SlideShare a Scribd company logo
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education
Understanding the Need
for Security Measures
Basic Security Concepts
• Threats
– Anything that can harm a computer
– Vulnerabilities are weaknesses in security
– Security attempts to neutralize threats
Basic Security Concepts
• Degrees of harm
– Level of potential damage
– Include all parts of system
• Potential data loss
• Loss of privacy
• Inability to use hardware
• Inability to use software
Basic Security Concepts
• Countermeasures
– Steps taken to block a threat
– Protect the data from theft
– Protect the system from theft
Threats To Users
• Identity Theft
– Impersonation by private information
• Thief can ‘become’ the victim
– Reported incidents rising
– Methods of stealing information
• Shoulder surfing
• Snagging
• Dumpster diving
• Social engineering
• High-tech methods
Threats To Users
• Loss of privacy
– Personal information is stored electronically
– Purchases are stored in a database
• Data is sold to other companies
– Public records on the Internet
– Internet use is monitored and logged
– None of these techniques are illegal
Threats to Users
• Cookies
– Files delivered from a web site
– Originally improved a site’s function
– Cookies now track history and passwords
– Browsers include cookie blocking tools
Threats to Users
• Spyware
– Software downloaded to a computer
– Designed to record personal information
– Typically undesired software
– Hides from users
– Several programs exist to eliminate
Threats to Users
• Web bugs
– Small programs embedded in gif images
– Gets around cookie blocking tools
– Companies use to track usage
– Blocked with spyware killers
Threats to Users
• Spam
– Unsolicited commercial email
– Networks and PCs need a spam blocker
• Stop spam before reaching the inbox
– Spammers acquire addresses using many
methods
– CAN-SPAM Act passed in 2003
Threats to Hardware
• Affect the operation or reliability
• Power-related threats
– Power fluctuations
• Power spikes or browns out
– Power loss
– Countermeasures
• Surge suppressors
• Line conditioners
• Uninterruptible power supplies
• Generators
Threats to Hardware
• Theft and vandalism
– Thieves steal the entire computer
– Accidental or intentional damage
– Countermeasures
• Keep the PC in a secure area
• Lock the computer to a desk
• Do not eat near the computer
• Watch equipment
• Chase away loiterers
• Handle equipment with care
Threats to Hardware
• Natural disasters
– Disasters differ by location
– Typically result in total loss
– Disaster planning
• Plan for recovery
• List potential disasters
• Plan for all eventualities
• Practice all plans
Threats to Data
• The most serious threat
– Data is the reason for computers
– Data is very difficult to replace
– Protection is difficult
• Data is intangible
Threats to Data
• Viruses
– Software that distributes and installs itself
– Ranges from annoying to catastrophic
– Countermeasures
• Anti-virus software
• Popup blockers
• Do not open unknown email
Threats to Data
• Trojan horses
– Program that poses as beneficial software
– User willingly installs the software
– Countermeasures
• Anti-virus software
• Spyware blocker
Threats to Data
• Cybercrime
– Using a computer in an illegal act
– Fraud and theft are common acts
Threats to Data
• Internet fraud
– Most common cybercrime
– Fraudulent website
– Have names similar to legitimate sites
Threats to Data
• Hacking
– Using a computer to enter another network
– Cost users $1.3 trillion in 2003
– Hackers motivation
• Recreational hacking
• Financial hackers
• Grudge hacking
– Hacking methods
• Sniffing
• Social engineering
• Spoofing
Threats to Data
• Distributed denial of service attack
– Attempt to stop a public server
– Hackers plant the code on computers
– Code is simultaneously launched
– Too many requests stops the server
Threats to Data
• Cyber terrorism
– Attacks made at a nations information
– Targets include power plants
– Threat first realized in 1996
– Organizations combat cyber terrorism
• Computer Emergency Response Team (CERT)
• Department of Homeland Security

More Related Content

PPTX
Indian Cyber Army
PPT
Introduction to Cyber Security
PDF
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
PPTX
Network defenses
PPTX
Security threats and safety measures
PPT
Internet Security
PDF
Cyber security
PPT
Information security and Attacks
Indian Cyber Army
Introduction to Cyber Security
What is Cyber Security? | Introduction to Cyber Security | Cyber Security Tra...
Network defenses
Security threats and safety measures
Internet Security
Cyber security
Information security and Attacks

What's hot (20)

PPTX
Network security
PPTX
Cyber security system presentation
PDF
Network Security Fundamentals
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
PPTX
Cyber security
PPT
Web Application Security
PPT
Software security engineering
PPTX
Cyber Security
PPTX
Operating System Security
PPTX
Introduction to Information Security
PPTX
Cyber security
PPTX
Cyber threats
PPTX
11. operating-systems-part-2
PPSX
Cyber security awareness for students
PPTX
Network security # Lecture 1
PPTX
Computer Viruses
PPTX
Network security
PPTX
CYBER SECURITY
Network security
Cyber security system presentation
Network Security Fundamentals
Cybersecurity 1. intro to cybersecurity
Cyber security
Web Application Security
Software security engineering
Cyber Security
Operating System Security
Introduction to Information Security
Cyber security
Cyber threats
11. operating-systems-part-2
Cyber security awareness for students
Network security # Lecture 1
Computer Viruses
Network security
CYBER SECURITY
Ad

Viewers also liked (7)

PPT
Security Measures
PPTX
Security Measures
PPT
Security Measure
PPTX
Security measures (Microsoft Powerpoint)
PPTX
Network Security
PPT
Skyscraper Security Mgt Part II- by Richard Garrity
PPT
Ict Security Measures
Security Measures
Security Measures
Security Measure
Security measures (Microsoft Powerpoint)
Network Security
Skyscraper Security Mgt Part II- by Richard Garrity
Ict Security Measures
Ad

Similar to Understanding the need for security measures (20)

PPT
Security and privacy
PPT
Chap11
PPT
Security and privacy
PPTX
Chap11
PPT
css ppt.ppt
PPT
Intro Ch 14A.ppt
PPTX
Chapter 13 security and ethical challenges
PPT
9. Computer Ethics.ppt
PPT
PPTX
Security Architectures and Models.pptx
PPT
How to become Hackers .
PDF
Lecture 7---Security (1).pdf
PDF
chapter13 - Computing Security Ethics.pdf
PPTX
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
PPT
Threats
PPTX
Security in Computer System
PDF
Security in computer systems fundamentals
PPTX
9 - Security
PPT
Isys20261 lecture 02
PPT
Hackers Cracker Network Intruder
Security and privacy
Chap11
Security and privacy
Chap11
css ppt.ppt
Intro Ch 14A.ppt
Chapter 13 security and ethical challenges
9. Computer Ethics.ppt
Security Architectures and Models.pptx
How to become Hackers .
Lecture 7---Security (1).pdf
chapter13 - Computing Security Ethics.pdf
DOC-20250311-WA00nnjnnnnnnnnnnnnnnnnnn..pptx
Threats
Security in Computer System
Security in computer systems fundamentals
9 - Security
Isys20261 lecture 02
Hackers Cracker Network Intruder

More from joy grace bagui (20)

PPTX
Social networking communication
PPTX
Activity 1 parts of the computer
PPT
Uses of computer
PPTX
Microsoft word
PPTX
Text formatting in ms w ord
PPT
Keyboarding skills
PPTX
Introduction to spreadsheet
PPTX
Information processing
PPT
Hardware and software
PPTX
Classification of computer
PPT
Application software
DOCX
Typing 1
DOCX
Quiz 3 hands on
DOCX
Paragraph formatting activity 3
DOCX
Midterm in ict
DOCX
Activity 6
DOCX
Activity 5 creating table
DOCX
Activity 4 creating graph
DOCX
Activity 2
Social networking communication
Activity 1 parts of the computer
Uses of computer
Microsoft word
Text formatting in ms w ord
Keyboarding skills
Introduction to spreadsheet
Information processing
Hardware and software
Classification of computer
Application software
Typing 1
Quiz 3 hands on
Paragraph formatting activity 3
Midterm in ict
Activity 6
Activity 5 creating table
Activity 4 creating graph
Activity 2

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PPTX
master seminar digital applications in india
PDF
Complications of Minimal Access Surgery at WLH
PDF
Pre independence Education in Inndia.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Types and Its function , kingdom of life
PPTX
Pharma ospi slides which help in ospi learning
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Insiders guide to clinical Medicine.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Basic Mud Logging Guide for educational purpose
Week 4 Term 3 Study Techniques revisited.pptx
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
master seminar digital applications in india
Complications of Minimal Access Surgery at WLH
Pre independence Education in Inndia.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Types and Its function , kingdom of life
Pharma ospi slides which help in ospi learning
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Insiders guide to clinical Medicine.pdf
PPH.pptx obstetrics and gynecology in nursing
102 student loan defaulters named and shamed – Is someone you know on the list?
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
VCE English Exam - Section C Student Revision Booklet
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

Understanding the need for security measures

  • 1. Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill Technology Education Understanding the Need for Security Measures
  • 2. Basic Security Concepts • Threats – Anything that can harm a computer – Vulnerabilities are weaknesses in security – Security attempts to neutralize threats
  • 3. Basic Security Concepts • Degrees of harm – Level of potential damage – Include all parts of system • Potential data loss • Loss of privacy • Inability to use hardware • Inability to use software
  • 4. Basic Security Concepts • Countermeasures – Steps taken to block a threat – Protect the data from theft – Protect the system from theft
  • 5. Threats To Users • Identity Theft – Impersonation by private information • Thief can ‘become’ the victim – Reported incidents rising – Methods of stealing information • Shoulder surfing • Snagging • Dumpster diving • Social engineering • High-tech methods
  • 6. Threats To Users • Loss of privacy – Personal information is stored electronically – Purchases are stored in a database • Data is sold to other companies – Public records on the Internet – Internet use is monitored and logged – None of these techniques are illegal
  • 7. Threats to Users • Cookies – Files delivered from a web site – Originally improved a site’s function – Cookies now track history and passwords – Browsers include cookie blocking tools
  • 8. Threats to Users • Spyware – Software downloaded to a computer – Designed to record personal information – Typically undesired software – Hides from users – Several programs exist to eliminate
  • 9. Threats to Users • Web bugs – Small programs embedded in gif images – Gets around cookie blocking tools – Companies use to track usage – Blocked with spyware killers
  • 10. Threats to Users • Spam – Unsolicited commercial email – Networks and PCs need a spam blocker • Stop spam before reaching the inbox – Spammers acquire addresses using many methods – CAN-SPAM Act passed in 2003
  • 11. Threats to Hardware • Affect the operation or reliability • Power-related threats – Power fluctuations • Power spikes or browns out – Power loss – Countermeasures • Surge suppressors • Line conditioners • Uninterruptible power supplies • Generators
  • 12. Threats to Hardware • Theft and vandalism – Thieves steal the entire computer – Accidental or intentional damage – Countermeasures • Keep the PC in a secure area • Lock the computer to a desk • Do not eat near the computer • Watch equipment • Chase away loiterers • Handle equipment with care
  • 13. Threats to Hardware • Natural disasters – Disasters differ by location – Typically result in total loss – Disaster planning • Plan for recovery • List potential disasters • Plan for all eventualities • Practice all plans
  • 14. Threats to Data • The most serious threat – Data is the reason for computers – Data is very difficult to replace – Protection is difficult • Data is intangible
  • 15. Threats to Data • Viruses – Software that distributes and installs itself – Ranges from annoying to catastrophic – Countermeasures • Anti-virus software • Popup blockers • Do not open unknown email
  • 16. Threats to Data • Trojan horses – Program that poses as beneficial software – User willingly installs the software – Countermeasures • Anti-virus software • Spyware blocker
  • 17. Threats to Data • Cybercrime – Using a computer in an illegal act – Fraud and theft are common acts
  • 18. Threats to Data • Internet fraud – Most common cybercrime – Fraudulent website – Have names similar to legitimate sites
  • 19. Threats to Data • Hacking – Using a computer to enter another network – Cost users $1.3 trillion in 2003 – Hackers motivation • Recreational hacking • Financial hackers • Grudge hacking – Hacking methods • Sniffing • Social engineering • Spoofing
  • 20. Threats to Data • Distributed denial of service attack – Attempt to stop a public server – Hackers plant the code on computers – Code is simultaneously launched – Too many requests stops the server
  • 21. Threats to Data • Cyber terrorism – Attacks made at a nations information – Targets include power plants – Threat first realized in 1996 – Organizations combat cyber terrorism • Computer Emergency Response Team (CERT) • Department of Homeland Security

Editor's Notes

  • #5: Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security.
  • #6: Teaching tip The move Hackers includes scenes demonstrating most of these crimes in action.
  • #8: Teaching tip Cookies are named after the ‘magic cookie’.
  • #10: Teaching tip More information regarding web bugs can be found at en.wikipedia.org/wiki/Web_bug.
  • #11: Teaching tip Spam is rumored to be named in honor of the Monty Python skit, Spam!. In the skit, a customer is forced to select spam in his lunch. Much like we are forced to accept a spam message. Visit www.detritus.org/spam/skit.html for the entire spam skit. Discussion point Spam is one topic that nearly everyone in the class can relate to. Have your students think about spam from the other side. Have them consider the point of view of the self proclaimed ‘Spam King’, Scott Richter. For some conversation fodder visit www.pcworld.com/news/article/0,aid,116807,00.asp.
  • #12: Teaching tip Visit www.apc.com for information regarding UPS solutions. Teaching tip Larger installations use generators to protect networks. Hospitals, grocery stores and insurance companies may all use generators. Quite often the power solution is a combination of battery and generator. The batteries run long enough for the generators to start and stabilize. Then the batteries stop and the generators provide power to the facility.
  • #14: Discussion point In 2004 Hurricane Ivan caused massive damage to Florida and several other states. Network administrations in Florida are used to planning for hurricanes. However, computers in Southeastern Pennsylvania suffered massive loss of data due to Ivan. How culpable are the administrators in PA who did not plan for Ivan?
  • #16: Teaching tip For information on specific viruses visit securityresponse.Symantec.com/. Teaching tip Detailed information regarding the protection from viruses, see the Computing keynote at the end of the chapter.
  • #17: Teaching tip Ad Aware is sold by LavaSoft. The homepage is www.lavasoftusa.com/software/adaware/. Spybot is a product of Patrick M. Kolla. The true website is www.safer-networking.org/en/index.html.
  • #22: Teaching tip CERT’s home page is located at www.cert.org.