department of mathematics computer and information science1 basics of cyber security and computer...

21
Department of Mathematics Computer and Information Science 1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos

Upload: arline-marshall

Post on 24-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Department of Mathematics Computer and Information Science 1

Basics of Cyber Security and Computer Forensics

Christopher I. G. Lanclos

Department of Mathematics Computer and Information Science 2

Outline• What is cyber security?

• Online safety

• Computer forensics

• Password protection

• Malware

• Steganography

• Summary

• Questions

Department of Mathematics Computer and Information Science 3

What is cyber security?

• Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

• Computer systems are always under constant attack

• Work to navigate the Internet cautiously and securely

Department of Mathematics Computer and Information Science 4

Social media

Department of Mathematics Computer and Information Science 5

Online safety

• Participating in Internet activities in a responsible and safe manner

• Being aware of where you are online and who has access to personal information

• Understand that anything placed on the Internet never goes away

Department of Mathematics Computer and Information Science 6

Essentials of online safety cont…

• Threats to online safety– Phishing

– Cyber predators

– Cyber bullying

Department of Mathematics Computer and Information Science 7

Phishing

• Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity

Department of Mathematics Computer and Information Science 8

Cyber predators

• Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes

Department of Mathematics Computer and Information Science 9

Cyber bullying

• Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet

• Solution– Inform a trusted adult

Department of Mathematics Computer and Information Science 10

Computer forensics

• Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information

• Emerged during this time as a method to recover and investigate digital evidence for use in court

Department of Mathematics Computer and Information Science 11

Who are the bad guys?

• Blackhat hacker– An individual with extensive computer knowledge

whose purpose is to breach or bypass internet security

– Common name for individuals who commit computer crimes

• Forensic equipment and software are used to protect against attacks

Department of Mathematics Computer and Information Science 12

Computer forensics equipment

• Write Blocker– Devices that allow acquisition of information on

a drive without creating the possibility of accidentally damaging the drive contents

Department of Mathematics Computer and Information Science 13

Computer forensics software

• EnCase– Computer forensics products used to analyze

digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations

Department of Mathematics Computer and Information Science 14

Malware

• Software that is intended to damage or disable computers and computer systems

• Launch attacks without the knowledge of users

Department of Mathematics Computer and Information Science 15

Types of Malware• Keylogger

– Software or hardware that captures keystrokes on a computer

• Worm– Type of malware that independently copies its self and attacks computer

systems

• Trojan horse– A harmful program that pretends to be something useful and helpful to a user

• Logic Bomb– Program inserted into software, that triggers when a set of specific conditions

occur

Department of Mathematics Computer and Information Science 16

Password protection

• Extremely important to protecting online accounts

• Should not include very common names (names of pets, people, or simple words in the dictionary)

Department of Mathematics Computer and Information Science 17

What happens to simple password?

• Easier passwords can be attacked

• Dictionary attacks can be used to guess simple to moderate complexity passwords

Department of Mathematics Computer and Information Science 18

Example

Department of Mathematics Computer and Information Science 19

How do we protect ourselves?

• Increase the length and variety of passwords• To create a strong password include:– Lowercase and uppercase letters– Numbers– Special characters– Length of seven characters or longer

• Example– Weak password- rover– Strong password- R043f112$*

Department of Mathematics Computer and Information Science 20

Steganography

• Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient

• Use for a variety of reasons– Sending messages between friends– U.S. soldiers communicating secretly– Terrorists planning secret attacks on countries

Department of Mathematics Computer and Information Science 21

Stego Examples

• QuickStegoWinHip