SlideShare a Scribd company logo
Computer Security Fundamentals
Chuck Easttom
Chapter 1 Introduction to to Computer Security
*
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Chapter 1 ObjectivesIdentify top threats to a computer
networkAssess the likelihood of an attackDefine key terms like
cracker, sneaker, firewall, and authenticationCompare and
contrast perimeter and layered approaches to network
securityUse online resources
*
Identify the top threats to a computer network: malware,
intrusion, Denial of service attacks
Assess the likelihood of an attack on your personal computer
and network
Define key terms such as cracker, sneaker, firewall and
authentication
Compare and contrast perimeter and layered approaches to
network security
Use online resources to secure your network
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
IntroductionComputer systems and networks are all around
us.Online bankingAutomated supermarket checkoutsOnline
classesOnline shoppingOnline travel resources
*
Computer systems are everywhere. Online banking, ATMs,
debit cardsE-Bay, Amazon, Half.com for textbooksExpedia,
Travelocity, airplane e-tickets
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Introduction (cont.)How is personal information
safeguarded?What are the vulnerabilities?What secures these
systems?
*
How is my online personal information safeguarded?
Passwords, account numbers, etc.
What are the vulnerabilities to these systems?
Web site security
What steps are taken to ensure that these systems and data are
safe?
SSL, Encryption, etc.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
How Seriously Should You Take Threats to Network Security?
Which group do you belong to?
“No one is coming after my computer.”
“The sky is falling!”
Middle ground.
*
Which group do you belong to?:
“No one is coming after me/my computer.”
Prove to me that I am at risk
Ostrich Theory
“The sky is falling!!”
Prove to me that I am not at risk
Paranoia
Middle Ground
An educated awareness of true risk
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Identifying Types of ThreatsMalware: MALicious
softWARESecurity BreachesDoS: Denial of Service
attacksWeb AttacksSession HijackingDNS PoisoningInsider
Threats
*
Malware – MALicious softWARE, the most common threat to
your system
Intrusions – an attempt to gain unauthorized access to your
system
DoS – Denial of Service attacks, attempts to deny authorized
users access to the system
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
MalwareSoftware with a malicious purposeVirus Trojan horse
SpywareLogic Bomb
*
Virus – “a small program that replicates itself and hides itself
inside other programs, usually without your knowledge”
(Symantec, 2003)
Trojan horse - a malicious program disguised as something
desirable or harmless
Spyware – the fastest-growing category of malware
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Malware (cont.)
VirusOne of the two most common typesUsually spreads
through e-mailUses system resources, causing slowdown or
stoppage
*
One of the two most common types of malware
Usually spreads itself through unsuspecting user’s e-mail
Even without malicious payload, rapid replication uses system
resources, causing slow down or stoppage
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Malware (cont.)
Trojan HorseThe other most common kind of malwareNamed
after the wooden horse of ancient history
*
The other most common kind of malware
Named after the famous wooden horse of ancient history
It disguises itself as something benign, something you need or
want, i.e. a game, screen saver, account logon, etc
It captures your information and returns it to the intruder
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Malware (cont.)
SpywareThe most rapidly growing types of malwareCookiesKey
logger
*
Spyware is the most rapidly growing type of malware.
Cookies: initially a good idea to help users surf the Web, now
misused to spy on users
Key logger: both in software and hardware, captures all the
user’s typing and logs it, capturing passwords, account
numbers, credit card numbers, etc.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Malware (cont.)
Logic BombLays dormant until some logical condition is met,
often a specific date.
*
Spyware is the most rapidly growing type of malware.
Cookies: initially a good idea to help users surf the Web, now
misused to spy on users
Key logger: both in software and hardware, captures all the
user’s typing and logs it, capturing passwords, account
numbers, credit card numbers, etc.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Compromising System Security
IntrusionsAttacks that break through system
resourcesHackersCrackersSocial engineeringWar-driving
*
Intrusions are attacks that break through your system’s
resources without authorization
Hackers – early internet joy riders, by intent not malevolent
Crackers – system intruders, with malevolent intent
Social Engineering – intruding into a system using human
nature, not technology
War driving – driving around looking for unprotected wireless
networks
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Denial of Service AttacksThe attacker does not intrude into the
system but just blocks access by authorized users.
*
The attacker does not actually intrude into the system, just
blocks access from authorized users
Keeps your customers from purchasing on your Web site,
denying you sales
Keeps your employees from purchasing e-tickets to a trade
show, making them use a travel agent, which costs more money
than you had planned
Keeps you from transferring the money from your business Line
of Credit to your business account to pay for the tickets,
causing your account to be overdrawn
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Web AttacksThe attacker attempts to breach a web application.
Common attacks of this type are SQL injection and Cross Site
Scripting.
*
The attacker does not actually intrude into the system, just
blocks access from authorized users
Keeps your customers from purchasing on your Web site,
denying you sales
Keeps your employees from purchasing e-tickets to a trade
show, making them use a travel agent, which costs more money
than you had planned
Keeps you from transferring the money from your business Line
of Credit to your business account to pay for the tickets,
causing your account to be overdrawn
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Session HijackingThis is a complex attack that involves actually
taking over an authenticated session.
*
The attacker does not actually intrude into the system, just
blocks access from authorized users
Keeps your customers from purchasing on your Web site,
denying you sales
Keeps your employees from purchasing e-tickets to a trade
show, making them use a travel agent, which costs more money
than you had planned
Keeps you from transferring the money from your business Line
of Credit to your business account to pay for the tickets,
causing your account to be overdrawn
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
DNS PoisoningThis involves altering DNS records on a DNS
server to redirect client traffic to malicious websites, usually
for identity theft.
*
The attacker does not actually intrude into the system, just
blocks access from authorized users
Keeps your customers from purchasing on your Web site,
denying you sales
Keeps your employees from purchasing e-tickets to a trade
show, making them use a travel agent, which costs more money
than you had planned
Keeps you from transferring the money from your business Line
of Credit to your business account to pay for the tickets,
causing your account to be overdrawn
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Assessing the Likelihood of an Attack on Your
NetworkVirusesCatch up on new and refurbished
virusesUnauthorized use of systemsDoS
attacksIntrusionsEmployee misuse
*
Viruses are most common network attacks
Check any AV vendor Web site to catch up on new and
refurbished viruses
Unauthorized use of systems is the next most common attack
DoS attacks
Intrusions
Employee misuse, either deliberate or accidental
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Basic Security Terminology
People:HackersWhite hatsBlack hatsGray hatsScript
kiddiesSneakersEthical hackers
*
People
Hackers – anyone who studies a system through analyzing its
flaws
White hats – Consider themselves the “good guys”
Black hats – Or “crackers” are definitely the “bad guys”
Gray hats – Not a common term; refers to individuals who
operate out side of the law on occasion
Script kiddies – Inexperienced; consider themselves hackers,
but only copy the work of others
Ethical hackers – Consultants who are hired to do vulnerability
assessments on company systems
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Basic Security Terminology (cont.)
DevicesFirewallFilters network trafficProxy serverDisguises IP
address of internal hostIntrusion Detection SystemMonitors
traffic, looking for attempted attacks
*
Firewalls – Found in a router or a server or as a stand-alone
device, it filters ingress and egress network traffic.
Proxy server – This sits between a client and an application,
acting as the host on your network, disguising the IP address of
your internal host.
Intrusion Detection System – IDS monitors traffic, looking for
attempted attacks.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Basic Security Terminology (cont.)
ActivitiesAuthenticationAuditing
*
Phreaking – A subspecialty of hacking, breaking into telephone
systems, it gave Kevin Mitnick his start down the road to
prison.
Authentication – Process todetermine if the credentials given by
a user are authorized to access system resources.
Auditing – Process of reviewing logs, records, and procedures
to ensure established standards are being met; tedious but
critical.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Network Security ParadigmsHow will youprotect your
network?CIA TriangleLeast PrivilegesPerimeter security
approach Layered security approach Proactive versus
reactiveHybrid security method
*
How will youprotect our network?
Perimeter security approach
Perimeter Defense is the most popular because it used to be
clearly defined, but as companies hire mobile workers, home
workers, and contract workers, the perimeter is becoming less
and less clearly defined.
Layered security approach
Not only the perimeter but separate sections of the network are
protected to the security level assigned to them.
Proactive Versus Reactive
Are your security measures active or passive?
Do you have a security plan, or are you part of someone else’s
plan to intrude on you?
Hybrid Security Method
Only a thorough and ongoing risk assessment and vulnerability
can keep you informed about what combination of postures will
benefit your network the most.
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
How Do Legal Issues Impact Network Security?The Computer
Security Act of 1987OMB Circular A-130See
www.alw.nih.gov/Security/FIRST/papers/ legal/statelaw.txt for
state computer lawsHealth Insurance Portability and
Accountability Act of 1996, HIPAA
*
The Computer Security Act of 1987, the first piece of U.S.
legislation to affect computer systems
OMB Circular A-130, a more specific federal law that addresses
the idea of security standards
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
Online Security ResourcesCERTwww.cert.orgMicrosoft
Security Advisor www.microsoft.com/security/default.mspxF-
Securewww.f-secure.comSANSwww.sans.org
*
CERT
Computer Emergency Response Team, sponsored by Carnegie-
Mellon University, the first computer incident response team
Microsoft Security Advisor
Microsoft security information, tools, and updates
F-Secure
Information on virus outbreaks
SANS
Documentation on computer security issues
© 2016 by Pearson Education, Inc. Chapter 1
Introduction to Computer Security
*
SummaryNetwork security is a constantly changing field.You
need three levels of knowledge.Take the courses necessary to
learn the basic techniques.Learn your enterprise system
intimately, with all its strengths and vulnerabilities.Keep
current in the ever-changing world of threats and exploits.
*
There are several bad habits often found in PowerPoint
slideshows. The following are bad habits and recommendation
to fix those bad habits:
·
1. Bad habit: Using unpleasant colors for the background and
font; While some people may like using their favorite colors in
the slideshow, it isn’t always appealing in a presentation
format.
Recommendation: Guffey (2017) suggest using calming colors
such as blue for the background and a white font. Blue is
considered a calm color.
·
2. Bad habit: Using unreadable font. If your font is too small
or in a crazy looking font, it may not be readable to your
audience.
Recommendation: Choose a commonly used font and at
minimum a size 12 font. Remember if you wouldn’t turn it in to
your boss with the font type and size, it’s not a good idea to use
for an audience.
·
3. Bad habit: Using too many bullet points. Sometimes there
is too much information on a slide show which can lose your
audience’s attention.
Recommendation: Figure 14.9 in our reading indicates you
should use “no more than 6 bullets per slide and no more than 6
words per bullet.”
·
4. Bad habit: Overusing pictures; Not every slide needs a
picture. Too many pictures or using certain pictures can be a
distraction to your presentation.
Recommendation: Limit the number of pictures you use.
Additionally, keep your audience in mind and use appropriate
slides.
·
5. Bad habit: Too many slides. Again, if you have too many
slides, and your presentation is droning on, you will lose your
audience’s interest.
Recommendation: Just like you have to limit your bullet
points, limit your slides. Provide enough information to have a
successful presentation without boring or overwhelming your
audience.
There are several ways to present a compelling PowerPoint.
Guffey (2017) makes an excellent point with regard to “Don’t
read from your notes.” When you are constantly reading your
notes, you aren’t engaging with your audience. Without
engaging with your audience, they will become bored rather
quickly. Which brings me to my next point, engage your
audience. Don’t drone on and on. Try to incorporate audience
participation. Speaking slowly and clearly with each slide.
Don’t speed read through a slide. Your audience will miss
important information you are trying to provide. Provide
enough information on your slide shows that gets your audience
interested in your topic. At the end of your presentation,
always ask if anyone has any questions. These are all helpful
tips for presenting a captivating PowerPoint slide show.
Guffey, M. E. Business Communication: Process & Product.
[South University]. Retrieved
from https://digitalbookshelf.southuniversity.edu/#/books/97813
37514385/

More Related Content

Similar to Computer Security FundamentalsChuck EasttomChapte.docx

2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
SibyJames1
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
cyberprosocial
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
Bret Piatt
 
Cyber security
Cyber securityCyber security
Cyber security
Akdu095
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Small Business
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
Jessica Howard
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
lowlesh1
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
lowlesh1
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
COMPUTER SEMINAR network security threats .pptx
COMPUTER SEMINAR  network security threats .pptxCOMPUTER SEMINAR  network security threats .pptx
COMPUTER SEMINAR network security threats .pptx
manishae08
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
CAS
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
Blue Coat
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
The Lifesciences Magazine
 
20190708223246easttom_ppt_01_final.ppt
20190708223246easttom_ppt_01_final.ppt20190708223246easttom_ppt_01_final.ppt
20190708223246easttom_ppt_01_final.ppt
mohammedSALEH189
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
Rahul Sah
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
mccormicknadine86
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
Mukesh Chinta
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
MArshad35
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 

Similar to Computer Security FundamentalsChuck EasttomChapte.docx (20)

2nd Class PPT.pptx
2nd Class PPT.pptx2nd Class PPT.pptx
2nd Class PPT.pptx
 
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
12 Game-Changing Hacking Types in 2024 | CyberPro Magazine
 
3 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 20173 Tips to Stay Safe Online in 2017
3 Tips to Stay Safe Online in 2017
 
Cyber security
Cyber securityCyber security
Cyber security
 
Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure" Frontier Secure: Handout for small business leaders on "How to be Secure"
Frontier Secure: Handout for small business leaders on "How to be Secure"
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Malware Infections
Malware InfectionsMalware Infections
Malware Infections
 
L N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.pptL N Yadav Cyber SECURITY.ppt
L N Yadav Cyber SECURITY.ppt
 
L N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.pptL N Yadav Cyber SECURITY2.ppt
L N Yadav Cyber SECURITY2.ppt
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
COMPUTER SEMINAR network security threats .pptx
COMPUTER SEMINAR  network security threats .pptxCOMPUTER SEMINAR  network security threats .pptx
COMPUTER SEMINAR network security threats .pptx
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Education is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber CrimeEducation is the Key to Fighting Cyber Crime
Education is the Key to Fighting Cyber Crime
 
7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine7 Types of Cyber Security Threats | The Lifesciences Magazine
7 Types of Cyber Security Threats | The Lifesciences Magazine
 
20190708223246easttom_ppt_01_final.ppt
20190708223246easttom_ppt_01_final.ppt20190708223246easttom_ppt_01_final.ppt
20190708223246easttom_ppt_01_final.ppt
 
Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Chapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docxChapter TwelveNetwork SecurityData Communications an.docx
Chapter TwelveNetwork SecurityData Communications an.docx
 
Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3Cisco cybersecurity essentials chapter 3
Cisco cybersecurity essentials chapter 3
 
Week3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdfWeek3-CyberSecurity 8th Semester important.pdf
Week3-CyberSecurity 8th Semester important.pdf
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 

More from mccormicknadine86

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
mccormicknadine86
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
mccormicknadine86
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
mccormicknadine86
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
mccormicknadine86
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
mccormicknadine86
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
mccormicknadine86
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
mccormicknadine86
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
mccormicknadine86
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
mccormicknadine86
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
mccormicknadine86
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
mccormicknadine86
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
mccormicknadine86
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
mccormicknadine86
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
mccormicknadine86
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
mccormicknadine86
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
mccormicknadine86
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
mccormicknadine86
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
mccormicknadine86
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
mccormicknadine86
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
mccormicknadine86
 

More from mccormicknadine86 (20)

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
 

Recently uploaded

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
Steve Thomason
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Computer Security FundamentalsChuck EasttomChapte.docx

  • 1. Computer Security Fundamentals Chuck Easttom Chapter 1 Introduction to to Computer Security * © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Chapter 1 ObjectivesIdentify top threats to a computer networkAssess the likelihood of an attackDefine key terms like cracker, sneaker, firewall, and authenticationCompare and contrast perimeter and layered approaches to network securityUse online resources * Identify the top threats to a computer network: malware, intrusion, Denial of service attacks Assess the likelihood of an attack on your personal computer and network Define key terms such as cracker, sneaker, firewall and authentication Compare and contrast perimeter and layered approaches to network security
  • 2. Use online resources to secure your network © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * IntroductionComputer systems and networks are all around us.Online bankingAutomated supermarket checkoutsOnline classesOnline shoppingOnline travel resources * Computer systems are everywhere. Online banking, ATMs, debit cardsE-Bay, Amazon, Half.com for textbooksExpedia, Travelocity, airplane e-tickets © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Introduction (cont.)How is personal information safeguarded?What are the vulnerabilities?What secures these systems? * How is my online personal information safeguarded? Passwords, account numbers, etc. What are the vulnerabilities to these systems? Web site security What steps are taken to ensure that these systems and data are safe? SSL, Encryption, etc.
  • 3. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * How Seriously Should You Take Threats to Network Security? Which group do you belong to? “No one is coming after my computer.” “The sky is falling!” Middle ground. * Which group do you belong to?: “No one is coming after me/my computer.” Prove to me that I am at risk Ostrich Theory “The sky is falling!!” Prove to me that I am not at risk Paranoia Middle Ground An educated awareness of true risk © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Identifying Types of ThreatsMalware: MALicious softWARESecurity BreachesDoS: Denial of Service attacksWeb AttacksSession HijackingDNS PoisoningInsider Threats
  • 4. * Malware – MALicious softWARE, the most common threat to your system Intrusions – an attempt to gain unauthorized access to your system DoS – Denial of Service attacks, attempts to deny authorized users access to the system © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * MalwareSoftware with a malicious purposeVirus Trojan horse SpywareLogic Bomb * Virus – “a small program that replicates itself and hides itself inside other programs, usually without your knowledge” (Symantec, 2003) Trojan horse - a malicious program disguised as something desirable or harmless Spyware – the fastest-growing category of malware © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Malware (cont.) VirusOne of the two most common typesUsually spreads through e-mailUses system resources, causing slowdown or stoppage
  • 5. * One of the two most common types of malware Usually spreads itself through unsuspecting user’s e-mail Even without malicious payload, rapid replication uses system resources, causing slow down or stoppage © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Malware (cont.) Trojan HorseThe other most common kind of malwareNamed after the wooden horse of ancient history * The other most common kind of malware Named after the famous wooden horse of ancient history It disguises itself as something benign, something you need or want, i.e. a game, screen saver, account logon, etc It captures your information and returns it to the intruder © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Malware (cont.) SpywareThe most rapidly growing types of malwareCookiesKey logger
  • 6. * Spyware is the most rapidly growing type of malware. Cookies: initially a good idea to help users surf the Web, now misused to spy on users Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Malware (cont.) Logic BombLays dormant until some logical condition is met, often a specific date. * Spyware is the most rapidly growing type of malware. Cookies: initially a good idea to help users surf the Web, now misused to spy on users Key logger: both in software and hardware, captures all the user’s typing and logs it, capturing passwords, account numbers, credit card numbers, etc. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Compromising System Security IntrusionsAttacks that break through system resourcesHackersCrackersSocial engineeringWar-driving
  • 7. * Intrusions are attacks that break through your system’s resources without authorization Hackers – early internet joy riders, by intent not malevolent Crackers – system intruders, with malevolent intent Social Engineering – intruding into a system using human nature, not technology War driving – driving around looking for unprotected wireless networks © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Denial of Service AttacksThe attacker does not intrude into the system but just blocks access by authorized users. * The attacker does not actually intrude into the system, just blocks access from authorized users Keeps your customers from purchasing on your Web site, denying you sales Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security *
  • 8. Web AttacksThe attacker attempts to breach a web application. Common attacks of this type are SQL injection and Cross Site Scripting. * The attacker does not actually intrude into the system, just blocks access from authorized users Keeps your customers from purchasing on your Web site, denying you sales Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Session HijackingThis is a complex attack that involves actually taking over an authenticated session. * The attacker does not actually intrude into the system, just blocks access from authorized users Keeps your customers from purchasing on your Web site, denying you sales Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets,
  • 9. causing your account to be overdrawn © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * DNS PoisoningThis involves altering DNS records on a DNS server to redirect client traffic to malicious websites, usually for identity theft. * The attacker does not actually intrude into the system, just blocks access from authorized users Keeps your customers from purchasing on your Web site, denying you sales Keeps your employees from purchasing e-tickets to a trade show, making them use a travel agent, which costs more money than you had planned Keeps you from transferring the money from your business Line of Credit to your business account to pay for the tickets, causing your account to be overdrawn © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Assessing the Likelihood of an Attack on Your NetworkVirusesCatch up on new and refurbished virusesUnauthorized use of systemsDoS attacksIntrusionsEmployee misuse *
  • 10. Viruses are most common network attacks Check any AV vendor Web site to catch up on new and refurbished viruses Unauthorized use of systems is the next most common attack DoS attacks Intrusions Employee misuse, either deliberate or accidental © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Basic Security Terminology People:HackersWhite hatsBlack hatsGray hatsScript kiddiesSneakersEthical hackers * People Hackers – anyone who studies a system through analyzing its flaws White hats – Consider themselves the “good guys” Black hats – Or “crackers” are definitely the “bad guys” Gray hats – Not a common term; refers to individuals who operate out side of the law on occasion Script kiddies – Inexperienced; consider themselves hackers, but only copy the work of others Ethical hackers – Consultants who are hired to do vulnerability assessments on company systems © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security
  • 11. * Basic Security Terminology (cont.) DevicesFirewallFilters network trafficProxy serverDisguises IP address of internal hostIntrusion Detection SystemMonitors traffic, looking for attempted attacks * Firewalls – Found in a router or a server or as a stand-alone device, it filters ingress and egress network traffic. Proxy server – This sits between a client and an application, acting as the host on your network, disguising the IP address of your internal host. Intrusion Detection System – IDS monitors traffic, looking for attempted attacks. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Basic Security Terminology (cont.) ActivitiesAuthenticationAuditing * Phreaking – A subspecialty of hacking, breaking into telephone systems, it gave Kevin Mitnick his start down the road to prison. Authentication – Process todetermine if the credentials given by a user are authorized to access system resources. Auditing – Process of reviewing logs, records, and procedures to ensure established standards are being met; tedious but critical.
  • 12. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Network Security ParadigmsHow will youprotect your network?CIA TriangleLeast PrivilegesPerimeter security approach Layered security approach Proactive versus reactiveHybrid security method * How will youprotect our network? Perimeter security approach Perimeter Defense is the most popular because it used to be clearly defined, but as companies hire mobile workers, home workers, and contract workers, the perimeter is becoming less and less clearly defined. Layered security approach Not only the perimeter but separate sections of the network are protected to the security level assigned to them. Proactive Versus Reactive Are your security measures active or passive? Do you have a security plan, or are you part of someone else’s plan to intrude on you? Hybrid Security Method Only a thorough and ongoing risk assessment and vulnerability can keep you informed about what combination of postures will benefit your network the most. © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security
  • 13. * How Do Legal Issues Impact Network Security?The Computer Security Act of 1987OMB Circular A-130See www.alw.nih.gov/Security/FIRST/papers/ legal/statelaw.txt for state computer lawsHealth Insurance Portability and Accountability Act of 1996, HIPAA * The Computer Security Act of 1987, the first piece of U.S. legislation to affect computer systems OMB Circular A-130, a more specific federal law that addresses the idea of security standards © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * Online Security ResourcesCERTwww.cert.orgMicrosoft Security Advisor www.microsoft.com/security/default.mspxF- Securewww.f-secure.comSANSwww.sans.org * CERT Computer Emergency Response Team, sponsored by Carnegie- Mellon University, the first computer incident response team Microsoft Security Advisor Microsoft security information, tools, and updates F-Secure Information on virus outbreaks SANS
  • 14. Documentation on computer security issues © 2016 by Pearson Education, Inc. Chapter 1 Introduction to Computer Security * SummaryNetwork security is a constantly changing field.You need three levels of knowledge.Take the courses necessary to learn the basic techniques.Learn your enterprise system intimately, with all its strengths and vulnerabilities.Keep current in the ever-changing world of threats and exploits. * There are several bad habits often found in PowerPoint slideshows. The following are bad habits and recommendation to fix those bad habits: · 1. Bad habit: Using unpleasant colors for the background and font; While some people may like using their favorite colors in the slideshow, it isn’t always appealing in a presentation format. Recommendation: Guffey (2017) suggest using calming colors such as blue for the background and a white font. Blue is considered a calm color. · 2. Bad habit: Using unreadable font. If your font is too small or in a crazy looking font, it may not be readable to your audience.
  • 15. Recommendation: Choose a commonly used font and at minimum a size 12 font. Remember if you wouldn’t turn it in to your boss with the font type and size, it’s not a good idea to use for an audience. · 3. Bad habit: Using too many bullet points. Sometimes there is too much information on a slide show which can lose your audience’s attention. Recommendation: Figure 14.9 in our reading indicates you should use “no more than 6 bullets per slide and no more than 6 words per bullet.” · 4. Bad habit: Overusing pictures; Not every slide needs a picture. Too many pictures or using certain pictures can be a distraction to your presentation. Recommendation: Limit the number of pictures you use. Additionally, keep your audience in mind and use appropriate slides. · 5. Bad habit: Too many slides. Again, if you have too many slides, and your presentation is droning on, you will lose your audience’s interest. Recommendation: Just like you have to limit your bullet points, limit your slides. Provide enough information to have a successful presentation without boring or overwhelming your audience. There are several ways to present a compelling PowerPoint. Guffey (2017) makes an excellent point with regard to “Don’t
  • 16. read from your notes.” When you are constantly reading your notes, you aren’t engaging with your audience. Without engaging with your audience, they will become bored rather quickly. Which brings me to my next point, engage your audience. Don’t drone on and on. Try to incorporate audience participation. Speaking slowly and clearly with each slide. Don’t speed read through a slide. Your audience will miss important information you are trying to provide. Provide enough information on your slide shows that gets your audience interested in your topic. At the end of your presentation, always ask if anyone has any questions. These are all helpful tips for presenting a captivating PowerPoint slide show. Guffey, M. E. Business Communication: Process & Product. [South University]. Retrieved from https://digitalbookshelf.southuniversity.edu/#/books/97813 37514385/