Top Banner
Security Chapter 8 Objectives Societal impact of information and information technology Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself Identify areas of computer security vulnerability and ways to protect against them Recall the definition of encryption and apply the XOR encryption technique Recognize good and bad passwords based on password guidelines
21
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security

Security Chapter 8Objectives

• Societal impact of information and information technology

– Explain the meaning of terms related to computer security and crime and determine ways to protect both a business and yourself

– Identify areas of computer security vulnerability and ways to protect against them

– Recall the definition of encryption and apply the XOR encryption technique

– Recognize good and bad passwords based on password guidelines

Page 2: Security

Security Resources you can use

• Protecting your computer sound byte:http://wps.prenhall.com/bp_evans_techinaction_1/0,8697,1105530-,00.html

• Norton AntiVirus Response Center Web Page

http://securityresponse.symantec.com/• Test the vulnerability of your computer:

– Gibson Research Corporation (http://www.grc.com)

– Qualys (http://browsercheck.qualys.com/)

Page 3: Security

Computer security vulnerability points

• Hardware –

• Software –

• People –

Page 4: Security

Backup

• Data and Files are vulnerable

• Primary defense against data loss

• Selective, incremental & full

Page 5: Security

Software

• Perform regular updates

• http://update.microsoft.com for Windows

• Microsoft update: Windows, Office, more

• Automatic updates

• Check with vendors for updates

• Verify e-mail notices independently

Page 6: Security

Hackers

• Def:

• Types of hackers:– White-hat– Black-hat– Script kiddies

Page 7: Security

What Hackers Do

• Steal information from computers:– Credit card numbers– Bank account numbers

• Internet packet sniffing• Commit identity theft• Create widespread computer attacks:

– Backdoor programs (Trojan horse)

• Denial of service attacks

Page 8: Security

How Hackers Gain Access

• Direct access:– Hacking software

• Indirect access:– Internet connection

Page 9: Security

Firewall• Def:

• Types of firewalls:– Norton Personal Firewall– McAfee Firewall– Zone Alarm– BlackICE PC Protection– Network routers

Page 10: Security

Computer Viruses

• What puts you at risk for viruses?

Page 11: Security

How to "Catch" a Virus

• Email attachments. Do not open attachments before checking– Is this email from someone I know?– Is the message a sensible follow-up to the last

message from the sender?– Is the content of the message something the sender

would say to me?– Is there a reason for the sender to include an

attachment?

• When in doubt, be cautious

Page 12: Security

Antivirus Software• Def:

– Scan files looking for virus signatures (unique code)

– Provide options for deleting or fixing infected files

• Need to be updated frequently

• Examples: McAfee, Norton, and Sophos, Inc.

Page 13: Security

What Viruses Do

• Replicate themselves:– Slow down networks

• Display annoying messages

• Delete files

• Change computer settings

Love Letter – Fastest spreading virus

Melissa – Caused $80 million damage

Nimda – Affected more than 1 million computers

Page 14: Security

Logical security

Def:

What are ways to protect your password?

Page 15: Security

Biometric identification systems

– Fingerprint– Palm print– Iris scan– Face recognition technology

Page 16: Security

Encryption

• Def:

• Encrypted data can be safely stored or transmitted

• Why is this needed?

Page 17: Security

Encryption example

• Using Exclusive OR, XOR, If bits are the same, result is 0; if different 1

Apply a key to the plain or clear text

Page 18: Security

Encryption example

0101 Cleartext (The hex digit 5)

1001 Key

Page 19: Security

Encryption example

• If the cleartext is the hex digit D and the XOR key is 1001, what is the encrypted text?

Page 20: Security

Encryption example

• Encrypt the word NO with the key 10110110

Page 21: Security

Assignment

• Using XOR and the key 10110110, determine the encrypted results for the ASCII text: PASSWORD

• Complete HTML3