Вы находитесь на странице: 1из 24

Learning Goal: Students will be able to understand the components associated with network risk

Computer Technology
Network Risks Ms. Hall December 2, 2013

Learning Goal
Students will be able to understand the components associated with network risk

Learning Goal: Students will be able to understand the components associated with network risk

Scale Yourself
4 I understand the components associated with network risk. I can teach this to others

3 2
1 0

I understand the components associated with network risk With help I understand the components associated with network risk
Ive heard of the the components associated with network risk I do not understand the components associated with network risk

Bellwork
Name 2 jobs in the Information Technology field

Network Risks
1. 2. 3. 4. 5. 6. 7. 8. Unauthorized Computer Use Privacy Loss Cookies, Spyware, Adware Identify Theft Malware Bots and Zombies Denial of Services Theft by Computer

Computer Security
Computer Crimes- illegal acts using a computer Cyber Crimes- Illegal acts using a computer on a network or over the internet

Hackers/Crackers
Hackers- break into computers or networks illegally Crackers- Destroy data, steal information and commit other malicious crimes Recovery can take a lot of time and money The more you know about various security risks the more aware you will be about possible signs of attack

Network Access
Computer and network access is often controlled by passwords and username These can compromised and stolen Networks can be secured but many wireless networks have little security or no security

Unauthorized users
War drivers- people who drive around and connect to others wireless networks to gain free wireless access Malicious hackers break into computers or networks to use destroy or steal the data from computers Most victims of unauthorized use and data theft are unaware data has been stolen. There are no physical clues to alert owners that their data has been compromised.

Privacy Loss
When data is transmitted across networks it is vulnerable to interception

Privacy Loss-Question????
What is a LAN/WAN?

Privacy Loss
Personal information is readily available and can be compromised in surprising ways Information you post online when you register for a website or shop online is readily available to the general public Protect your privacy when online. Give out as little information as possible Be careful when sending emails and text messages. You can never be sure who is reading your messages Be mindful of what info you reveal when working online

Cookies, Spyware, Adware


Cookies, Spyware, Adware pose additional risks to personal privacy Cookies-commercial websites employ cookies to identify users and customize webpages Cookie files contain personal data such as username, viewing preferences, and history Information can be shared with 3rd parties. You can limit the use of cookie by adjusting your browser settings Spyware -a form of malware secretly installed on network computers.

Cookies, Spyware, AdwareQuestion???


What are networked computers?

Cookies, Spyware, Adware


Spyware tracks and transmits personal data such as, financial info or browsing knowledge without permission Adware- displays unwanted advertisements in banners or popup windows Some adware comes with spyware attached Users can help protect their privacy by installing anti-spyware and anti-adware software on their computers or networks

Identity Theft
Identity theft is a serious computer security risks Thieves steal personal information including names, addresses, social security numbers, bank account numbers, and more Thieves assume identities to steal goods, services They can open credit cards and ruin credit scores Phishing emails- arrive in your email to try and trick you into revealing personal information pretending to be a legitimate institution (i.e. bank) Always be mindful of what information you reveal and to whom to protect your identity

Malware
Malware is software written with malicious intent that installs itself without permission Malware
Computer viruses Worms Trojan Horses All can damage data and programs

Malware
Malware spreads when an infected file is downloaded from a website or attached to an email message The infected file is then passed onto others The message can send itself out to contacts in an address book and spread the virus Viruses can multiply themselves Anti-virus software will protect computers from viruses and update it frequently

Bots and Zombies


Hackers and crackers use other peoples computers to perform illegal tasks while concealing their identities Hackers gain unauthorized access to network computers, take them over and turn them into zombies or bots Once your computer becomes a bot, hackers use it to perform malicious tasks across the network. Example: stealing passwords, logging keystrokes

Bots and Zombies


Most attacks go unnoticed. The only system might be the slowing down of the computer Forensic scientists who specialize in network traffic are hired to analyze networks to search for botnets.

Denial of Service
Denial of Service (DoS)- occurs when a hacker sends out programs to overload a server Overloaded servers can disable networked computers on websites or other networks By overwhelming the server the attack stops all communication and services for the company or website DoS attacks have been staged against corporations. Others are politically motivated acts of sabotage

Theft by Computer
Theft by computer is a growing problem in our networked world A thief can be seated thousands of miles away now and steal money from a bank Computer theft occurs when unauthorized users transfer money from one account to another or purchase goods and services with stolen money, credit card numbers or other illegal means Theft by computer is a growing problem because so much of our shopping is takes place over the internet and other network computers

IT Careers
Security managers- responsible for managing the security measures used to protect electronic data.

Classwork
Instructions: One person from each table will select an envelope with a computer security scenario. In groups (tables) read the scenario. Each table is an IT department at a nationally known hotel chain. The IT department is located at the corporate office. Use the scenario to complete the listed tasks. 1.Identify which network risk is described 2.Use your notes, Computer Security training module, or the Internet to write recommendations for solving the security problem 3.Recommend ways this problem can be avoided in the future 4.How will you inform employees of the recommendations 5.Write a 1 report (minimum) explaining your recommendation in Microsoft Word
Times New Roman 12 pt Font Double spaced

6.Create a PowerPoint presentation with your recommendations and information from your report In your groups each member will have a job Security Director (leader) Security Manager Security Manager Security Manager Security Manager

Вам также может понравиться