information technology in a global society: security taylor moncrief

16
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Upload: norma-sutton

Post on 21-Jan-2016

228 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Page 2: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

WHAT IS SECURITY?• All types of security, including the shield of computers, is

the process of protecting something from unauthorized users.

• In the “technology world”, it includes the protection of hardware, software, and data.

• Everyone should be aware of the potential consequences of security problems!

Page 3: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief
Page 4: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief
Page 5: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

ARE YOU WHO YOU SAY YOU ARE?• Authentication- This is what requires users to prove their

identify to a system

• These techniques can be divided into three different categories. Something you know, something you have, and something you are.

Page 6: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Something you Know Something you Have Something you Are

Passwords and Pins• Use more than 12

Characters• Change passwords

frequently • Never write them down

A physical object• Key• Security Tokens (resembles a

keychain that the is owned by the owner and easily carried)

Biometrics• Fingerprints, Iris Patterns, face

shape, and voice patterns.

Page 7: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

HACKING (CRACKING)• Gaining Unauthorized access

to computer systems

• Social Engineering- Involves simply tricking the user into revealing their password or other data.

• A Password Cracker- a program designed to guess passwords

• Packet Sniffer- program that captures data as it travels over networks.

Page 8: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief
Page 9: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

VIRUSESAre malicious programs designed to replicate themselves and cause damage to computer systems.

Triggered when a user opens the program or attachment.

Deleting or overwriting filesWiping the hard disk

Page 10: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

Worms Trojan Horses Spyware

Similar to viruses, but spread without any user interaction

Instead of spreading on their own, Trojan horses rely on tricking the user into downloading and running them

Form of malware which monitor the users activities without their knowledge or permission.

Page 11: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

INFILTRATING THE PENTAGON• Lost thumb drive found in the parking lot of a US Military

base

• An employee inserted it into a military laptop

• Leading to the “most significant breach ever of US military computer networks

• This flash drive was placed in the car park by a foreign intelligence agency, and was infected with Agent.BTZ worm

• Took over a year to remove the work from compromised systems.

Page 12: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

SPAM• Unwanted messages that are sent to many users at once

• Spammers technique is to entice users to opening the emails One Day after Michael Jackson’s death, spam emails began to offer

information about his death.

• Impacts of spam are the potential exposure to malware infected attachments, which can have a serious impact on businesses. This can slow down email servers, consuming disk space and bandwidth.

Page 13: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

PHISHING AND IDENTITY THEFT

• Phishing is the way hackers attempt to impersonate genuine organizations in order to fool the user into providing sensitive data and passwords.

• Identity Theft is the stealing of somebody's personal data in order to impersonate them.

• Both of these actions are used to draw money from victims accounts or commit further crime.

Page 14: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

ENCRYPTION

Is needed to protect data from unauthorized access when it is sent over an untrusted network, like the internet. They use specific keys to transform a message into a form not understandable until the message is received.

Click icon to add picture

Page 15: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

PHYSICAL SECURITY• Measures are intended to prevent intruders from gaining

access to a computer system

• Basic physical security includes locks on computer room doors and computer cabinets , as well as alarms and body guards.

Page 16: INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief

WORKS CITED

"Information Technology in a Global Society (ITGS) Textbook." ITGS Textbook. N.p., n.d. Web. 08 Oct. 2015.