SlideShare a Scribd company logo
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education
McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education
Chapter 14A
Understanding the Need
for Security Measures
14A-3
Basic Security Concepts
• Threats
– Anything that can harm a computer
– Vulnerabilities are weaknesses in security
– Security attempts to neutralize threats
14A-4
Basic Security Concepts
• Degrees of harm
– Level of potential damage
– Include all parts of system
• Potential data loss
• Loss of privacy
• Inability to use hardware
• Inability to use software
14A-5
Basic Security Concepts
• Countermeasures
– Steps taken to block a threat
– Protect the data from theft
– Protect the system from theft
14A-6
Threats To Users
• Identity Theft
– Impersonation by private information
• Thief can ‘become’ the victim
– Reported incidents rising
– Methods of stealing information
• Shoulder surfing
• Snagging
• Dumpster diving
• Social engineering
• High-tech methods
14A-7
Threats To Users
• Loss of privacy
– Personal information is stored electronically
– Purchases are stored in a database
• Data is sold to other companies
– Public records on the Internet
– Internet use is monitored and logged
– None of these techniques are illegal
14A-8
Threats to Users
• Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
14A-9
Threats to Users
• Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
14A-10
Threats to Users
• Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
14A-11
Threats to Users
• Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
• Stop spam before reaching the inbox
– Spammers acquire addresses using many
methods
– CAN-SPAM Act passed in 2003
14A-12
Threats to Hardware
• Affect the operation or reliability
• Power-related threats
– Power fluctuations
• Power spikes or browns out
– Power loss
– Countermeasures
• Surge suppressors
• Line conditioners
• Uninterruptible power supplies
• Generators
14A-13
Threats to Hardware
• Theft and vandalism
– Thieves steal the entire computer
– Accidental or intentional damage
– Countermeasures
• Keep the PC in a secure area
• Lock the computer to a desk
• Do not eat near the computer
• Watch equipment
• Chase away loiterers
• Handle equipment with care
14A-14
Threats to Hardware
• Natural disasters
– Disasters differ by location
– Typically result in total loss
– Disaster planning
• Plan for recovery
• List potential disasters
• Plan for all eventualities
• Practice all plans
14A-15
Threats to Data
• The most serious threat
– Data is the reason for computers
– Data is very difficult to replace
– Protection is difficult
• Data is intangible
14A-16
Threats to Data
• Viruses
– Software that distributes and installs itself
– Ranges from annoying to catastrophic
– Countermeasures
• Anti-virus software
• Popup blockers
• Do not open unknown email
14A-17
Threats to Data
• Trojan horses
– Program that poses as beneficial software
– User willingly installs the software
– Countermeasures
• Anti-virus software
• Spyware blocker
14A-18
Threats to Data
• Cybercrime
– Using a computer in an illegal act
– Fraud and theft are common acts
14A-19
Threats to Data
• Internet fraud
– Most common cybercrime
– Fraudulent website
– Have names similar to legitimate sites
14A-20
Threats to Data
• Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
• Recreational hacking
• Financial hackers
• Grudge hacking
– Hacking methods
• Sniffing
• Social engineering
• Spoofing
14A-21
Threats to Data
• Distributed denial of service attack
– Attempt to stop a public server
– Hackers plant the code on computers
– Code is simultaneously launched
– Too many requests stops the server
14A-22
Threats to Data
• Cyber terrorism
– Attacks made at a nations information
– Targets include power plants
– Threat first realized in 1996
– Organizations combat cyber terrorism
• Computer Emergency Response Team (CERT)
• Department of Homeland Security
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
McGraw-Hill Technology Education
Chapter 14A
End of Chapter

More Related Content

PPT
Understanding the need for security measures
PPT
Viruses (Lecture) IT Slides # 3
PPTX
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
PPT
PDF
Information Systems Audit - Auditing Information Systems
PPT
How to become Hackers .
PPTX
Security_Awareness_Primer.pptx
PPTX
Cyber security
Understanding the need for security measures
Viruses (Lecture) IT Slides # 3
Understanding computer attacks and attackers - Eric Vanderburg - JURINNOV
Information Systems Audit - Auditing Information Systems
How to become Hackers .
Security_Awareness_Primer.pptx
Cyber security

Similar to Intro Ch 14A.ppt (20)

PPT
PPT
Hackers
PPT
Hackers
PDF
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
PPT
Intro ch 14_b
PPTX
Computer Security and their social effect and their usage.
PPT
Hackers Cracker Network Intruder
PDF
Unit14-Computer Security and ethics -downloaded.pdf
PPTX
Computer security & ethics
PPTX
Need for security attacks and threats Chap 2.pptx
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PPT
Security and ethical challenges in mis
PPTX
USG_Security_Awareness_Primer (1).pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Awareness Security 123.pptx
PPTX
USG_Security_Awareness_Primer.pptx
PPTX
Chapter-2 (1).pptx
PPTX
IT Threats and Computer Security
PPT
Sahilmod 120315100301-phpapp01
DOCX
Chapter 10.0
Hackers
Hackers
2.Security (1).pdfccccccccccccccccccccccccccccccccccccccccccccc
Intro ch 14_b
Computer Security and their social effect and their usage.
Hackers Cracker Network Intruder
Unit14-Computer Security and ethics -downloaded.pdf
Computer security & ethics
Need for security attacks and threats Chap 2.pptx
c13 Security and Ethics(1)(1)(1).pptsasdax
Security and ethical challenges in mis
USG_Security_Awareness_Primer (1).pptx
USG_Security_Awareness_Primer.pptx
Awareness Security 123.pptx
USG_Security_Awareness_Primer.pptx
Chapter-2 (1).pptx
IT Threats and Computer Security
Sahilmod 120315100301-phpapp01
Chapter 10.0

Recently uploaded (20)

PDF
.pdf is not working space design for the following data for the following dat...
PPTX
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
PDF
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
PPTX
IB Computer Science - Internal Assessment.pptx
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PDF
Fluorescence-microscope_Botany_detailed content
PDF
Clinical guidelines as a resource for EBP(1).pdf
PPTX
SAP 2 completion done . PRESENTATION.pptx
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PDF
[EN] Industrial Machine Downtime Prediction
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
PPTX
1_Introduction to advance data techniques.pptx
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
Introduction to machine learning and Linear Models
PDF
Introduction to Data Science and Data Analysis
.pdf is not working space design for the following data for the following dat...
Microsoft-Fabric-Unifying-Analytics-for-the-Modern-Enterprise Solution.pptx
BF and FI - Blockchain, fintech and Financial Innovation Lesson 2.pdf
IB Computer Science - Internal Assessment.pptx
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
Fluorescence-microscope_Botany_detailed content
Clinical guidelines as a resource for EBP(1).pdf
SAP 2 completion done . PRESENTATION.pptx
Galatica Smart Energy Infrastructure Startup Pitch Deck
[EN] Industrial Machine Downtime Prediction
IBA_Chapter_11_Slides_Final_Accessible.pptx
Reliability_Chapter_ presentation 1221.5784
01_intro xxxxxxxxxxfffffffffffaaaaaaaaaaafg
1_Introduction to advance data techniques.pptx
climate analysis of Dhaka ,Banglades.pptx
Introduction to machine learning and Linear Models
Introduction to Data Science and Data Analysis

Intro Ch 14A.ppt

  • 1. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.
  • 2. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14A Understanding the Need for Security Measures
  • 3. 14A-3 Basic Security Concepts • Threats – Anything that can harm a computer – Vulnerabilities are weaknesses in security – Security attempts to neutralize threats
  • 4. 14A-4 Basic Security Concepts • Degrees of harm – Level of potential damage – Include all parts of system • Potential data loss • Loss of privacy • Inability to use hardware • Inability to use software
  • 5. 14A-5 Basic Security Concepts • Countermeasures – Steps taken to block a threat – Protect the data from theft – Protect the system from theft
  • 6. 14A-6 Threats To Users • Identity Theft – Impersonation by private information • Thief can ‘become’ the victim – Reported incidents rising – Methods of stealing information • Shoulder surfing • Snagging • Dumpster diving • Social engineering • High-tech methods
  • 7. 14A-7 Threats To Users • Loss of privacy – Personal information is stored electronically – Purchases are stored in a database • Data is sold to other companies – Public records on the Internet – Internet use is monitored and logged – None of these techniques are illegal
  • 8. 14A-8 Threats to Users • Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 9. 14A-9 Threats to Users • Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 10. 14A-10 Threats to Users • Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 11. 14A-11 Threats to Users • Spam – Unsolicited commercial email – Networks and PCs need a spam blocker • Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003
  • 12. 14A-12 Threats to Hardware • Affect the operation or reliability • Power-related threats – Power fluctuations • Power spikes or browns out – Power loss – Countermeasures • Surge suppressors • Line conditioners • Uninterruptible power supplies • Generators
  • 13. 14A-13 Threats to Hardware • Theft and vandalism – Thieves steal the entire computer – Accidental or intentional damage – Countermeasures • Keep the PC in a secure area • Lock the computer to a desk • Do not eat near the computer • Watch equipment • Chase away loiterers • Handle equipment with care
  • 14. 14A-14 Threats to Hardware • Natural disasters – Disasters differ by location – Typically result in total loss – Disaster planning • Plan for recovery • List potential disasters • Plan for all eventualities • Practice all plans
  • 15. 14A-15 Threats to Data • The most serious threat – Data is the reason for computers – Data is very difficult to replace – Protection is difficult • Data is intangible
  • 16. 14A-16 Threats to Data • Viruses – Software that distributes and installs itself – Ranges from annoying to catastrophic – Countermeasures • Anti-virus software • Popup blockers • Do not open unknown email
  • 17. 14A-17 Threats to Data • Trojan horses – Program that poses as beneficial software – User willingly installs the software – Countermeasures • Anti-virus software • Spyware blocker
  • 18. 14A-18 Threats to Data • Cybercrime – Using a computer in an illegal act – Fraud and theft are common acts
  • 19. 14A-19 Threats to Data • Internet fraud – Most common cybercrime – Fraudulent website – Have names similar to legitimate sites
  • 20. 14A-20 Threats to Data • Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation • Recreational hacking • Financial hackers • Grudge hacking – Hacking methods • Sniffing • Social engineering • Spoofing
  • 21. 14A-21 Threats to Data • Distributed denial of service attack – Attempt to stop a public server – Hackers plant the code on computers – Code is simultaneously launched – Too many requests stops the server
  • 22. 14A-22 Threats to Data • Cyber terrorism – Attacks made at a nations information – Targets include power plants – Threat first realized in 1996 – Organizations combat cyber terrorism • Computer Emergency Response Team (CERT) • Department of Homeland Security
  • 23. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Chapter 14A End of Chapter