Security%20Chapter%208%20Objectives - PowerPoint PPT Presentation

About This Presentation
Title:

Security%20Chapter%208%20Objectives

Description:

Security Chapter 8 Objectives Societal impact of information and information technology Explain the meaning of terms related to computer security and crime and ... – PowerPoint PPT presentation

Number of Views:190
Avg rating:3.0/5.0
Slides: 22
Provided by: Chl47
Category:

less

Transcript and Presenter's Notes

Title: Security%20Chapter%208%20Objectives


1
Security Chapter 8Objectives
  • Societal impact of information and information
    technology
  • Explain the meaning of terms related to computer
    security and crime and determine ways to protect
    both a business and yourself
  • Identify areas of computer security vulnerability
    and ways to protect against them
  • Recall the definition of encryption and apply the
    XOR encryption technique
  • Recognize good and bad passwords based on
    password guidelines

2
Security Resources you can use
  • Protecting your computer sound byte
  • http//wps.prenhall.com/bp_evans_techinaction_1/0,
    8697,1105530-,00.html
  • Norton AntiVirus Response Center Web Page
  • http//securityresponse.symantec.com/
  • Test the vulnerability of your computer
  • Gibson Research Corporation (http//www.grc.com)
  • Qualys (http//browsercheck.qualys.com/)

3
Computer security vulnerability points
  • Hardware
  • Software
  • People

4
Backup
  • Data and Files are vulnerable
  • Primary defense against data loss
  • Selective, incremental full

5
Software
  • Perform regular updates
  • http//update.microsoft.com for Windows
  • Microsoft update Windows, Office, more
  • Automatic updates
  • Check with vendors for updates
  • Verify e-mail notices independently

6
Hackers
  • Def
  • Types of hackers
  • White-hat
  • Black-hat
  • Script kiddies

7
What Hackers Do
  • Steal information from computers
  • Credit card numbers
  • Bank account numbers
  • Internet packet sniffing
  • Commit identity theft
  • Create widespread computer attacks
  • Backdoor programs (Trojan horse)
  • Denial of service attacks

8
How Hackers Gain Access
  • Direct access
  • Hacking software
  • Indirect access
  • Internet connection

9
Firewall
  • Def
  • Types of firewalls
  • Norton Personal Firewall
  • McAfee Firewall
  • Zone Alarm
  • BlackICE PC Protection
  • Network routers

10
Computer Viruses
  • What puts you at risk for viruses?

11
How to "Catch" a Virus
  • Email attachments. Do not open attachments
    before checking
  • Is this email from someone I know?
  • Is the message a sensible follow-up to the last
    message from the sender?
  • Is the content of the message something the
    sender would say to me?
  • Is there a reason for the sender to include an
    attachment?
  • When in doubt, be cautious

12
Antivirus Software
  • Def
  • Scan files looking for virus signatures (unique
    code)
  • Provide options for deleting or fixing infected
    files
  • Need to be updated frequently
  • Examples McAfee, Norton, and Sophos, Inc.

13
What Viruses Do
  • Replicate themselves
  • Slow down networks
  • Display annoying messages
  • Delete files
  • Change computer settings

Melissa Caused 80 million damage
Nimda Affected more than 1 million computers
Love Letter Fastest spreading virus
14
Logical security
  • Def
  • What are ways to protect your password?

15
Biometric identification systems
  • Fingerprint
  • Palm print
  • Iris scan
  • Face recognition technology

16
Encryption
  • Def
  • Encrypted data can be safely stored or
    transmitted
  • Why is this needed?

17
Encryption example
  • Using Exclusive OR, XOR, ?
  • If bits are the same, result is 0 if different 1
  • Apply a key to the plain or clear text

18
Encryption example
  • 0101 Cleartext (The hex digit 5)
  • ? 1001 Key

19
Encryption example
  • If the cleartext is the hex digit D and the XOR
    key is 1001, what is the encrypted text?

20
Encryption example
  • Encrypt the word NO with the key 10110110

21
Assignment
  • Using XOR and the key 10110110, determine the
    encrypted results for the ASCII text PASSWORD
  • Complete HTML3
Write a Comment
User Comments (0)
About PowerShow.com