2. What is Cybercrime?
Using the Internet to commit a crime.
Identity Theft
Hacking
Viruses
Facilitation of traditional criminal activity
Stalking
Stealing information
Child Pornography
4. High-Profile Cybercrime-
related Cases
TJ Maxx data breach
45 million credit and debit card numbers stolen
Kwame Kilpatrick
Cell phone text messages
BTK Serial Killer
Kevin Mitnick
5. Computer Security
Confidentiality
Only those authorized to view information
Integrity
Information is correct and hasn’t been altered by
unauthorized users or software
Availability
Data is accessible to authorized users
7. Computer Security - Threats
Malware
Software that has a malicious purpose
Viruses
Trojan horse
Spyware
8. Computer Security - Threats
Intrusions
Any attempt to gain unauthorized access to a
system
Cracking
Hacking
Social Engineering
War-driving
9. Computer Security - Threats
Denial-of-Service (DOS)
Prevention of legitimate access to systems
Also Distributed-Denial-of-Service (DDoS)
Different types:
Ping-of-Death
Teardrop
Smurf
SYN
11. Computer Security -
Terminology
People
Hackers
White Hat – Good guys. Report hacks/vulnerabilities
to appropriate people.
Black Hat – Only interested in personal goals,
regardless of impact.
Gray Hat – Somewhere in between.
12. Computer Security -
Terminology
Script Kiddies
Someone that calls themselves a ‘hacker’ but
really isn’t
Ethical Hacker
Someone hired to hack a system to find
vulnerabilities and report on them.
Also called a ‘sneaker’
13. Computer Security -
Terminology
Security Devices
Firewall
Barrier between network and the outside world.
Proxy server
Sits between users and server. Two main functions
are to improve performance and filter requests.
Intrusion Detection Systems (IDS)
Monitors network traffic for suspicious activity.
14. Computer Security -
Terminology
Activities
Phreaking
Breaking into telephone systems (used in
conjunction with war-dialing)
Authentication
Determines whether credentials are authorized to
access a resource
Auditing
Reviewing logs, records, or procedures for
compliance with standards
15. Computer Security - Careers
Information Security Analyst
US National Average Salary
Figure 1.2 – Median salary courtesy cbsalary.com