--cyber security--
DESCRIPTION
--CYBER SECURITY--. By: Jamea Miller June 7, 2008. What is Cyber Security?. We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks. Things to be aware of…. Hackers - PowerPoint PPT PresentationTRANSCRIPT
--CYBER SECURITY----CYBER SECURITY--
By: Jamea MillerBy: Jamea Miller
June 7, 2008June 7, 2008
What is Cyber Security?
We live in a time where almost all aspects of our lives are associated with computers. Cyber Security involves protecting this vital information by detecting and responding to attacks.
Things to be aware of…Things to be aware of…
HackersHackers IntrudersIntruders AttackersAttackers--All of these are people who’s actions could --All of these are people who’s actions could
cause harm to your computer and the cause harm to your computer and the information stored on your computer-- information stored on your computer--
These people’s intentions are not all the same, These people’s intentions are not all the same, meaning that some of them intend harm and meaning that some of them intend harm and others don’t.others don’t.
BASIC MALICIOUS CODE BASIC MALICIOUS CODE TERMSTERMS
VIRUS — a virus requires that you take an action before VIRUS — a virus requires that you take an action before it can infect your computer, such as opening an infected it can infect your computer, such as opening an infected e-mail, or clicking on particular linke-mail, or clicking on particular link
WORMS — a worm doesn’t have to be responded to to WORMS — a worm doesn’t have to be responded to to infect your computer. They feed off of software infect your computer. They feed off of software weaknesses and vulnerability. After the worm is inside weaknesses and vulnerability. After the worm is inside the software, it searches for other computers to infect. the software, it searches for other computers to infect. Worms operate through e-mail and web pages as wellWorms operate through e-mail and web pages as well
TROJAN HORSES — a trojan horses is software that is TROJAN HORSES — a trojan horses is software that is disguised as something else. Because of the disguise, disguised as something else. Because of the disguise, users allow them onto the software without knowing that users allow them onto the software without knowing that harm is being done.harm is being done.
……..about firewalls..about firewalls
FIREWALLS PROVIDE PROTECTION FIREWALLS PROVIDE PROTECTION AGAINST ATTACKERS BY ACTING AS A AGAINST ATTACKERS BY ACTING AS A WALL BETWEEN YOUR COMPUTER OR WALL BETWEEN YOUR COMPUTER OR NETWORK AND UNNECESSARY NETWORK AND UNNECESSARY INTERNET TRAFFIC.INTERNET TRAFFIC.
There are 2 types of firewallsThere are 2 types of firewalls
► HARDWAREHARDWARE-CALLED NETWORK FIREWALLS-CALLED NETWORK FIREWALLS
-EXTERNAL DEVICES-EXTERNAL DEVICES-POSITIONED BETWEEN COMPUTER OR NETWORK -POSITIONED BETWEEN COMPUTER OR NETWORK
AND YOUR CABLE OR DSL MODEMAND YOUR CABLE OR DSL MODEM-USEFUL FOR PROTECTING MULTIPLE COMPUTERS-USEFUL FOR PROTECTING MULTIPLE COMPUTERS
-AVAILABLE FOR LESS THAN $100.-AVAILABLE FOR LESS THAN $100.
There are 2 types of firewallsThere are 2 types of firewalls
►SOFTWARESOFTWARE-INTERNAL DEVICE-INTERNAL DEVICE
-ONLY NECESSARY IF YOU DO NOT HAVE A BUILT IN -ONLY NECESSARY IF YOU DO NOT HAVE A BUILT IN FIREWALLFIREWALL
-BEST TI INSTALL FROM A CD, DVD, OR FLOPPY DISK-BEST TI INSTALL FROM A CD, DVD, OR FLOPPY DISK-HAVING THIS FIREWALL ON THE SAME COMPUTER AS -HAVING THIS FIREWALL ON THE SAME COMPUTER AS
THE INFORMATION YOUR TRYING TO PROTECT MAY THE INFORMATION YOUR TRYING TO PROTECT MAY STOP THE FRIELWALL FROM BLOCKING THINGS STOP THE FRIELWALL FROM BLOCKING THINGS
BEFORE THEY REACH YOUR SYSTEM- information BEFORE THEY REACH YOUR SYSTEM- information attained attained
from…http://www.us-cert.gov/cas/tips/ST04-from…http://www.us-cert.gov/cas/tips/ST04-004.html004.html
SPYWARESPYWARE
SPYWARE IS A SOFTWARE THAT WHNE INSTALLED SPYWARE IS A SOFTWARE THAT WHNE INSTALLED ON YOUR COMPUTER SENDS YOU POP UP ON YOUR COMPUTER SENDS YOU POP UP ADS,MONITOR THE SITED YOU VISIT AND ADS,MONITOR THE SITED YOU VISIT AND REDIRECT YOUR BROWSER TO CERTAIN REDIRECT YOUR BROWSER TO CERTAIN WEBSITES…SOME VERSIONS OF SPYWARE CAN WEBSITES…SOME VERSIONS OF SPYWARE CAN EVN MONITOR EVERY KEYSTROKE TAKEN.EVN MONITOR EVERY KEYSTROKE TAKEN.
SPYWARE ALERT!!!!SPYWARE ALERT!!!! ENDLESS POP UP WINDOWSENDLESS POP UP WINDOWS
RANDOM WINDOW ERROR MESSAGESRANDOM WINDOW ERROR MESSAGES NEW TOOLBARS APPEAR IN YOUR WEB BROWSERNEW TOOLBARS APPEAR IN YOUR WEB BROWSER
BEING REDIRECTED TO WEBSITES OTHER THAN WHAT BEING REDIRECTED TO WEBSITES OTHER THAN WHAT YOU TYPED INTO YOUR WEB BROWSERYOU TYPED INTO YOUR WEB BROWSER
WHY PASSWORDS ARE WHY PASSWORDS ARE IMPORTANTIMPORTANT
PASSWORDS ARE THE KEY TO “LOCKED” PASSWORDS ARE THE KEY TO “LOCKED” INFORMATION. IF A PASSWORD IS WEAK, IT INFORMATION. IF A PASSWORD IS WEAK, IT IS EASIER TO FIGURE OUT AND EASIER IS EASIER TO FIGURE OUT AND EASIER FOR THE PROTECTED INFROMATION TO BE FOR THE PROTECTED INFROMATION TO BE ATTAINEDATTAINED
A STRONG PASSWORD A STRONG PASSWORD CONSISTS OF…CONSISTS OF…
A COMBINATION OF UPPER AND LOWER CASE A COMBINATION OF UPPER AND LOWER CASE LETTERSLETTERS
NO PERSONAL INFORMATIONNO PERSONAL INFORMATION A COMBINATION OF LETTERS, NUMBERS, AND A COMBINATION OF LETTERS, NUMBERS, AND
SPECIAL SYMBOLSSPECIAL SYMBOLS
USE DIFFERENT PASSWORDS FOR DIFFERENT USE DIFFERENT PASSWORDS FOR DIFFERENT SYSYTEMS!!SYSYTEMS!!
IN CONCLUSION……IN CONCLUSION……
CYBER SECURITY IS VERY IMPORTANT CYBER SECURITY IS VERY IMPORTANT TO THE LIFE AND EFFICIENCY OF TO THE LIFE AND EFFICIENCY OF YOUR COMPUTER AND NETWORKYOUR COMPUTER AND NETWORK
INFORMATION ATTAINED INFORMATION ATTAINED FROM THE FOLLOWINGFROM THE FOLLOWING
http://www.us-cert.gov/cas/tips/ST04-002.hhttp://www.us-cert.gov/cas/tips/ST04-002.htmltml
http://search.us-cert.gov/search?http://search.us-cert.gov/search?q=PASSWORDS&entqr=0&ud=1&sort=datq=PASSWORDS&entqr=0&ud=1&sort=date%3AD%3ALe%3AD%3AL%3Ad1&output=xml_no_dtd&oe=UTF-%3Ad1&output=xml_no_dtd&oe=UTF-8&ie=UTF-8&ie=UTF-8&client=default_frontend&proxystyleshee8&client=default_frontend&proxystylesheet=default_frontend&hq=inurl%3Awww.us-t=default_frontend&hq=inurl%3Awww.us-cert.gov%2F&site=default_collectioncert.gov%2F&site=default_collection
GOOGLE IMAGESGOOGLE IMAGES