Академический Документы
Профессиональный Документы
Культура Документы
Please discontinue use of cell phone and turn off the ringer.
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
See what the White House has to say on the subject at http://www.whitehouse.gov/pcipb/
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
What is at Stake?
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
At stake:
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Identity Theft
Identity theft is the criminal act of using stolen information about a person to assume that persons identity, typically for financial gain.
Source: http://www.consumer.gov/sentinel
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
At stake:
Intellectual Property
Intellectual property refers to a product of the mind or intellect over which the owner holds legal entitlement. Intellectual property rights concern the legal ownership and use of intellectual property such as software, music, movies, data, and information. Intellectual property is legally protected through copyright, trademark, trade secret, and patent.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
At stake:
Organizational Information
For many businesses, the information it processes and stores is highly valuable and key to its success. Business intelligence is the process of gathering and analyzing information in the pursuit of business advantage. Competitive intelligence is concerned with gathering information about competitors. Counterintelligence is concerned with protecting ones own information from access by the competition.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
At stake:
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Threat:
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Threat:
User Negligence
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Threat:
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Threat:
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Machine-Level Security
Key Terms Username Password Biometrics Encryption
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Protecting a Stand-alone PC
Computers not connected to a network can only be attacked through physical presence.
Keep the PC in a locked room. Identify the person accessing the machine through authentication. Something you know (i.e. password) Something you have (i.e. card-swipe) Something about you (i.e. fingerprint)
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Passwords
A username identifies the user to the computer system. A password is a combination of characters known only to the user and used for authentication. An effective password should be:
strong by including words that are unrelated to your interests, and include upper and lowercase letters, numbers, and symbols unique dont use the same password for your bank account as you do for your email account changed regularly change your password twice a year
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Encryption
Encryption is a security technique that uses high-level mathematical functions and computer algorithms to encode data so that it is unintelligible to all but the intended recipient. Data stored on a PC can be encrypted and set so that a second password is required to decrypt it.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Remote Backup
Internet-based backup services are becoming increasingly popular as more users connect to the Internet through high-speed connections.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Network Security
Key Terms Multiuser system User permissions File ownership Interior threats
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Multiuser System
A multiuser system is a computer system, such as a computer network, where multiple users share access to resources such as file systems.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
User Permissions
User Permissions refer to the access privileges afforded to each network user in terms of who is able to read, write, and execute a file, folder, or drive. Files and folders are assigned user and group ownership.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Interior Threats
Interior threats refer to dangers to network resources from legitimate users. They include:
Threats to System Health and Stability Information Theft
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
War Driving
War driving is the act of driving through neighborhoods with a wireless notebook or handheld computer and looking for unsecured Wi-Fi networks.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Cable Modem
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Internet Security
Key Terms Firewall Virus Worm Antivirus Software Spyware Zombie Computer Antispyware Internet Fraud Phishing Virus Hoax
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Kevin Mitnick hacked to steal software and expose security holes. After serving nearly five years in U.S. federal prison, Mitnick now has his own information security consulting business.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
All Windows users should protect their network connection with a firewall.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Yeah right! This didnt come from Microsoft. The attachment is not a patch, nor an innocent text file (as it appears) but an executable file containing a virus.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Antivirus software, also known as virus scan software, uses several techniques to find viruses on a computer system, remove them if possible, and keep additional viruses from infecting the system.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Varieties of Viruses
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Classic Phishing
Is this email from customer.service@citibank.com legitimate?
If you clicked the link it would take you to a spoofed Citibank Webpage that looks like the real thing, and ask you to supply personal information like your username and password.
Holding the mouse pointer over the link in the original email shows that it really links to http://24.27.89.64:87 most likely a hackers Website.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
own systems
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Think again!
Do the search. Oh no! Ive got the Teddy Bear virus! Better delete it! This email has gotten thousands of Windows users to trash their own systems That file with the silly little Teddy bear icon is actually a necessary system file in Windows!
For more on this topic check out www.vmyths.com
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Zombies
A computer that carries out actions (often malicious) under the remote control of a hacker either directly or through spyware or a virus is called a zombie computer.
Experts say hundreds of thousands of computers are added to the ranks of zombies each week.
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Zombies
Zombie computers can join together to form zombie networks (botnet). Zombie networks apply the power of multiple PCs to overwhelm Web sites with distributed denial-of-service attacks, to crack complicated security codes, or to generate huge batches of spam.
It has been estimated that 80 to 90 percent of spam originates from zombie computers.
Storm worm botnet for rent
Succeeding with Technology, 4th ed > Computer Crime and Information Security >
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Defend yourself
The main defenses against scams, spam, fraud, and hoaxes are awareness and common sense. Important safeguards include the following:
Do not click links received in e-mails. Instead, type URLs directly into your Web browser. Examine Web addresses closely to make sure that they are legitimate and include an https:// for forms, or a closed lock icon in the address or status bar. Do not believe any virus alert sent through email unless it comes from a verifiable source.
Succeeding with Technology > th ed > Computer and Information Security > Technology, 4 Computer Crime Crime and Information Security >
Chapter 11 Questions?
Succeeding with Technology, 4th ed > Computer Crime and Information Security >