computer security issues ed queen and brent barber
Post on 20-Dec-2015
217 Views
Preview:
TRANSCRIPT
Computer Security IssuesComputer Security Issues
Ed Queen and Brent BarberEd Queen and Brent Barber
What are some computer security What are some computer security issues?issues?
Electronic ForgeryElectronic Forgery• Falsified financial press releasesFalsified financial press releases• Bank statementsBank statements• Expense claimsExpense claims• ““Electronic forgeryElectronic forgery is becoming a greater is becoming a greater
risk as more company information is stored risk as more company information is stored electronically. But many organisations are electronically. But many organisations are ignoring the issue.” ignoring the issue.” http://www.securityfocus.com/news/11228http://www.securityfocus.com/news/11228
What are some computer security What are some computer security issues?issues?
Identity TheftIdentity Theft• ““Identity theft and identity fraud are terms Identity theft and identity fraud are terms
used to refer to all types of crime in which used to refer to all types of crime in which someone wrongfully obtains and uses another someone wrongfully obtains and uses another person's personal data in some way that person's personal data in some way that involves fraud or deception, typically for involves fraud or deception, typically for economic gain.” economic gain.” http://http://www.usdoj.gov/criminal/fraud/idtheft.htmlwww.usdoj.gov/criminal/fraud/idtheft.html
• Can be done by:Can be done by: ““Shoulder surfing”Shoulder surfing” ““Dumpster diving”Dumpster diving” ““Spam”Spam”
Computer Viruses: The InfectionComputer Viruses: The Infection
VirusesViruses Worms Worms Trojan HorsesTrojan Horses
Computer Viruses: The InfectionComputer Viruses: The Infection
VirusesViruses• Must be executedMust be executed• Must have a hostMust have a host• Replicates disk to disk, file to file, Replicates disk to disk, file to file,
system to systemsystem to system
Computer Viruses: The InfectionComputer Viruses: The Infection
WormsWorms• Self-replicating Self-replicating
programprogram• Does not need a hostDoes not need a host• Replicates system to Replicates system to
systemsystem
Computer Viruses: The InfectionComputer Viruses: The Infection
Trojan HorsesTrojan Horses• Does something Does something
unexpectedunexpected• Non-replicatingNon-replicating
Prevention StrategiesPrevention Strategies
FirewallsFirewalls• Hardware vs. SoftwareHardware vs. Software
Prevention StrategiesPrevention Strategies Virus Protection Virus Protection
SoftwareSoftware Spyware/Adware Spyware/Adware
SoftwareSoftware Common SenseCommon Sense
Prevention StrategiesPrevention Strategies
Center for Education and Research inCenter for Education and Research in Information Assurance and Security Information Assurance and Security – Purdue University (CERIAS)– Purdue University (CERIAS)
ResourcesResources http://http://www.securityfocus.comwww.securityfocus.com http://http://http://http://www.usdoj.govwww.usdoj.gov http://http://www.smallbusinesscomputing.comwww.smallbusinesscomputing.com http://http://download.zonelabs.comdownload.zonelabs.com http://http://www.hotbrick.comwww.hotbrick.com http://http://www.linksys.comwww.linksys.com http://www.microsoft.com/http://www.microsoft.com/ http://www.worldstart.comhttp://www.worldstart.com http://us.mcafee.com http://us.mcafee.com http://www.n-tv.de http://www.n-tv.de http://www.pritchettcartoons.com http://www.pritchettcartoons.com http://horiuchi.akria.ne.jphttp://horiuchi.akria.ne.jp http://www.flexbeta.nethttp://www.flexbeta.net http://iisw.cerias.purdue.eduhttp://iisw.cerias.purdue.edu
top related