Internet Security - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Internet Security

Description:

... a criminal act perpetuated through computers resulting in violence, death and/or ... social security numbers, credit card numbers, business secretes, and the hack ... – PowerPoint PPT presentation

Number of Views:64
Avg rating:3.0/5.0
Slides: 18
Provided by: techn96
Category:

less

Transcript and Presenter's Notes

Title: Internet Security


1
Internet Security
  • Jeff Mitchell
  • Mark Mason
  • Thomas Gormley

2
Internet
  • Internet a web of different, intercommunicating
    networks funded by both commercial and government
    organizations.
  • Connects networks in 40 different countries
  • There are thousands of enterprise networks
    connected to the internet, and there are millions
    of users, with thousands joining each day.

3
Internet Security
  • Along with the increase of users, came the
    increase of internet problems
  • Internet problems that are most prevalent today
  • Cyberterrorism
  • Worms
  • Password Security

4
Cyberterrorism
  • Definition a criminal act perpetuated through
    computers resulting in violence, death and/or
    destruction, and creating terror for the purpose
    of coercing a government to change its policies.
  • Came to greater attention after 9/11
  • The U.S. government and organizations worry more
    about the protection of classified and personal
    information

5
Cyberterrorism
  • Examples Knocking out e-mail
  • Shutting down the internet
  • Taking control of power grids, water and sewer
    systems, dams, hospital equipment, pipelines,
    communications, global positioning satellites,
    air traffic systems or any other networked system
    by use of a computer.

6
What is being done about Cyberterrorism?
  • President Bush released his final cyber-security
    policy in February of 2003.
  • Policy called for securing the governments
    cyberspace by authenticating and maintaining
    authorized users of federal systems and securing
    federal wireless local networks.
  • Senator Joseph Liebermen proposes renewing
    moratorium on internet taxes, promote anti-spam
    legislation, and extend the research and
    development tax credit.

7
Cyberterrorism Continued
  • U.S. National Computer Emergency response team
    will be arming the National Cyber Alert System.
  • National Cyber Alert System it will take
    information from different public and private
    sources and issue warnings, bulletins, and how-to
    notifications.
  • First nationally coordinated warning system for
    Internet threats and vulnerabilities

8
Hacking the System
  • Underdeveloped system securities are continually
    being exploited by hackers.
  • In late February 2003, a hacker was able to
    snatch over 59,000 SSNs of students.

9
Texas Techs SSN use
  • TTU currently has an effective SSN masking system
    with the PTNs
  • PTN Personal Test Number
  • However, the PTNs are not advertised for use to
    faculty
  • Estimated that only 20 of faculty use PTNs
    instead of SSNs for exams

10
CyberTerrorism vs. Hacking
  • Both can be harmful and malicious
  • Hacking is often used to displayed an individual
    prowess or display the faults within a system
  • CyberTerrorism is a direct attack on systems to
    cause a break in physical securities or bring
    attention to a cause

11
Worms
  • Definition a program or command file that uses a
    computer network as means for affecting a
    systems integrity, reliability, or availability.
  • Network Worm can attack from one system to
    another by establishing a network connection.
  • It is usually self-contained program that does
    not need to attach itself to a host file to
    invade network after network.

12
Worm Dangers
  • Easily able to get on user computers through
    means such as instant messaging.
  • Lightweight worms can download updated or
    specialized code from other servers.
  • Many worms are subtle to the point that they are
    never caught until it is too late.
  • Some worms once instigated, change their own code
    so detection is hard.

13
MyDoom
  • Worm virus that became prevalent last week.
  • Focused at Microsofts web site and is
    interfering with an infected public computers
    ability to access downloadable security-software
    updates.
  • Sent in the form of e-mails. Once email is
    opened, the virus is released a creates a back
    door.
  • This turns the infected computer into a main
    point of attack for network based attacks.

14
Worm Prevention
  • Can prevent and detect worms by applying patches
    promptly
  • Implementing sound perimeter security defenses
  • Keeping virus definitions up-to-date
  • Information sharing and analysis of networks
  • Prearranged response capability
  • Access to intelligence about the threat
  • Accurate picture of your operational environment
    and defensive options

15
Password Security
  • Passwords a secrete code assigned to a user.
  • Two main problems Interlopers can easily guess
    them and users frequently forget them.
  • Passwords Used for connecting to e-mail,
    checking bank accounts, certain web sites, school
    records, access to certain pieces of information,
    access to some chat sites, and many other uses.

16
Password Security
  • Hackers are searching for personal information,
    governmental information, financial records,
    social security numbers, credit card numbers,
    business secretes, and the hack itself
  • Solutions to preventing hacking biometrics- uses
    retinal scan or finger print or voice
    recognition, one-time passwords, evaluating use
    of private information in a public place,
    increasing the penalty for hacking, better
    encryption processes , and new password
    techniques

17
Conclusion
  • Internet security is something to worry about but
    not have a heart attack about.
  • Be careful of downloading, use of e-mails, and
    use of a computer in a wrong or illegal manner.
  • The internet security problems that are faced
    today are just an introduction to the problems of
    the future.
Write a Comment
User Comments (0)
About PowerShow.com