census.

Page 8: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

TourismTourism

Tralee is a major tourism destination and has Tralee is a major tourism destination and has seen some €55 million of tourism investment over seen some €55 million of tourism investment over the past several years. The town has developed a the past several years. The town has developed a range of quality all weather visitor attractions. range of quality all weather visitor attractions. Tralee is also famous for the Rose of Tralee Tralee is also famous for the Rose of Tralee International Festival which is held annually in International Festival which is held annually in August.August.

Page 9: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

SportSport

Tralee & Kerry has a strong sporting Tralee & Kerry has a strong sporting tradition and has a number of tradition and has a number of successful Gaelic Football Clubs and successful Gaelic Football Clubs and also a strong interest in Basketball.also a strong interest in Basketball.

Page 10: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EducationEducation

In common with all parts of Ireland, most schools In common with all parts of Ireland, most schools at all levels in Tralee are managed and owned by at all levels in Tralee are managed and owned by the churches. At secondary level most schools are the churches. At secondary level most schools are explicitly Roman Catholic in ethos, except explicitly Roman Catholic in ethos, except Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.

Page 11: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

A little bit of homeA little bit of home

Page 12: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

CybercrimeCybercrime

By Edel WalshBy Edel Walsh

Page 13: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

What is cyber crimeWhat is cyber crime

When a computer or network is a When a computer or network is a tool of the criminaltool of the criminal

Examples include:

•Spamming

•Unauthorized access

•Malicious code

•Denial-of-service attacks

•Etc

Page 14: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Another way to define cybercrime is simply Another way to define cybercrime is simply as criminal activity involving the information as criminal activity involving the information

technology infrastructure, which include:technology infrastructure, which include:

illegal access

Illegal interception

Data interference

Systems inference

Misuse of

devices

Forgery

Electronic

fraud

Page 15: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Research in 2006Research in 2006

Every 10 seconds in BritainEvery 10 seconds in Britain 3.24 million times3.24 million times 90% of crimes stay unreported 90% of crimes stay unreported

Page 16: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

Shirley McGuireShirley McGuire a specialist in psychology of a specialist in psychology of the University of San Francisco performed a the University of San Francisco performed a study on 4800 students who hack and study on 4800 students who hack and invade computer systems. invade computer systems.

0%

5%

10%

15%

20%

25%

30%

35%

40%

Out of 4800 students

software piracy

enteringinformation

changes

other

Page 17: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

The study revealed that The study revealed that only 1 out of 10 hackers only 1 out of 10 hackers

were interested in causing were interested in causing certain harm or earning certain harm or earning

money. money. Most teenagers performed Most teenagers performed illegal computer actions of illegal computer actions of

curiosity, to experience curiosity, to experience excitement. excitement.

Page 18: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

The love-bug virus The love-bug virus Thursday, 4 May, 2000 Thursday, 4 May, 2000

It It crippled government and business crippled government and business computers in Asia and Europe computers in Asia and Europe

American State Department and the CIA, and American State Department and the CIA, and major companies like Ford and Time-Warner. major companies like Ford and Time-Warner.

first appeared in Hong Kong in the late first appeared in Hong Kong in the late afternoon afternoon

Analysts estimate hundreds of millions of Analysts estimate hundreds of millions of dollars of damage has been caused in the US dollars of damage has been caused in the US

1.27 million computer files were infected 1.27 million computer files were infected worldwideworldwide

Page 19: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

The Love Bug e-mail appeared on The Love Bug e-mail appeared on computer screens in both houses of computer screens in both houses of Congress in Washington and at the Congress in Washington and at the Pentagon.Pentagon.

It spread at great speed. One DJ in It spread at great speed. One DJ in Texas received the e-mail virus 1,500 Texas received the e-mail virus 1,500 times. times.

Page 20: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

The FBI have opened a criminal The FBI have opened a criminal investigation. Reports suggest the investigation. Reports suggest the virus may have originated in the virus may have originated in the Philippines. ISP Sky Internet Inc. in Philippines. ISP Sky Internet Inc. in the Philippines are reported by the Philippines are reported by ZDNet News to be hunting for a code ZDNet News to be hunting for a code writer who signed the virus code writer who signed the virus code "Spyder, Manila, Philippines" and "Spyder, Manila, Philippines" and added the comment: "I hate go to added the comment: "I hate go to school." school."

Page 21: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

By Patrick O’ MahonyBy Patrick O’ Mahony

Page 22: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption The Internet has grown at an incredibly fast The Internet has grown at an incredibly fast

rate and has excited both consumers and rate and has excited both consumers and businesses with promises of changing the way businesses with promises of changing the way we live and work. Lets be honest, there is a lot we live and work. Lets be honest, there is a lot of information that we would not like other of information that we would not like other people to see, such as: people to see, such as:

Bank Account DetailsBank Account Details Credit Card InformationCredit Card Information Social Security NumberSocial Security Number Personal E-MailsPersonal E-Mails Employee or Business RecordsEmployee or Business Records

Page 23: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

E-Business relies on the ability to send and E-Business relies on the ability to send and receive information securely. receive information securely.

Internet and computer security comes in a Internet and computer security comes in a variety of methods but the most popular variety of methods but the most popular effective ones all rely on encryption. This effective ones all rely on encryption. This process encodes information in such a way process encodes information in such a way that only the person or computer with the that only the person or computer with the “Key” can decode it. “Key” can decode it.

Page 24: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

Encryption is based on the ancient science Encryption is based on the ancient science of cryptography. of cryptography.

Page 25: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

Computer encryption systems are Computer encryption systems are divided into two categories:divided into two categories:

Public-Key Encryption Public-Key Encryption Symmetric-Key EncryptionSymmetric-Key Encryption

Page 26: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

Public-Key Encryption –Public-Key Encryption –

Page 27: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

Symmetric-Key Encryption –Symmetric-Key Encryption –

Page 28: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption Authentication – Authentication –

This process works in tandem with encryption to This process works in tandem with encryption to create a secure environment on your computer. create a secure environment on your computer. There are several ways to authenticate a person There are several ways to authenticate a person or their information on a computer –or their information on a computer –

PasswordsPasswords Digital SignaturesDigital Signatures BiometricsBiometrics

Page 29: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption Biometrics uses biological information to verify Biometrics uses biological information to verify

the user’s identity. Some methods of Biometrics the user’s identity. Some methods of Biometrics are :are :

Voice Identification Voice Identification Face ScanFace Scan Retina ScanRetina Scan Fingerprint ScanFingerprint Scan

Page 30: Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Patrick O’ Mahony Rebecca Flynn Rebecca Flynn

EncryptionEncryption

Some good links – Some good links – www.entrust.comwww.entrust.com www.pgp.comwww.pgp.com www.ssh.fi/tech/crypto/intro.htmlwww.ssh.fi/tech/crypto/intro.html www.tatanka.comwww.tatanka.com www.elock.comwww.elock.com www.qmw.ac.ukwww.qmw.ac.uk