SlideShare ist ein Scribd-Unternehmen logo
1 von 32
It all depends on your perspective!


Dear Tech Support:
  Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and
   noticed a slowdown in the overall performance, particularly
   in the flower and jewelry applications that had operated
   flawlessly under Boyfriend 5.0. In addition, Husband 1.0 un-
   installed many other valuable programs, such as Romance
   9.5and Personal Attention 6.5, but installed undesirable
   programs such as NFL5.0 and NBA 3.0. And now Conversation
   8.0 no longer runs and House Cleaning2.6 simply crashes the
   system. I've tried running Nagging 5.3 to fix these problems,
   but to no avail. What can I do?

                     Signed,
                     Desperate
                                                         2
Dear Desperate:
  First keep in mind - Boyfriend 5.0 is an entertainment package, while
  Husband 1.0 is an operating system. Try entering the Command
  C:I THOUGHTYOU LOVED ME and download Tears 6.2 to install Guilt
  3.0. If all works as designed, Husband 1.0 should then automatically
  run the applications Jewelry 2.0 and Flowers 3.5. But remember,
  overuse can cause Husband 1.0 to default to Grumpy Silence 2.5,
  Happy Hour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will
  create SnoringLoudly.wav files. Whatever you do, DO NOT install
  Mother-in-Law 1.0 or reinstall another Boyfriend program. These are
  not supported applications and will crash Husband 1.0. In summary,
  Husband1.0 is a great program, but it does have a limited memory
  and cannot learn new applications quickly. You might consider
  additional software to improve memory and performance. I
  personally recommend Great Food 3.0 and Lingerie 6.9.
                               Good Luck! Tech Support
                                                             3
Security vulnerabilities or security holes

    › Software bugs that allow violations of
      information security
    Software patches

    › Corrections to software bugs that cause security
      holes
    Piracy

    › The illegal copying, use, and distribution of
      digital intellectual property




                             4
Common forms of authentication

    › Something you know
       Password or personal identification number
        (PIN)
    › Something you have
       ID cards, smartcards, badges, keys,
    › Something about you
       Unique physical characteristics such as
        fingerprints

                           5
Username

    › Identifies a user to the computer system
    Password

    › A combination of characters known only to
     the user that is used for authentication
    Strongest passwords

    › Minimum of eight characters in length
    › Do not include any known words or names


                          6
Longer passwords provide greater security

    How can you make your password more secure?





                            7
Biometrics

    › The science and technology of
      authentication by scanning and
      measuring a person’s unique
      physical features
    Facial pattern recognition

    › Uses mathematical technique to
      measure the distances between 128
      points on the face
    Retinal scanning

Biometrics Video
What does the future hold?
                             8
California Bill to Blur Google Earth

 Google Flu Trends
 Just how much data does Google have
  about us…and how long do they maintain
  it?
    › Google used to store such data for 18
     months, but has now trimmed that duration to
     nine months. Until two years ago, Google had
     kept personally identifiable information about its
     Web for an indefinite amount of time


                           9
Intrusion detection software
                                                             Access control defines who
  analyzes network traffic, assesses
                                                              can access computer and
system vulnerabilities, and identifies
                                                             what actions they can take
 intrusions and suspicious behavior




                                Audit trail records access
                                        attempts
Security and network usage policy

    › Document, agreement, or contract that
       Defines acceptable and unacceptable uses
        of computer and network resources
    › Typically warn against using the network for
      illegal activities
    › Often called the “IT Code of Conduct”




                         11
According to Symantec:
SPAM accounts for 72% of all email messages

Most from US….followed by Russia then Turkey.

2003 Can-Spam Act in US

May, 2008: $230 million in its suit in favor of
 MySpace against the “Spam King”, Sanford
 Wallace
                        12
Methods of Attack

    › Key-logging
    › packet-sniffing
    › Port-scanning
    › Social engineering
    › Dumpster diving




                           13
Virus

    › Program that attaches itself to a file
    › Spreads to other files, and delivers a destructive action
      called a payload
    Trojan horses

    › Appear to be harmless programs
    › When they run, install programs on the computer that can
      be harmful
    Worm

    › Acts as a free agent, replicating itself numerous times in an
      effort to overwhelm systems
    Microsoft Video



                                 14
Worm copies
 Virus is a                        Trojan horse hides        Payload
              itself repeatedly,
potentially                               within           (destructive
                   using up
damaging                              or looks like       event) that is
                  resources
computer                               legitimate        delivered when
                 and possibly
 program                             program until      you open file, run
                shutting down
                                        triggered            infected
                 computer or
                                                        program, or boot
                   network
                                                         computer with
                                        Does not
Can spread                                                infected disk
                                        replicate
   and                                                    in disk drive
                                        itself on
 damage
                                          other
   files
                                       computers




                 Mobile Viruses
Specific

    pattern of
    virus code
Records
                   information
              about program such
                  as file size and
                      creation
        Uses
                        date        Attempts
    information
                                   to remove
     to detect if
                                  any detected
  virus tampers
                                      virus
      with file
                   Quarantines
                      infected
                    files that it
                       cannot
Keeps file
in separate           remove
area of hard disk
Never open an
                                                           e-mail attachment
       Set the macro security
                                 Install an antivirus
                                                             unless you are
         in programs so you
                                  program on all of
                                                            expecting it and
        can enable or disable
                                   your computers
                                                               it is from a
               macros
                                                             trusted source
  If the antivirus
                              Check all
program flags an
                            downloaded
e-mail attachment                                  Install a personal
                           programs for
as infected, delete                                firewall program
                          viruses, worms,
  the attachment
                          or Trojan horses
    immediately
Spyware

    › Software installed on a computer without user’s
     knowledge
    Zombie computer

    › Carries out actions (often malicious) under the
     remote control of a hacker
    Antispyware

    › Software that searches a computer for spyware
     and other software that may violate a user’s
     privacy
The latest from spywareguide.com
                           19
Viruses: $5.2 billion



    Spyware: $2.6 billion



    Phishing: $630 million



     Source: Consumer Reports, 9/06
•Runs consistently slower than normal

    •Stops responding or locks up often

    •Crashes and restarts every few minutes

    •Restarts on its own and then fails to run

    normally
    •Applications don't work properly

    •Disks or disk drives are inaccessible

    •Printing doesn't work correctly

    •You see unusual error messages

    •You see distorted menus and dialog boxes

59 million attempts from North America alone

    during 24 hours of monitoring
    (Consumer Reports, 9/06)

    Highest percentage (1/3) from US

    (Symantec, 3/07)
    Temple thwarts about 2000 attacks a day

    Security breach example:

    › April, 2006: University Texas – 197,000 social security
       numbers breached
    PA Breach of Personal Information Notification

    Act
    › 34 states have these
Malicious programs that control your PC without

    your knowledge
    6 million known cases, 2nd half of 2006 (Symantec)

    Turns your PC into a spam machine or a host for

    phishing sites
    Few years ago….Temple….server was hijacked

    and attacks launched from there. Brought down
    Ministry of Education’s System in Amsterdam.
    Interpol was involved.
2/3 of top risks in late 2006 (source: Symantec)

    were to get confidential information

    80% of these tracked key strokes



    The Black Market (source: 3/21/07 WSJ)

    › Complete ID, including name, address, birth
      date, ss#, bank accounts, etc. ---- $14-$18
    › Verified PayPal Account --- $50-$500
Security system

    consisting of
    hardware and/or
    software that
    prevents
    unauthorized
    network access




                      25
Program that protects personal computer and its data

    from unauthorized intrusions
    Monitors transmissions to and from computer

    Informs you of attempted intrusion





                            26
10 quick fixes for security problems




                 27
28
Duplicate of file, program, or disk

                                                 Three-generation
Full backup             Selective backup              backup
 all files in           select which files           preserves
 computer                   to back up            three copies of
                                                  important files



          In case of system failure or corrupted files,
          restore files by copying to original location
30
Discovery, collection, and analysis of evidence

    found on computers and networks

    Computer forensic analysts must have knowledge

    of the law, technical experience, communication
    skills, and willingness to learn




                             31
“Be the change you
  wish to see in the
  world.”

- Mahatma Ghandi


                       32

Weitere ähnliche Inhalte

Was ist angesagt?

Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software securityG Prachi
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirusShabnam Bashir
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus softwarekhalid umer
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot SecurityIRJET Journal
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewallsJay Shah
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identificationsandeep shergill
 
Malicious software
Malicious softwareMalicious software
Malicious softwaremsdeepika
 
IE Exploit Protection
IE Exploit ProtectionIE Exploit Protection
IE Exploit ProtectionKim Jensen
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsMehrdad Jingoism
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software rajakhurram
 
Malicious software
Malicious softwareMalicious software
Malicious softwarerajakhurram
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Dasun Hegoda
 

Was ist angesagt? (20)

Malicious software and software security
Malicious software and software  securityMalicious software and software  security
Malicious software and software security
 
Virus and types of antivirus
Virus and types of antivirusVirus and types of antivirus
Virus and types of antivirus
 
Antivirus
AntivirusAntivirus
Antivirus
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Review on Honeypot Security
Review on Honeypot SecurityReview on Honeypot Security
Review on Honeypot Security
 
Viruses,antiviruses & firewalls
Viruses,antiviruses & firewallsViruses,antiviruses & firewalls
Viruses,antiviruses & firewalls
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
IE Exploit Protection
IE Exploit ProtectionIE Exploit Protection
IE Exploit Protection
 
Lecture 3
Lecture 3Lecture 3
Lecture 3
 
Ceh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and wormsCeh v8 labs module 07 viruses and worms
Ceh v8 labs module 07 viruses and worms
 
Lecture 12 malicious software
Lecture 12 malicious software Lecture 12 malicious software
Lecture 12 malicious software
 
Top 10 antiviruses
Top 10 antivirusesTop 10 antiviruses
Top 10 antiviruses
 
Malicious
MaliciousMalicious
Malicious
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Computer Viruses & Management Strategies
Computer Viruses & Management Strategies Computer Viruses & Management Strategies
Computer Viruses & Management Strategies
 

Ähnlich wie Privacy, Security

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpointgalaxy201
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spywaredragaunus14
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solutionManoj Dongare
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 

Ähnlich wie Privacy, Security (20)

Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Viruses
Computer Viruses Computer Viruses
Computer Viruses
 
viruses
virusesviruses
viruses
 
Virus project
Virus projectVirus project
Virus project
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
Internet security
Internet securityInternet security
Internet security
 
Computervirus
Computervirus Computervirus
Computervirus
 
Virus and antivirus
Virus and antivirus Virus and antivirus
Virus and antivirus
 
computervirus.ppt
computervirus.pptcomputervirus.ppt
computervirus.ppt
 
COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
Anti-virus software and spyware
Anti-virus software and spywareAnti-virus software and spyware
Anti-virus software and spyware
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Presentation2
Presentation2Presentation2
Presentation2
 
It ppt new
It ppt newIt ppt new
It ppt new
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 

Kürzlich hochgeladen

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Kürzlich hochgeladen (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Privacy, Security

  • 1.
  • 2. It all depends on your perspective!  Dear Tech Support: Last year I upgraded from Boyfriend 5.0 to Husband 1.0 and noticed a slowdown in the overall performance, particularly in the flower and jewelry applications that had operated flawlessly under Boyfriend 5.0. In addition, Husband 1.0 un- installed many other valuable programs, such as Romance 9.5and Personal Attention 6.5, but installed undesirable programs such as NFL5.0 and NBA 3.0. And now Conversation 8.0 no longer runs and House Cleaning2.6 simply crashes the system. I've tried running Nagging 5.3 to fix these problems, but to no avail. What can I do? Signed, Desperate 2
  • 3. Dear Desperate: First keep in mind - Boyfriend 5.0 is an entertainment package, while Husband 1.0 is an operating system. Try entering the Command C:I THOUGHTYOU LOVED ME and download Tears 6.2 to install Guilt 3.0. If all works as designed, Husband 1.0 should then automatically run the applications Jewelry 2.0 and Flowers 3.5. But remember, overuse can cause Husband 1.0 to default to Grumpy Silence 2.5, Happy Hour 7.0 or Beer 6.1. Beer 6.1 is a very bad program that will create SnoringLoudly.wav files. Whatever you do, DO NOT install Mother-in-Law 1.0 or reinstall another Boyfriend program. These are not supported applications and will crash Husband 1.0. In summary, Husband1.0 is a great program, but it does have a limited memory and cannot learn new applications quickly. You might consider additional software to improve memory and performance. I personally recommend Great Food 3.0 and Lingerie 6.9. Good Luck! Tech Support 3
  • 4. Security vulnerabilities or security holes  › Software bugs that allow violations of information security Software patches  › Corrections to software bugs that cause security holes Piracy  › The illegal copying, use, and distribution of digital intellectual property 4
  • 5. Common forms of authentication  › Something you know  Password or personal identification number (PIN) › Something you have  ID cards, smartcards, badges, keys, › Something about you  Unique physical characteristics such as fingerprints 5
  • 6. Username  › Identifies a user to the computer system Password  › A combination of characters known only to the user that is used for authentication Strongest passwords  › Minimum of eight characters in length › Do not include any known words or names 6
  • 7. Longer passwords provide greater security  How can you make your password more secure?  7
  • 8. Biometrics  › The science and technology of authentication by scanning and measuring a person’s unique physical features Facial pattern recognition  › Uses mathematical technique to measure the distances between 128 points on the face Retinal scanning  Biometrics Video What does the future hold? 8
  • 9. California Bill to Blur Google Earth   Google Flu Trends  Just how much data does Google have about us…and how long do they maintain it? › Google used to store such data for 18 months, but has now trimmed that duration to nine months. Until two years ago, Google had kept personally identifiable information about its Web for an indefinite amount of time 9
  • 10. Intrusion detection software Access control defines who analyzes network traffic, assesses can access computer and system vulnerabilities, and identifies what actions they can take intrusions and suspicious behavior Audit trail records access attempts
  • 11. Security and network usage policy  › Document, agreement, or contract that  Defines acceptable and unacceptable uses of computer and network resources › Typically warn against using the network for illegal activities › Often called the “IT Code of Conduct” 11
  • 12. According to Symantec: SPAM accounts for 72% of all email messages Most from US….followed by Russia then Turkey. 2003 Can-Spam Act in US May, 2008: $230 million in its suit in favor of MySpace against the “Spam King”, Sanford Wallace 12
  • 13. Methods of Attack  › Key-logging › packet-sniffing › Port-scanning › Social engineering › Dumpster diving 13
  • 14. Virus  › Program that attaches itself to a file › Spreads to other files, and delivers a destructive action called a payload Trojan horses  › Appear to be harmless programs › When they run, install programs on the computer that can be harmful Worm  › Acts as a free agent, replicating itself numerous times in an effort to overwhelm systems Microsoft Video 14
  • 15. Worm copies Virus is a Trojan horse hides Payload itself repeatedly, potentially within (destructive using up damaging or looks like event) that is resources computer legitimate delivered when and possibly program program until you open file, run shutting down triggered infected computer or program, or boot network computer with Does not Can spread infected disk replicate and in disk drive itself on damage other files computers Mobile Viruses
  • 16. Specific  pattern of virus code
  • 17. Records information about program such as file size and creation Uses date Attempts information to remove to detect if any detected virus tampers virus with file Quarantines infected files that it cannot Keeps file in separate remove area of hard disk
  • 18. Never open an e-mail attachment Set the macro security Install an antivirus unless you are in programs so you program on all of expecting it and can enable or disable your computers it is from a macros trusted source If the antivirus Check all program flags an downloaded e-mail attachment Install a personal programs for as infected, delete firewall program viruses, worms, the attachment or Trojan horses immediately
  • 19. Spyware  › Software installed on a computer without user’s knowledge Zombie computer  › Carries out actions (often malicious) under the remote control of a hacker Antispyware  › Software that searches a computer for spyware and other software that may violate a user’s privacy The latest from spywareguide.com 19
  • 20. Viruses: $5.2 billion  Spyware: $2.6 billion  Phishing: $630 million  Source: Consumer Reports, 9/06
  • 21. •Runs consistently slower than normal  •Stops responding or locks up often  •Crashes and restarts every few minutes  •Restarts on its own and then fails to run  normally •Applications don't work properly  •Disks or disk drives are inaccessible  •Printing doesn't work correctly  •You see unusual error messages  •You see distorted menus and dialog boxes 
  • 22. 59 million attempts from North America alone  during 24 hours of monitoring (Consumer Reports, 9/06) Highest percentage (1/3) from US  (Symantec, 3/07) Temple thwarts about 2000 attacks a day  Security breach example:  › April, 2006: University Texas – 197,000 social security numbers breached PA Breach of Personal Information Notification  Act › 34 states have these
  • 23. Malicious programs that control your PC without  your knowledge 6 million known cases, 2nd half of 2006 (Symantec)  Turns your PC into a spam machine or a host for  phishing sites Few years ago….Temple….server was hijacked  and attacks launched from there. Brought down Ministry of Education’s System in Amsterdam. Interpol was involved.
  • 24. 2/3 of top risks in late 2006 (source: Symantec)  were to get confidential information 80% of these tracked key strokes  The Black Market (source: 3/21/07 WSJ)  › Complete ID, including name, address, birth date, ss#, bank accounts, etc. ---- $14-$18 › Verified PayPal Account --- $50-$500
  • 25. Security system  consisting of hardware and/or software that prevents unauthorized network access 25
  • 26. Program that protects personal computer and its data  from unauthorized intrusions Monitors transmissions to and from computer  Informs you of attempted intrusion  26
  • 27. 10 quick fixes for security problems 27
  • 28. 28
  • 29. Duplicate of file, program, or disk Three-generation Full backup Selective backup backup all files in select which files preserves computer to back up three copies of important files In case of system failure or corrupted files, restore files by copying to original location
  • 30. 30
  • 31. Discovery, collection, and analysis of evidence  found on computers and networks Computer forensic analysts must have knowledge  of the law, technical experience, communication skills, and willingness to learn 31
  • 32. “Be the change you wish to see in the world.” - Mahatma Ghandi 32