1 / 12

Computer Security and Risks

Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto Gil Crusader in Open source who works for the Brazilian government. Using Quizlet. Choosing one word per page and two from some

Télécharger la présentation

Computer Security and Risks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer Security and Risks

  2. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual”Gilberto Gil Crusader in Open source who works for the Brazilian government

  3. Using Quizlet • Choosing one word per page and two from some • Make approximately 8 to 10 flash cards • Invite your friends to your flash cards • Learn all the terminology about computer crime using quizlet.com

  4. Computer Crime • Computer Forensics • cybercrime • Cyberstalking • Identity theft • Social engineering • Spoofing • Phishing • Spammer

  5. Computer Crime • Malware • Cross platform Viruses • Macro Virus • Macros • 1999 Melisa Virus • Cross scripting Virus • Worms

  6. Computer Crime • Trojan Horse • Logic Bomb • Time Bomb • Spyware • Tracking software • Spybot • Drive by Downloads

  7. Just as natural forests are more resistant to disease than are single-species tree farms, mixed computing environments are less susceptible to crippling attacks than is an organization in which everyone uses the same hardware and software.

  8. Computer Crime • Antivirus • Security patches • MS Slammer • Hackers • Crackers • Webjackers • Zombie Computers • Bots • Botnets

  9. Quotes • In 2007 a DDOS attack crippled the electronic infrastructure of the republic of Estonia, one of the most wired countries in the world • “In the old world if you wanted to attack something physical you had to attack it with guns men etc, but a database usually has multiple pathways unpredictable routes into it and seems impossible to defend it. That why most efforts at computer security have been defeated”. Andrew Marshall (Military Analyst)

  10. Computer Crime • DOS attacks (Denial of Service) • DDOS distributed DOS • Mafia Boy • Biometrics • Smart Card • Passwords • Access-control software • Access privileges

  11. Quotes • “Computer security experts are forever trying to shut the stable door after the horse has bolted” Tom Forester Computer Ethics

  12. Computer Crime • Firewalls • Encryption • Encryption Key • Decryption • Audit control software • Backups • Generations • RAID • Automatically mirror • Instant redundancy • Off site backup • On line backup (Speed Issues)

More Related