computer security problems

14
COMPUTER SECURITY PROBLEMS Engelber Ruiz Lien Ly Period 3

Upload: saman

Post on 24-Feb-2016

28 views

Category:

Documents


0 download

DESCRIPTION

COMPUTER SECURITY PROBLEMS. Engelber Ruiz Lien Ly Period 3. Computer security. 12 years ago, computer and network security was not at all well known. Today, most people are aware or know about the need of computer and network security, but not sure what is really means. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: COMPUTER SECURITY PROBLEMS

COMPUTER SECURITY PROBLEMS

Engelber RuizLien LyPeriod 3

Page 2: COMPUTER SECURITY PROBLEMS

Computer security

12 years ago, computer and network security was not at all well known.

Today, most people are aware or know about the need of computer and network security, but not sure what is really means.

Internet security is something that has become more and more needed over the last few years. As viruses become smarter and stronger, we need higher protection.

Page 3: COMPUTER SECURITY PROBLEMS

What is computer security Is information security as applied to

computers and networks. Computer security involves providing

appropriate levels of : Availability, confidentiality, integrity, auditability and non-repuldiablity.

Page 4: COMPUTER SECURITY PROBLEMS

Media stories

•Without proper wireless network security precautions in place, you can easily have valuable personal data stolen, your computers infected with spyware and crashed, or just be randomly harassed.

“ A router change is just a joke for a serious hacker. Since March 25, my life has been turned upside down by an aggressive hacker. I have lost the ability to communicate with friends and family, as doing so would place them in danger. First Facebook, then losing Yelp which at 300 reviews was my social connection. My passwords were repeatedly disabled - making me a security risk receiving notes like - "Please refrain from logging in for 72 hours". A Trojan Horse with Remote Access connected to my Skype and

Photo Booth on my MacBook Pro (!). Viruses included remote keyboard control and key logging. How did this get so far? I was recuperating from surgery on April 12, and it just got way out of hand. I sent the MBP out for wiping in May, and my IPhone 5 was taken hostage and remotely jail broken. 3 weeks later, it all resurfaced, and now my equipment is at a hired investigator. A nightmare. A malicious, diabolical issue cosing thousands.....”—maureen0123

Page 5: COMPUTER SECURITY PROBLEMS

Why do we need computer security?

Computer security is what keeps your computer safe from virus and people trying to hack into the information you have on your computer while you are online

Without computer security, online banking, trading, purchasing may be insecure.

Having computer security helps prevent credit card and identity thief.

Page 6: COMPUTER SECURITY PROBLEMS

Virus : Piece of code that automatically reproduces itself. It’s attached to other programs or files, but requires user intervention to propagate.

Common computer security issues

Hacking : In computer networking, hacking is any technical effort to manipulate the normal behavior of network connections and connected systems.

Page 7: COMPUTER SECURITY PROBLEMS

Unauthorized users Misrepresentation

of spoofing Unauthorized

invocation of services

Corruption of functions or operations

Denial of service SPAM Hacking

Types of computer security threats

Page 8: COMPUTER SECURITY PROBLEMS

Goals of computer security

• Guarantee that the data is what we expect.• The information must just be accessible for authorized people.• Computer should work without unexpected problems.• Guarantee that only authorized people get access to resources.

Page 9: COMPUTER SECURITY PROBLEMS

Protect Your Passwords

Here are a few principles for creating strong passwords and keeping them safe:

* The longer the password, the tougher it is to crack. Use at least 10 characters; 12 is ideal for most home users. * Mix letters, numbers, and special characters. Try to be unpredictable – don’t use your name, birthdate, or common words. * Don’t use the same password for many accounts. If it’s stolen from you – or from one of the companies with which you do business – it can be used to take over all your accounts. * Don’t share passwords on the phone, in texts or by email. Legitimate companies will not send you messages asking for your password. If you get such a message, it’s probably a scam. * Keep your passwords in a secure place, out of plain sight.

Page 10: COMPUTER SECURITY PROBLEMS

Requiring everyone to select and use a good password

Setting appropriate password aging parameters

Using third-party authentication.

Running updated anti-virus software

Setting restrictive file access permissions

Limiting privileges to the minimum needed to get the job done

Some proven system security measures

Page 11: COMPUTER SECURITY PROBLEMS

Firewalls Network

authentication measures

Appropriate network architectures

Limiting services that run

Intrusion detection Vulnerability

scanning

Proven network security measures

Page 12: COMPUTER SECURITY PROBLEMS

Cryptography Firewall Antivirus software

In addition, usershave to practice

“Safecomputing” Not opening

attachments Not downloading

from unsafe websites

Avoiding scams

How to achieve security

Page 13: COMPUTER SECURITY PROBLEMS

CrytographyThe art of protecting information by transforming it (encrypting it) into an unreadable format.

Cryptography is used to protect e-mail messages, credit card information, and corporate data.

Page 14: COMPUTER SECURITY PROBLEMS

Computer and information security continue to grow in importance

The gap between attackers’ capabilities and ability to defend against them is widening

Defense in depth ( multi-tiered defenses) work best

Always weigh costs versus benefits when considering security measures

Neglecting security is the worst thing you can do

Conclusion