Академический Документы
Профессиональный Документы
Культура Документы
Computer Technology
Network Risks Ms. Hall December 2, 2013
Learning Goal
Students will be able to understand the components associated with network risk
Learning Goal: Students will be able to understand the components associated with network risk
Scale Yourself
4 I understand the components associated with network risk. I can teach this to others
3 2
1 0
I understand the components associated with network risk With help I understand the components associated with network risk
Ive heard of the the components associated with network risk I do not understand the components associated with network risk
Bellwork
Name 2 jobs in the Information Technology field
Network Risks
1. 2. 3. 4. 5. 6. 7. 8. Unauthorized Computer Use Privacy Loss Cookies, Spyware, Adware Identify Theft Malware Bots and Zombies Denial of Services Theft by Computer
Computer Security
Computer Crimes- illegal acts using a computer Cyber Crimes- Illegal acts using a computer on a network or over the internet
Hackers/Crackers
Hackers- break into computers or networks illegally Crackers- Destroy data, steal information and commit other malicious crimes Recovery can take a lot of time and money The more you know about various security risks the more aware you will be about possible signs of attack
Network Access
Computer and network access is often controlled by passwords and username These can compromised and stolen Networks can be secured but many wireless networks have little security or no security
Unauthorized users
War drivers- people who drive around and connect to others wireless networks to gain free wireless access Malicious hackers break into computers or networks to use destroy or steal the data from computers Most victims of unauthorized use and data theft are unaware data has been stolen. There are no physical clues to alert owners that their data has been compromised.
Privacy Loss
When data is transmitted across networks it is vulnerable to interception
Privacy Loss-Question????
What is a LAN/WAN?
Privacy Loss
Personal information is readily available and can be compromised in surprising ways Information you post online when you register for a website or shop online is readily available to the general public Protect your privacy when online. Give out as little information as possible Be careful when sending emails and text messages. You can never be sure who is reading your messages Be mindful of what info you reveal when working online
Identity Theft
Identity theft is a serious computer security risks Thieves steal personal information including names, addresses, social security numbers, bank account numbers, and more Thieves assume identities to steal goods, services They can open credit cards and ruin credit scores Phishing emails- arrive in your email to try and trick you into revealing personal information pretending to be a legitimate institution (i.e. bank) Always be mindful of what information you reveal and to whom to protect your identity
Malware
Malware is software written with malicious intent that installs itself without permission Malware
Computer viruses Worms Trojan Horses All can damage data and programs
Malware
Malware spreads when an infected file is downloaded from a website or attached to an email message The infected file is then passed onto others The message can send itself out to contacts in an address book and spread the virus Viruses can multiply themselves Anti-virus software will protect computers from viruses and update it frequently
Denial of Service
Denial of Service (DoS)- occurs when a hacker sends out programs to overload a server Overloaded servers can disable networked computers on websites or other networks By overwhelming the server the attack stops all communication and services for the company or website DoS attacks have been staged against corporations. Others are politically motivated acts of sabotage
Theft by Computer
Theft by computer is a growing problem in our networked world A thief can be seated thousands of miles away now and steal money from a bank Computer theft occurs when unauthorized users transfer money from one account to another or purchase goods and services with stolen money, credit card numbers or other illegal means Theft by computer is a growing problem because so much of our shopping is takes place over the internet and other network computers
IT Careers
Security managers- responsible for managing the security measures used to protect electronic data.
Classwork
Instructions: One person from each table will select an envelope with a computer security scenario. In groups (tables) read the scenario. Each table is an IT department at a nationally known hotel chain. The IT department is located at the corporate office. Use the scenario to complete the listed tasks. 1.Identify which network risk is described 2.Use your notes, Computer Security training module, or the Internet to write recommendations for solving the security problem 3.Recommend ways this problem can be avoided in the future 4.How will you inform employees of the recommendations 5.Write a 1 report (minimum) explaining your recommendation in Microsoft Word
Times New Roman 12 pt Font Double spaced
6.Create a PowerPoint presentation with your recommendations and information from your report In your groups each member will have a job Security Director (leader) Security Manager Security Manager Security Manager Security Manager