Top Banner
Department of Mathematics Computer and Information Science 1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos
21

Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Dec 24, 2015

Download

Documents

Arline Marshall
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 1

Basics of Cyber Security and Computer Forensics

Christopher I. G. Lanclos

Page 2: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 2

Outline• What is cyber security?

• Online safety

• Computer forensics

• Password protection

• Malware

• Steganography

• Summary

• Questions

Page 3: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 3

What is cyber security?

• Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack

• Computer systems are always under constant attack

• Work to navigate the Internet cautiously and securely

Page 4: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 4

Social media

Page 5: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 5

Online safety

• Participating in Internet activities in a responsible and safe manner

• Being aware of where you are online and who has access to personal information

• Understand that anything placed on the Internet never goes away

Page 6: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 6

Essentials of online safety cont…

• Threats to online safety– Phishing

– Cyber predators

– Cyber bullying

Page 7: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 7

Phishing

• Phishing- attempting to obtain personal information by masquerading as a trustworthy site, person, or entity

Page 8: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 8

Cyber predators

• Cyber predators- an adult Internet user who exploits vulnerable children or teens, usually for sexual or other abusive purposes

Page 9: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 9

Cyber bullying

• Cyber bullying- when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed or otherwise targeted by another child, preteen or teen using the Internet

• Solution– Inform a trusted adult

Page 10: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 10

Computer forensics

• Used to examine the digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analyzing and presenting facts and opinions about the information

• Emerged during this time as a method to recover and investigate digital evidence for use in court

Page 11: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 11

Who are the bad guys?

• Blackhat hacker– An individual with extensive computer knowledge

whose purpose is to breach or bypass internet security

– Common name for individuals who commit computer crimes

• Forensic equipment and software are used to protect against attacks

Page 12: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 12

Computer forensics equipment

• Write Blocker– Devices that allow acquisition of information on

a drive without creating the possibility of accidentally damaging the drive contents

Page 13: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 13

Computer forensics software

• EnCase– Computer forensics products used to analyze

digital media (in civil/criminal investigations, network investigation, data compliance and electronic discovery) that is available to law enforcement agencies and corporations

Page 14: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 14

Malware

• Software that is intended to damage or disable computers and computer systems

• Launch attacks without the knowledge of users

Page 15: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 15

Types of Malware• Keylogger

– Software or hardware that captures keystrokes on a computer

• Worm– Type of malware that independently copies its self and attacks computer

systems

• Trojan horse– A harmful program that pretends to be something useful and helpful to a user

• Logic Bomb– Program inserted into software, that triggers when a set of specific conditions

occur

Page 16: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 16

Password protection

• Extremely important to protecting online accounts

• Should not include very common names (names of pets, people, or simple words in the dictionary)

Page 17: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 17

What happens to simple password?

• Easier passwords can be attacked

• Dictionary attacks can be used to guess simple to moderate complexity passwords

Page 18: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 18

Example

Page 19: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 19

How do we protect ourselves?

• Increase the length and variety of passwords• To create a strong password include:– Lowercase and uppercase letters– Numbers– Special characters– Length of seven characters or longer

• Example– Weak password- rover– Strong password- R043f112$*

Page 20: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 20

Steganography

• Art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient

• Use for a variety of reasons– Sending messages between friends– U.S. soldiers communicating secretly– Terrorists planning secret attacks on countries

Page 21: Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.

Department of Mathematics Computer and Information Science 21

Stego Examples

• QuickStegoWinHip