Which of the following is a technique intruders use to make their network or Internet transmission?

Successfully reported this slideshow.

Your SlideShare is downloading. ×

Check these out next

Which of the following is a technique intruders use to make their network or Internet transmission?

Which of the following is a technique intruders use to make their network or Internet transmission?

Slideshows for you

Similar to Computer security and privacy

Which of the following is a technique intruders use to make their network or Internet transmission?

More from Haider Ali Malik

Featured

Free with a 30 day trial from Scribd

See all

Free with a 30 day trial from Scribd

See all

Computer security and privacy

  1. 1. Presented By: Haider Ali Malik Department of Botany University of Sargodha
  2. 2.  Today, people rely on computers to create, store, and manage critical information.  A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
  3. 3.  Any illegal act involving a computer is referred to as a computer crime.  The term cybercrime refers to online or Internet-based illegal acts.  Software used by cybercriminals sometimes is called crimeware.
  4. 4. cracker script kiddie corporate spy unethical employee cyberextortionist cyberterrorist Perpetrators of cybercrime fall into seven basic categories:
  5. 5. Computer Security Risks HACKER • Hacker refers to someone who accesses a computer or network illegally. CRACKER • Cracker is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious actions. SCRPIT KIDDIE • Script Kiddie has the same intent as a cracker but does not have the technical skills and knowledge, using prewritten code to break into computers. CORPORATE SPY • Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer or identify risks in their own organization.
  6. 6. UNETHICAL EMPLOY • Unethical employees may break into their employers’ computers for a variety of reasons (exploit security, financial gains, etc.) CYBEREXT ORTIONIST • A cyberextortionist is someone who uses e-mail as a vehicle for extortion, threatening others for personal gain. CYBERTER RORIST • A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for personal reasons.
  7. 7. There are many techniques used for creating security risks. Most of the used attacks are:  Botnets  DOS Attacks  Backdoors  Spoofing TECHNIQUES FOR CYBER ATTACKS
  8. 8. Botnets  A botnet is a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks.  zombie, is a computer whose owner is unaware the computer is being controlled remotely by an outsider.  A bot is a program that performs a repetitive task on a network.  Cybercriminals install malicious bots on unprotected computers to create a botnet, also called a zombie army.
  9. 9. Denial of Service Attacks  A DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e- mail.  This is done by flooding a victim computer with confusing data messages, thus making it unresponsive.  A DDoS (distributed DoS) attack, is more devastating, in which a zombie army is used to attack computers or computer networks.
  10. 10. Back Doors  A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.  Some malware will install a back door once it infects the victim computer.
  11. 11. Spoofing Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network. • E-mail spoofing occurs when the sender’s address or other components of the e-mail header are altered so that it appears the e-mail originated from a different sender. • IP spoofing occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
  12. 12.  Some of the latest antivirus programs include provisions to protect a computer form DoS and DDoS attacks.  Users can also implement firewall solutions, install intrusion detection software, and set up honeypots.
  13. 13. Firewalls  A firewall is a hardware and/or software that protects a network’s resources from intrusion by users on another network such as the Internet.  A personal firewall is a utility program that detects and protects a personal computer and its data from unauthorized intrusions.
  14. 14. Intrusion Detection Software  Intrusion detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized intrusions, and notifies network admins.
  15. 15. Honeypot s  A honeypot is a vulnerable computer that is set up to entice an intruder to break into it.  They appear real to the intruder but are separated from the organization’s network.  They are used to learn how intruders are exploiting their network.
  16. 16.  Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.  To read the data, the recipient must decrypt, or decipher, it into a readable form.
  17. 17.  The unencrypted, readable data is called plaintext.  The encrypted (scrambled) data is called ciphertext.
  18. 18. Encryption  Some operating systems and e-mail programs allow you to encrypt the contents of files.  A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the message sender.
  19. 19.  Many Web browsers offer 40-bit, 128-bit, and even 1024-bit encryption, which are even higher levels of protection since they have longer keys.  A Web site that uses encryption techniques is known as a secure site, which use digital certificates along with a security protocol.
  20. 20. Digital Certificates  A digital certificate is a notice that guarantees a user or a Web site is legitimate.  A certificate authority (CA) is an authorized person or company that issues and verifies digital certificates.
  21. 21. Transport Layer Security  Transport Layer Security (TLS) a successor to Secure Sockets Layer (SSL), provides encryption of all data that passes between a client and an Internet server.  Both ends require a certificate and prevents perpetrators from accessing or tampering with communications  TLS protected websites typically begin with https, instead of http.
  22. 22. Secure HTTP  Secure HTTP (S-HTTP) allows users to choose an encryption scheme for data that passes between a client and server.  It is more difficult than TLS to use, but it is also more secure.
  23. 23. VPN  When a mobile user connects to a main office using a standard Internet connection, a virtual private network (VPN) provides the mobile user with a secure connection to the company network server, as if the user has a private line.  They help ensure that data is safe from being intercepted by unauthorized people by encrypting.

Is someone who uses the Internet or network to destroy or damage computers for political reasons?

Someone who uses the Internet or network to destroy or damage computers for political reasons. The cyber terrorist might target the nations air traffic control, electricity generating companies or a telecommunication infrastructure.

What provides a mobile user with a secure connection to a company network?

Mobile VPN That logical IP address stays to the mobile device. An effective mobile VPN provides continuous service to users and can switch across access technologies and multiple public and private networks.

Is hardware and or software that protects a network's resources from intrusion?

A firewall is hardware and/or software that is used to protect a computer or private network resources from intruders or hackers who might try to break into those systems. Basically, a firewall filters all network packets to determine whether to forward them toward their destination.

What are some common digital security risks quizlet?

The more common digital security risks include Internet and network attacks, unauthorized access and use, hardware theft, software theft, information theft, and system failure. COMPUTER CRIME: any illegal act involving the use of a computer or related devices generally is referred to as a computer crime.