computer security issues ed queen and brent barber

12
Computer Security Computer Security Issues Issues Ed Queen and Brent Barber Ed Queen and Brent Barber

Post on 20-Dec-2015

216 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Computer Security Issues Ed Queen and Brent Barber

Computer Security IssuesComputer Security Issues

Ed Queen and Brent BarberEd Queen and Brent Barber

Page 2: Computer Security Issues Ed Queen and Brent Barber

What are some computer security What are some computer security issues?issues?

Electronic ForgeryElectronic Forgery• Falsified financial press releasesFalsified financial press releases• Bank statementsBank statements• Expense claimsExpense claims• ““Electronic forgeryElectronic forgery is becoming a greater is becoming a greater

risk as more company information is stored risk as more company information is stored electronically. But many organisations are electronically. But many organisations are ignoring the issue.” ignoring the issue.” http://www.securityfocus.com/news/11228http://www.securityfocus.com/news/11228

Page 3: Computer Security Issues Ed Queen and Brent Barber

What are some computer security What are some computer security issues?issues?

Identity TheftIdentity Theft• ““Identity theft and identity fraud are terms Identity theft and identity fraud are terms

used to refer to all types of crime in which used to refer to all types of crime in which someone wrongfully obtains and uses another someone wrongfully obtains and uses another person's personal data in some way that person's personal data in some way that involves fraud or deception, typically for involves fraud or deception, typically for economic gain.” economic gain.” http://http://www.usdoj.gov/criminal/fraud/idtheft.htmlwww.usdoj.gov/criminal/fraud/idtheft.html

• Can be done by:Can be done by: ““Shoulder surfing”Shoulder surfing” ““Dumpster diving”Dumpster diving” ““Spam”Spam”

Page 4: Computer Security Issues Ed Queen and Brent Barber
Page 5: Computer Security Issues Ed Queen and Brent Barber

Computer Viruses: The InfectionComputer Viruses: The Infection

VirusesViruses Worms Worms Trojan HorsesTrojan Horses

Page 6: Computer Security Issues Ed Queen and Brent Barber

Computer Viruses: The InfectionComputer Viruses: The Infection

VirusesViruses• Must be executedMust be executed• Must have a hostMust have a host• Replicates disk to disk, file to file, Replicates disk to disk, file to file,

system to systemsystem to system

Page 7: Computer Security Issues Ed Queen and Brent Barber

Computer Viruses: The InfectionComputer Viruses: The Infection

WormsWorms• Self-replicating Self-replicating

programprogram• Does not need a hostDoes not need a host• Replicates system to Replicates system to

systemsystem

Page 8: Computer Security Issues Ed Queen and Brent Barber

Computer Viruses: The InfectionComputer Viruses: The Infection

Trojan HorsesTrojan Horses• Does something Does something

unexpectedunexpected• Non-replicatingNon-replicating

Page 9: Computer Security Issues Ed Queen and Brent Barber

Prevention StrategiesPrevention Strategies

FirewallsFirewalls• Hardware vs. SoftwareHardware vs. Software

Page 10: Computer Security Issues Ed Queen and Brent Barber

Prevention StrategiesPrevention Strategies Virus Protection Virus Protection

SoftwareSoftware Spyware/Adware Spyware/Adware

SoftwareSoftware Common SenseCommon Sense

Page 11: Computer Security Issues Ed Queen and Brent Barber

Prevention StrategiesPrevention Strategies

Center for Education and Research inCenter for Education and Research in Information Assurance and Security Information Assurance and Security – Purdue University (CERIAS)– Purdue University (CERIAS)

Page 12: Computer Security Issues Ed Queen and Brent Barber

ResourcesResources http://http://www.securityfocus.comwww.securityfocus.com http://http://http://http://www.usdoj.govwww.usdoj.gov http://http://www.smallbusinesscomputing.comwww.smallbusinesscomputing.com http://http://download.zonelabs.comdownload.zonelabs.com http://http://www.hotbrick.comwww.hotbrick.com http://http://www.linksys.comwww.linksys.com http://www.microsoft.com/http://www.microsoft.com/ http://www.worldstart.comhttp://www.worldstart.com http://us.mcafee.com http://us.mcafee.com http://www.n-tv.de http://www.n-tv.de http://www.pritchettcartoons.com http://www.pritchettcartoons.com http://horiuchi.akria.ne.jphttp://horiuchi.akria.ne.jp http://www.flexbeta.nethttp://www.flexbeta.net http://iisw.cerias.purdue.eduhttp://iisw.cerias.purdue.edu