computer security issues ed queen and brent barber

Post on 20-Dec-2015

217 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Computer Security IssuesComputer Security Issues

Ed Queen and Brent BarberEd Queen and Brent Barber

What are some computer security What are some computer security issues?issues?

Electronic ForgeryElectronic Forgery• Falsified financial press releasesFalsified financial press releases• Bank statementsBank statements• Expense claimsExpense claims• ““Electronic forgeryElectronic forgery is becoming a greater is becoming a greater

risk as more company information is stored risk as more company information is stored electronically. But many organisations are electronically. But many organisations are ignoring the issue.” ignoring the issue.” http://www.securityfocus.com/news/11228http://www.securityfocus.com/news/11228

What are some computer security What are some computer security issues?issues?

Identity TheftIdentity Theft• ““Identity theft and identity fraud are terms Identity theft and identity fraud are terms

used to refer to all types of crime in which used to refer to all types of crime in which someone wrongfully obtains and uses another someone wrongfully obtains and uses another person's personal data in some way that person's personal data in some way that involves fraud or deception, typically for involves fraud or deception, typically for economic gain.” economic gain.” http://http://www.usdoj.gov/criminal/fraud/idtheft.htmlwww.usdoj.gov/criminal/fraud/idtheft.html

• Can be done by:Can be done by: ““Shoulder surfing”Shoulder surfing” ““Dumpster diving”Dumpster diving” ““Spam”Spam”

Computer Viruses: The InfectionComputer Viruses: The Infection

VirusesViruses Worms Worms Trojan HorsesTrojan Horses

Computer Viruses: The InfectionComputer Viruses: The Infection

VirusesViruses• Must be executedMust be executed• Must have a hostMust have a host• Replicates disk to disk, file to file, Replicates disk to disk, file to file,

system to systemsystem to system

Computer Viruses: The InfectionComputer Viruses: The Infection

WormsWorms• Self-replicating Self-replicating

programprogram• Does not need a hostDoes not need a host• Replicates system to Replicates system to

systemsystem

Computer Viruses: The InfectionComputer Viruses: The Infection

Trojan HorsesTrojan Horses• Does something Does something

unexpectedunexpected• Non-replicatingNon-replicating

Prevention StrategiesPrevention Strategies

FirewallsFirewalls• Hardware vs. SoftwareHardware vs. Software

Prevention StrategiesPrevention Strategies Virus Protection Virus Protection

SoftwareSoftware Spyware/Adware Spyware/Adware

SoftwareSoftware Common SenseCommon Sense

Prevention StrategiesPrevention Strategies

Center for Education and Research inCenter for Education and Research in Information Assurance and Security Information Assurance and Security – Purdue University (CERIAS)– Purdue University (CERIAS)

ResourcesResources http://http://www.securityfocus.comwww.securityfocus.com http://http://http://http://www.usdoj.govwww.usdoj.gov http://http://www.smallbusinesscomputing.comwww.smallbusinesscomputing.com http://http://download.zonelabs.comdownload.zonelabs.com http://http://www.hotbrick.comwww.hotbrick.com http://http://www.linksys.comwww.linksys.com http://www.microsoft.com/http://www.microsoft.com/ http://www.worldstart.comhttp://www.worldstart.com http://us.mcafee.com http://us.mcafee.com http://www.n-tv.de http://www.n-tv.de http://www.pritchettcartoons.com http://www.pritchettcartoons.com http://horiuchi.akria.ne.jphttp://horiuchi.akria.ne.jp http://www.flexbeta.nethttp://www.flexbeta.net http://iisw.cerias.purdue.eduhttp://iisw.cerias.purdue.edu

top related