SlideShare a Scribd company logo
1 of 17
COOKIES
•   A message passed from a web server to a web browser that is sent
    back to the server each time the browser requests a page from that
    server

•   Normally used for authentication purposes

•   May contain sensitive/private info, thus posing security risk
BOTNETS AND CYBERATTACK SUPPLY
            CHAIN
•   “Destructive software robots working together on a collection of
    zombie computers”!!

•   Ouch, straight out of a SiFi horror story but the threat is very real.
HIGHLY SPECIALIZED
             IDENTITY THEFT
•A
 phishing attack on the internet can be a professional
multi-step task involving:
 •   A programmer (writes attack templates)

 •   A phisher (designs the attack)

 •   A cracker (provides hosting space for attack)

 •   A Bot herder (access to botnet zombie computers)
INTERNET HOAXES

•   A false message circulated online about new viruses

•   May cause your inbox to get flooded with junk-mail

•   Hoaxbusters warn about know hoaxes
CYBERSQUATTING
•   The practice of registering a domain name and trying to sell it to
    those who are most likely to want their trademark back

    •   Ex: eminemmobile.com sued by Eminem for use of his name to
        make money

•   This crime may lead to $100,000 fine and forfeiture of disputed
    name for offenders.
CYBER HARRASSMENT, STALKING,
               AND BULLYING
•   Victims endure

    •   Distress from obscene, vulgar, or threatening content

    •   Repeated unwanted contact from aggressor

    •   Posting of personal information on chat rooms and web sites

•   Social networks provide ways to report predators as a defense
SOFTWARE PRIACY

•   Illegal distribution of bootleg copies to others (for free or to sell)

•   Software is intellectual property and offenders are subject to patent
    and copyright laws

•   Solving piracy problem is still a major issue
GLOBAL PROBLEM

•   Piracy is an international issue

•   The unwillingness of governments and individuals to recognize
    software copyrights is a huge roadblock to solving the issue

•   Billions of dollars lost each year
CYBERWAR
•   This is one country’s military attempt to destroy the information and
    communication systems of another

•   Most advanced nations are most vulnerable

•   Attacks shut down country’s economic system, transportation and
    medical capabilities, etc.
FUNCTIONS OF CYBERWAR

•   Disabling enemy’s smart weapons and controls systems

•   Distributing cyberpropaganda

•   Stealing or modifying information (espionage)
A NEW COLD WAR
•   Nations secretly testing networks to gain advantage or inflict damage
    on potential enemy nations ushers in a new type of cold war
CYBERTERRORISM
•   Individuals or organized groups using technology to intimidate or
    harm governments and/or civilians

•   Causes virtual physical damage

•   Nuclear power plants, dams, power grids, etc., are all affected
DISADVANTAGES FOR THE CYBER
               ATTACKER
•   May not achieve as much destruction as physical weapons

•   Requires continuous updating of systems as older methods quickly
    become outdated

•   Less drama and emotional appeal as traditional attacks
GLOBALIZATION OF
                 TERRORISM
•   Cyberwar and Cyberterrorism will only increase as dependence on
    technology increases

•   Controlling these attacks is a great challenge for the future
INFORMATION SYSTEMS
              SECURITY
•   All systems connected to networks are vulnerable to security
    violations

•   Taking precaution is necessary and a variety of technologies have
    been created for this purpose
SAFEGUARDING IS
                   RESOURCES
•   Systems security auditing identifies most vulnerable systems in an
    organization

•   Followed by designing and implementing security measures
RISK ANALYSIS
•    Determines if a company should take one of three courses of
     action:

    1. Risk Reduction (actively invest in protect systems)
    2. Risk Acceptance (do nothing, just absorb any damages)

    3. Risk Transference (buy insurance or outsource risky
        functions)

More Related Content

What's hot

Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagnerDevonWagner
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagnerDevonWagner
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 

What's hot (19)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberware
CyberwareCyberware
Cyberware
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 

Viewers also liked

Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2misecho
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 

Viewers also liked (7)

Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Mis
MisMis
Mis
 
Mis 2101 Questions
Mis 2101 QuestionsMis 2101 Questions
Mis 2101 Questions
 

Similar to Echo p.410 422 ch 10, irina

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to PreventShamiul Lajib
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

Similar to Echo p.410 422 ch 10, irina (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Hacking
HackingHacking
Hacking
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 

Recently uploaded (20)

Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 

Echo p.410 422 ch 10, irina

  • 1. COOKIES • A message passed from a web server to a web browser that is sent back to the server each time the browser requests a page from that server • Normally used for authentication purposes • May contain sensitive/private info, thus posing security risk
  • 2. BOTNETS AND CYBERATTACK SUPPLY CHAIN • “Destructive software robots working together on a collection of zombie computers”!! • Ouch, straight out of a SiFi horror story but the threat is very real.
  • 3. HIGHLY SPECIALIZED IDENTITY THEFT •A phishing attack on the internet can be a professional multi-step task involving: • A programmer (writes attack templates) • A phisher (designs the attack) • A cracker (provides hosting space for attack) • A Bot herder (access to botnet zombie computers)
  • 4. INTERNET HOAXES • A false message circulated online about new viruses • May cause your inbox to get flooded with junk-mail • Hoaxbusters warn about know hoaxes
  • 5. CYBERSQUATTING • The practice of registering a domain name and trying to sell it to those who are most likely to want their trademark back • Ex: eminemmobile.com sued by Eminem for use of his name to make money • This crime may lead to $100,000 fine and forfeiture of disputed name for offenders.
  • 6. CYBER HARRASSMENT, STALKING, AND BULLYING • Victims endure • Distress from obscene, vulgar, or threatening content • Repeated unwanted contact from aggressor • Posting of personal information on chat rooms and web sites • Social networks provide ways to report predators as a defense
  • 7. SOFTWARE PRIACY • Illegal distribution of bootleg copies to others (for free or to sell) • Software is intellectual property and offenders are subject to patent and copyright laws • Solving piracy problem is still a major issue
  • 8. GLOBAL PROBLEM • Piracy is an international issue • The unwillingness of governments and individuals to recognize software copyrights is a huge roadblock to solving the issue • Billions of dollars lost each year
  • 9. CYBERWAR • This is one country’s military attempt to destroy the information and communication systems of another • Most advanced nations are most vulnerable • Attacks shut down country’s economic system, transportation and medical capabilities, etc.
  • 10. FUNCTIONS OF CYBERWAR • Disabling enemy’s smart weapons and controls systems • Distributing cyberpropaganda • Stealing or modifying information (espionage)
  • 11. A NEW COLD WAR • Nations secretly testing networks to gain advantage or inflict damage on potential enemy nations ushers in a new type of cold war
  • 12. CYBERTERRORISM • Individuals or organized groups using technology to intimidate or harm governments and/or civilians • Causes virtual physical damage • Nuclear power plants, dams, power grids, etc., are all affected
  • 13. DISADVANTAGES FOR THE CYBER ATTACKER • May not achieve as much destruction as physical weapons • Requires continuous updating of systems as older methods quickly become outdated • Less drama and emotional appeal as traditional attacks
  • 14. GLOBALIZATION OF TERRORISM • Cyberwar and Cyberterrorism will only increase as dependence on technology increases • Controlling these attacks is a great challenge for the future
  • 15. INFORMATION SYSTEMS SECURITY • All systems connected to networks are vulnerable to security violations • Taking precaution is necessary and a variety of technologies have been created for this purpose
  • 16. SAFEGUARDING IS RESOURCES • Systems security auditing identifies most vulnerable systems in an organization • Followed by designing and implementing security measures
  • 17. RISK ANALYSIS • Determines if a company should take one of three courses of action: 1. Risk Reduction (actively invest in protect systems) 2. Risk Acceptance (do nothing, just absorb any damages) 3. Risk Transference (buy insurance or outsource risky functions)

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n