Вы находитесь на странице: 1из 19

Unauthorized Access

Presented by:
Tan Cheng Ying
Low Chuan Jian
Unauthorized Access
hacking begins defining by the law in
two ways:

(1) Unauthorized access to computer
systems
(2) Access that exceeds a persons
authorized limits

How do unauthorized
accesses occur
Unauthorized access may occur
through:

(1) A Virus
(2) An Unsecured Wireless Network
(3) A Brute-Force Attack

Scenario
The outright record for data theft
The hackers, Albert Gonzalez, 28, a Miami resident.
Stealing 130 million credit card and debit card
numbers.
Corresponding account information from more
than 250,000 merchants.
40 million numbers that he had previously siphoned
off, starting in December 2007.
Using malware and other software hacking
programs, also called sniffers, to hack financial
processing centers and intercept credit and debit
card data.
Prevention Methods
Present Guidelines given.
should followed by organizations (such
as companies) and individuals.
to prevent and discover damage due
to unauthorized computer access.

Prevention Methods
Guidelines consists of
Guidelines for system users
Guidelines for system administrators
Guidelines for network service
providers
Prevention Methods
Guidelines for system users

Password and user ID control
Information control
Computer control
Prevention Methods
Guidelines for system administrators

Control structure establishment
System user control
Information control
Equipment control
Prevention Methods
Guidelines for network providers

Control structure establishment
Network service user control
Information control
Equipment control
Choice of best method
Firewall
a protective system - helps to screen out
hackers, viruses, and worms that try to reach
your computer over the Internet.
carefully analyze data entering and exiting
the network based on your configuration.
it ignores information that comes from
unsecured, unknown or suspicious locations.
Choice of best method
Why do I need a firewall? What can a firewall protect
against?
It keep hackers out of your network.
It protect you against any type of network-borne
attack if you unplug it.
It help to prevent other people from using your
computer to attack other computers without your
knowledge.
A firewall also can act as your corporate
``ambassador'' to the Internet.
it often plays an important role as a security blanket
for management.

Choice of best method
Types of firewall

(1) Hardware firewall
a hardware device that attached to your computer.
it able to block all kinds of viruses and can either
prevent or slow down a hacker trying to do a port
scan to hack your computer.

(2) Software firewall
a software program that loaded onto your computer.
helps protect that computer from unauthorized
incoming and outgoing data.
Top Three Firewall Software 2010
1. ZoneAlarm PRO Firewall 2010

Top Three Firewall Software 2010
2. F-Secure Internet Security 2010
Top Three Firewall Software 2010
3.Prisma Firewall 2009

Conclusion
Preventing unauthorized access can be a
challenge.
There are some important things you can do
to prevent hacking, or at least minimize your
risk.
No system can ever be completely secure.
One that cant be accessed by anyone or
anything, which makes it completely
unusable is the only network, Web site, or
computer system thats 100% secure.
The goal for securing your system should be
to balance security with accessibility.

Вам также может понравиться