1
|
- Computer Security and Risks
|
2
|
|
3
|
- Computers are used to break laws as well as uphold them
- Computer crime involves:
- Theft by computer
- Software piracy
and intellectual property laws
- Software sabotage
- Hacking and electronic trespassing
|
4
|
- Computer crime is defined as any crime accomplished through knowledge or
use of
computer technology
- The typical computer criminal is a trusted
employee with no criminal record
|
5
|
- According to the FBI:
- Financial losses topped
$120 million in 1999
- More than 60 percent
of corporate, university,
and government sites
report at least one
break-in per year
|
6
|
- Theft is the most common form of computer crime
- Computers are used
to steal:
- Money
- Goods
- Information
- Computer resources
|
7
|
- Software piracy is the illegal duplication of copyrighted software
- Intellectual property includes the results of intellectual activities in
the arts, sciences, and industry
|
8
|
- Property laws:
- Inventions are patented
- Trade secrets are covered by contract law
- The expression of intellectual property can be copyrighted
- Look-and-feel lawsuits can result from mimicking intellectual property
|
9
|
- Trojan horse - performs a
useful task while also
being secretly
destructive; time bombs are an example
- Virus - spreads by making
copies of itself from
program to program or
disk to disk
- Worm - a program that travels
independently
over computer
networks, seeking uninfected sites
|
10
|
|
11
|
- Virus detection software locates and removes viruses
- These programs need to be
frequently revised
- More than 200 new virus appear
each month!
|
12
|
- Hackers are people who enjoyed learning the details of computer systems
- Hackers (or crackers) refers to people who break into computer systems
- Webjackers hijack Web pages and redirect users to other sites
- Denial of Service (DOS) attacks bombards servers and web sites with
traffic that shuts down the network
|
13
|
- Breaking into other computer systems is called electronic trespassing
- Electronic crime rings focus on stealing credit card numbers and other
valuable information
|
14
|
- Computer crime has led to a need to protect computer systems
- Computer security attempts to protect computers and the information they
contain
- Computer security protects against unwanted access, damage,
modification, or destruction
|
15
|
- Physical Access Restrictions
- Passwords
- Firewalls, Encryptions, and Audits
- Backups
- Law, Management, and Ethics
|
16
|
- Physical access restrictions are based on:
- Something you have, such as a key, ID card with photo, or a smart card
- Something you know, such as a password, an ID number, or a piece of
personal history
- Something you do, such as your signature or your typing speed and error
patterns
|
17
|
- Something about you, such as voice print, fingerprints, retinal scans,
or other measurements of individual body characteristics (biometrics)
|
18
|
- Passwords are the most common tool for restricting access to computer
system
|
19
|
- These security systems reduce or prohibit the interception of messages
between computers:
- Firewalls are like gateways with a lock
- Codes protect transmitted information and take a special key to decode
- Shields are specially developed machines that prevent unwanted
interception
|
20
|
- The computer serves as a firewall by scanning every message for security
risks before allowing it to pass into or out of the LAN
|
21
|
- To make a message secure from outsiders requires encryption software
- Encryption software scrambles the sent message using a key
- A different key is needed to unscramble the received message
|
22
|
|
23
|
- Audit-control software monitors and records computer activity
- Effective audit-control software forces every user to leave a trail of
electronic footprints
|
24
|
- The best and most widely used method to recover data is a routine for
making regular backups
- Many computer systems
are backed up at the
end of each work day
|
25
|
- Security measures
prevent crime, but can also pose threats to personal privacy
- Managers must make employees aware of security issues and risks
|
26
|
- Active badges can simultaneously improve security and threaten privacy
by:
- identifying who enters a door or logs onto a
machine
- finding an employee’s location or where they
have been throughout the
day
|
27
|
- Share with care
- Beware of BBS risks
- Don’t pirate software
- Disinfect regularly
- Treat diskettes with
care
- Take your password seriously
- Lock sensitive data
- Use backup systems
- Consider encryption
for Internet activities
- Prepare for the worst
|
28
|
- Computer security involves more than protection from trespassing,
sabotage, and other crimes
- Software errors and hardware glitches account for some of the most
important security issues, such as:
- Bugs and Breakdowns
- Computers at War
|
29
|
- Software bugs do more damage than viruses and computer burglars
combined.
- Facts about software engineering:
- It is impossible to eliminate all bugs.
- Even programs that appear to work can contain dangerous bugs.
- The bigger the system,the bigger the problem.
|
30
|
- Computer breakdowns pose a risk to the public and the incidence doubles
every two years.
- Hardware problems are rare when compared with
software failures
|
31
|
- Smart weapons are missiles that use computerized guidance systems to
locate their targets.
- An autonomous system is a complex system that can assume almost complete responsibility for a task
without human input.
|
32
|
- The front lines of the future may
in cyberspace
- By attacking computer networks an
enemy could
conceivably cripple:
|
33
|
|