Privacy, Security


Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Privacy, Security

  1. 1. It all depends on your perspective!  Dear Tech Support: Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed a slowdown in the overall performance, particularly in the flower and jewelry applications that had operated flawlessly under Boyfriend 5.0. In addition, Husband 1.0 un- installed many other valuable programs, such as Romance 9.5and Personal Attention 6.5, but installed undesirable programs such as NFL5.0 and NBA 3.0. And now Conversation 8.0 no longer runs and House Cleaning2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail. What can I do? Signed, Desperate 2
  2. 2. Dear Desperate: First keep in mind - Boyfriend 5.0 is an entertainment package, while Husband 1.0 is an operating system. Try entering the Command C:I THOUGHTYOU LOVED ME and download Tears 6.2 to install Guilt 3.0. If all works as designed, Husband 1.0 should then automatically run the applications Jewelry 2.0 and Flowers 3.5. But remember, overuse can cause Husband 1.0 to default to Grumpy Silence 2.5, Happy Hour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will create SnoringLoudly.wav files. Whatever you do, DO NOT install Mother-in-Law 1.0 or reinstall another Boyfriend program. These are not supported applications and will crash Husband 1.0. In summary, Husband1.0 is a great program, but it does have a limited memory and cannot learn new applications quickly. You might consider additional software to improve memory and performance. I personally recommend Great Food 3.0 and Lingerie 6.9. Good Luck! Tech Support 3
  3. 3. Security vulnerabilities or security holes  › Software bugs that allow violations of information security Software patches  › Corrections to software bugs that cause security holes Piracy  › The illegal copying, use, and distribution of digital intellectual property 4
  4. 4. Common forms of authentication  › Something you know  Password or personal identification number (PIN) › Something you have  ID cards, smartcards, badges, keys, › Something about you  Unique physical characteristics such as fingerprints 5
  5. 5. Username  › Identifies a user to the computer system Password  › A combination of characters known only to the user that is used for authentication Strongest passwords  › Minimum of eight characters in length › Do not include any known words or names 6
  6. 6. Longer passwords provide greater security  How can you make your password more secure?  7
  7. 7. Biometrics  › The science and technology of authentication by scanning and measuring a person’s unique physical features Facial pattern recognition  › Uses mathematical technique to measure the distances between 128 points on the face Retinal scanning  Biometrics Video What does the future hold? 8
  8. 8. California Bill to Blur Google Earth   Google Flu Trends  Just how much data does Google have about us…and how long do they maintain it? › Google used to store such data for 18 months, but has now trimmed that duration to nine months. Until two years ago, Google had kept personally identifiable information about its Web for an indefinite amount of time 9
  9. 9. Intrusion detection software Access control defines who analyzes network traffic, assesses can access computer and system vulnerabilities, and identifies what actions they can take intrusions and suspicious behavior Audit trail records access attempts
  10. 10. Security and network usage policy  › Document, agreement, or contract that  Defines acceptable and unacceptable uses of computer and network resources › Typically warn against using the network for illegal activities › Often called the “IT Code of Conduct” 11
  11. 11. According to Symantec: SPAM accounts for 72% of all email messages Most from US….followed by Russia then Turkey. 2003 Can-Spam Act in US May, 2008: $230 million in its suit in favor of MySpace against the “Spam King”, Sanford Wallace 12
  12. 12. Methods of Attack  › Key-logging › packet-sniffing › Port-scanning › Social engineering › Dumpster diving 13
  13. 13. Virus  › Program that attaches itself to a file › Spreads to other files, and delivers a destructive action called a payload Trojan horses  › Appear to be harmless programs › When they run, install programs on the computer that can be harmful Worm  › Acts as a free agent, replicating itself numerous times in an effort to overwhelm systems Microsoft Video 14
  14. 14. Worm copies Virus is a Trojan horse hides Payload itself repeatedly, potentially within (destructive using up damaging or looks like event) that is resources computer legitimate delivered when and possibly program program until you open file, run shutting down triggered infected computer or program, or boot network computer with Does not Can spread infected disk replicate and in disk drive itself on damage other files computers Mobile Viruses
  15. 15. Specific  pattern of virus code
  16. 16. Records information about program such as file size and creation Uses date Attempts information to remove to detect if any detected virus tampers virus with file Quarantines infected files that it cannot Keeps file in separate remove area of hard disk
  17. 17. Never open an e-mail attachment Set the macro security Install an antivirus unless you are in programs so you program on all of expecting it and can enable or disable your computers it is from a macros trusted source If the antivirus Check all program flags an downloaded e-mail attachment Install a personal programs for as infected, delete firewall program viruses, worms, the attachment or Trojan horses immediately
  18. 18. Spyware  › Software installed on a computer without user’s knowledge Zombie computer  › Carries out actions (often malicious) under the remote control of a hacker Antispyware  › Software that searches a computer for spyware and other software that may violate a user’s privacy The latest from 19
  19. 19. Viruses: $5.2 billion  Spyware: $2.6 billion  Phishing: $630 million  Source: Consumer Reports, 9/06
  20. 20. •Runs consistently slower than normal  •Stops responding or locks up often  •Crashes and restarts every few minutes  •Restarts on its own and then fails to run  normally •Applications don't work properly  •Disks or disk drives are inaccessible  •Printing doesn't work correctly  •You see unusual error messages  •You see distorted menus and dialog boxes 
  21. 21. 59 million attempts from North America alone  during 24 hours of monitoring (Consumer Reports, 9/06) Highest percentage (1/3) from US  (Symantec, 3/07) Temple thwarts about 2000 attacks a day  Security breach example:  › April, 2006: University Texas – 197,000 social security numbers breached PA Breach of Personal Information Notification  Act › 34 states have these
  22. 22. Malicious programs that control your PC without  your knowledge 6 million known cases, 2nd half of 2006 (Symantec)  Turns your PC into a spam machine or a host for  phishing sites Few years ago….Temple….server was hijacked  and attacks launched from there. Brought down Ministry of Education’s System in Amsterdam. Interpol was involved.
  23. 23. 2/3 of top risks in late 2006 (source: Symantec)  were to get confidential information 80% of these tracked key strokes  The Black Market (source: 3/21/07 WSJ)  › Complete ID, including name, address, birth date, ss#, bank accounts, etc. ---- $14-$18 › Verified PayPal Account --- $50-$500
  24. 24. Security system  consisting of hardware and/or software that prevents unauthorized network access 25
  25. 25. Program that protects personal computer and its data  from unauthorized intrusions Monitors transmissions to and from computer  Informs you of attempted intrusion  26
  26. 26. 10 quick fixes for security problems 27
  27. 27. 28
  28. 28. Duplicate of file, program, or disk Three-generation Full backup Selective backup backup all files in select which files preserves computer to back up three copies of important files In case of system failure or corrupted files, restore files by copying to original location
  29. 29. 30
  30. 30. Discovery, collection, and analysis of evidence  found on computers and networks Computer forensic analysts must have knowledge  of the law, technical experience, communication skills, and willingness to learn 31
  31. 31. “Be the change you wish to see in the world.” - Mahatma Ghandi 32