SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Downloaden Sie, um offline zu lesen
Computer Security
   and Risks
  Introduction to Computer Science
              2007-2008
Aims

•   Describing several types of computer crime

•   Describing the major security issues that
    computer users have to face

•   Describing how it affects to personal privacy

•   Explaining the relationship between security
    and computer reliability


                4626. Introd to Computer Science
Computer Crime
 Crime accomplished through computer tech.

 •   widely extended: easiness of computer
     usage

 •   most of them committed by company
     insiders

 •   high cost: foresight + repair
 Current threats

 •   spoofing (or phishing): identity theft

         4626. Introd to Computer Science
Software Piracy
•   Illegal duplication of copyrighted software

•   Reasons:

    •   price of software

    •   means to create copies


How many pirate programs do
        you have?
                    4626. Introd to Computer Science
Intellectual Property
•   Privileges granted over intangible goods with
    financial value

•   They are defined over

    •   copyright                                 Authorship rights
    •   commercial secret

    •   patents                                Industrial property

    •   trademarks

•   Software is covered by copyright
                     4626. Introd to Computer Science
Computer Sabotage
      Use of malware to spoil
        hardware & software


•   Trojan horses

•   Viruses

•   Worms


              4626. Introd to Computer Science
Trojans
•   hidden inside programs that perform
    useful tasks

•   logic bombs: programmed to ‘attack’ in
    response to a particular event (e.g. time
    bombs)

•   solutions

    •   software from reliable sources
        (avoids)

    •   anti-trojan (detects)

    •   firewall -output- (blocks)
                                4626. Introd to Computer Science
Viruses
•   as biological ones

•   invade programs and use them to reproduce
    themselves

•   operative system specific

•   solution:

    •   use carefully removable media (avoids)

    •   antivirus (detects and cleans)


                    4626. Introd to Computer Science
Worms
•   as viruses: use computers to
    reproduce themselves

•   autonomous spread through
    computer networks

•   solution:

    •   email from confident sources
        (avoids)

    •   firewall -input- (blocks)

    •   security patches

                           4626. Introd to Computer Science
Hacking

•   Discovering and exploiting
    computer system failures

•   Reasons:

    •   curiosity

    •   intellectual challenge

•   Cracking = criminal hacking



                         4626. Introd to Computer Science
Reducing Risks
Information systems have to be protected...

                                                  •   to work properly

                                                  •   to guarantee access
                                                      to information only
                                                      to granted users

                                                  •   to guarantee
                                                      privacy



               4626. Introd to Computer Science
Physical Access
                 Restrictions
                  Only authorised staff
              have access to the equipment
Security checks based on…
  •   something you have (card)
  •   something you know (password)
  •   something you do (signature)
  •   something about you (scans)



                           4626. Introd to Computer Science
How
can we protect
   sensitive
 information?
1. protect hw
UPS
• uninterruptible
  power supply
• protects data
  during power
  failures (minutes)
• give users time
  to switch off
  the system
Surge
protectors
                    •     shield computers from power
                          spikes

                    •     protect the computer from
                          physical damage
             4626. Introd to Computer Science
2. protect data
Passwords
 The most common tool,
   but carefully chosen


 •   which kind of password do you use?

 •   how frequently do you change your passwords?

 •   how many passwords do you use?


Never use a word or your b-day!!
                    4626. Introd to Computer Science
Firewalls
• guard against
  unauthorised access
• blocks accessing ports for
  input and output
• by hardware or software
Encryption
•   keys to code messages
    and documents

•   symmetric:
    common key

•   asymmetric:
    public / private keys



                   4626. Introd to Computer Science
Audit Control SW


•   Records computer
    transactions

•   Auditors can trace and
    identify suspicious activities



                    4626. Introd to Computer Science
2. replicate
Backup Copies

•   periodic copies of
    important information

•   for companies, it is
    recommended that copies
    be stored in a different
    location




                     4626. Introd to Computer Science
RAID

                            •      Redundant Array of
                                   Independent Disks

                            •      multiple disks as
                                   one logical unit

                            •      mirroring: data
                                   redundancy




4626. Introd to Computer Science

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013Vidushi Singh
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
Network forensics
Network forensicsNetwork forensics
Network forensicsArthyR3
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityMohammed Adam
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Preventionfmi_igf
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hackingSunny Sundeep
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsSeungjoo Kim
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentInfocyte
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityGlenn McKnight
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Gian Gentile
 

Was ist angesagt? (20)

Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses Cybersecurity: Public Sector Threats and Responses
Cybersecurity: Public Sector Threats and Responses
 
National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber Security: Threat and Prevention
Cyber Security: Threat and PreventionCyber Security: Threat and Prevention
Cyber Security: Threat and Prevention
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Threat landscape 4.0
Threat landscape 4.0Threat landscape 4.0
Threat landscape 4.0
 
Presentation on ethical hacking
Presentation on ethical hackingPresentation on ethical hacking
Presentation on ethical hacking
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
The New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise AssessmentThe New Pentest? Rise of the Compromise Assessment
The New Pentest? Rise of the Compromise Assessment
 
Introduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-securityIntroduction to Internet Governance and Cyber-security
Introduction to Internet Governance and Cyber-security
 
Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)Cyber Security Awareness (Reduce Personal & Business Risk)
Cyber Security Awareness (Reduce Personal & Business Risk)
 

Andere mochten auch

Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentationsameerraaj
 
Introduction to Microsoft Office
Introduction to Microsoft OfficeIntroduction to Microsoft Office
Introduction to Microsoft OfficeCik Na Shohaili
 
Database management system
Database management systemDatabase management system
Database management systemRizwanHafeez
 
A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesClaudia Melo
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain ManagementAnupam Basu
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Riskamiable_indian
 
Information risk management
Information risk managementInformation risk management
Information risk managementAkash Saraswat
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system managementPragnya Sahoo
 

Andere mochten auch (20)

cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
Introduction to database
Introduction to databaseIntroduction to database
Introduction to database
 
Database management system presentation
Database management system presentationDatabase management system presentation
Database management system presentation
 
Data Base Management System
Data Base Management SystemData Base Management System
Data Base Management System
 
Introduction to Microsoft Office
Introduction to Microsoft OfficeIntroduction to Microsoft Office
Introduction to Microsoft Office
 
Database management system
Database management systemDatabase management system
Database management system
 
Dbms slides
Dbms slidesDbms slides
Dbms slides
 
A Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development TechnologiesA Method for Evaluating End-User Development Technologies
A Method for Evaluating End-User Development Technologies
 
Supply Chain Management
Supply Chain ManagementSupply Chain Management
Supply Chain Management
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Outsourcing
OutsourcingOutsourcing
Outsourcing
 
Make or Buy
Make or BuyMake or Buy
Make or Buy
 
Information risk management
Information risk managementInformation risk management
Information risk management
 
Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01Information systems risk assessment frame workisraf 130215042410-phpapp01
Information systems risk assessment frame workisraf 130215042410-phpapp01
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
Make or buy diagram
Make or buy diagramMake or buy diagram
Make or buy diagram
 
Outsource
OutsourceOutsource
Outsource
 
Strategic information system management
Strategic information system managementStrategic information system management
Strategic information system management
 

Ähnlich wie Computer Security and Risks

unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfSagarBurnah
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfSagarBurnah
 
Hardware basics: peripherals
Hardware basics: peripheralsHardware basics: peripherals
Hardware basics: peripheralsMiguel Rebollo
 
Anaconda Brochure. Anaconda Brochure.pdf
Anaconda Brochure. Anaconda Brochure.pdfAnaconda Brochure. Anaconda Brochure.pdf
Anaconda Brochure. Anaconda Brochure.pdfteguhpratama12tkj1
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey OWASP-Qatar Chapter
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gearshawn_merdinger
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 NetworksChris Sistrunk
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measureshazirma
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsJohn Rhoton
 
What Vulnerabilities? How and why to secure your ML/AI Solutions
What Vulnerabilities? How and why to secure your ML/AI SolutionsWhat Vulnerabilities? How and why to secure your ML/AI Solutions
What Vulnerabilities? How and why to secure your ML/AI SolutionsKevin Goldsmith
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009infracritical
 
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...PROIDEA
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsAleksandr Timorin
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikSergey Gordeychik
 

Ähnlich wie Computer Security and Risks (17)

unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdf
 
unit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdfunit09-1212598883113378-9.pdf
unit09-1212598883113378-9.pdf
 
Software Basics
Software BasicsSoftware Basics
Software Basics
 
Hardware basics: peripherals
Hardware basics: peripheralsHardware basics: peripherals
Hardware basics: peripherals
 
Anaconda Brochure. Anaconda Brochure.pdf
Anaconda Brochure. Anaconda Brochure.pdfAnaconda Brochure. Anaconda Brochure.pdf
Anaconda Brochure. Anaconda Brochure.pdf
 
Computer Currents
Computer CurrentsComputer Currents
Computer Currents
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
Lesson 1 - Technical Controls
Lesson 1 - Technical ControlsLesson 1 - Technical Controls
Lesson 1 - Technical Controls
 
CSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage GearCSI - Poor Mans Guide To Espionage Gear
CSI - Poor Mans Guide To Espionage Gear
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 Networks
 
3.2.2 security measures
3.2.2 security measures3.2.2 security measures
3.2.2 security measures
 
Unauthorized Wireless Network Connections
Unauthorized Wireless Network ConnectionsUnauthorized Wireless Network Connections
Unauthorized Wireless Network Connections
 
What Vulnerabilities? How and why to secure your ML/AI Solutions
What Vulnerabilities? How and why to secure your ML/AI SolutionsWhat Vulnerabilities? How and why to secure your ML/AI Solutions
What Vulnerabilities? How and why to secure your ML/AI Solutions
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
 
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
CONFidence 2014: Alexander Timorin: SCADA deep inside: protocols and security...
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
AI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey GordeychikAI for security or security for AI - Sergey Gordeychik
AI for security or security for AI - Sergey Gordeychik
 

Mehr von Miguel Rebollo

GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N... GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...Miguel Rebollo
 
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 Co-Learning: Consensus-based Learning for Multi-Agent Systems Co-Learning: Consensus-based Learning for Multi-Agent Systems
Co-Learning: Consensus-based Learning for Multi-Agent SystemsMiguel Rebollo
 
Análisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldAnálisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldMiguel Rebollo
 
Y sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasY sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasMiguel Rebollo
 
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónExámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónMiguel Rebollo
 
Gamification. Key Concepts
Gamification. Key ConceptsGamification. Key Concepts
Gamification. Key ConceptsMiguel Rebollo
 
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsUsing Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsMiguel Rebollo
 
Distributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsDistributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsMiguel Rebollo
 
Detección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesDetección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesMiguel Rebollo
 
La hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalLa hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalMiguel Rebollo
 
Procesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redProcesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redMiguel Rebollo
 
desarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediadesarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediaMiguel Rebollo
 
Distributed Group Analytical Hierarchical Process by Consensus
 Distributed Group Analytical Hierarchical Process by Consensus Distributed Group Analytical Hierarchical Process by Consensus
Distributed Group Analytical Hierarchical Process by ConsensusMiguel Rebollo
 
Análisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesAnálisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesMiguel Rebollo
 
Análisis de datos en redes sociales
Análisis de datos en redes socialesAnálisis de datos en redes sociales
Análisis de datos en redes socialesMiguel Rebollo
 
The multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFThe multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFMiguel Rebollo
 
Narrativa transmedia en el aula
Narrativa transmedia en el aulaNarrativa transmedia en el aula
Narrativa transmedia en el aulaMiguel Rebollo
 
Using geo-tagged sentiment to better understand social interactions
 Using geo-tagged sentiment to better understand social interactions Using geo-tagged sentiment to better understand social interactions
Using geo-tagged sentiment to better understand social interactionsMiguel Rebollo
 
Transport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsTransport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsMiguel Rebollo
 
Análisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMAnálisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMMiguel Rebollo
 

Mehr von Miguel Rebollo (20)

GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N... GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
GTG-CoL: A Decentralized Federated Learning Based on Consensus for Dynamic N...
 
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 Co-Learning: Consensus-based Learning for Multi-Agent Systems Co-Learning: Consensus-based Learning for Multi-Agent Systems
Co-Learning: Consensus-based Learning for Multi-Agent Systems
 
Análisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de ClarkesworldAnálisis de la red de autores de ciencia ficción de Clarkesworld
Análisis de la red de autores de ciencia ficción de Clarkesworld
 
Y sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejasY sin embargo... se mueve. Dinámica de las redes complejas
Y sin embargo... se mueve. Dinámica de las redes complejas
 
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluaciónExámenes en grupo y pruebas de corrección como alternativas a la evaluación
Exámenes en grupo y pruebas de corrección como alternativas a la evaluación
 
Gamification. Key Concepts
Gamification. Key ConceptsGamification. Key Concepts
Gamification. Key Concepts
 
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing AppsUsing Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
Using Distributed Risk Maps by Consensus as a Complement to Contact Tracing Apps
 
Distributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for AgreementsDistributed Ledger and Robust Consensus for Agreements
Distributed Ledger and Robust Consensus for Agreements
 
Detección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redesDetección de nodos tramposos en procesos de consenso en redes
Detección de nodos tramposos en procesos de consenso en redes
 
La hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacionalLa hora del código: ApS para fomentar el pensamiento computacional
La hora del código: ApS para fomentar el pensamiento computacional
 
Procesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en redProcesos de enseñanza-aprendizaje en red
Procesos de enseñanza-aprendizaje en red
 
desarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmediadesarrollo de competencias a través de narrativas transmedia
desarrollo de competencias a través de narrativas transmedia
 
Distributed Group Analytical Hierarchical Process by Consensus
 Distributed Group Analytical Hierarchical Process by Consensus Distributed Group Analytical Hierarchical Process by Consensus
Distributed Group Analytical Hierarchical Process by Consensus
 
Análisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes socialesAnálisis de ciudades a través de su actividad en redes sociales
Análisis de ciudades a través de su actividad en redes sociales
 
Análisis de datos en redes sociales
Análisis de datos en redes socialesAnálisis de datos en redes sociales
Análisis de datos en redes sociales
 
The multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURFThe multigent Layer for CALMeD SURF
The multigent Layer for CALMeD SURF
 
Narrativa transmedia en el aula
Narrativa transmedia en el aulaNarrativa transmedia en el aula
Narrativa transmedia en el aula
 
Using geo-tagged sentiment to better understand social interactions
 Using geo-tagged sentiment to better understand social interactions Using geo-tagged sentiment to better understand social interactions
Using geo-tagged sentiment to better understand social interactions
 
Transport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open FleetsTransport Network Analysis for Smart Open Fleets
Transport Network Analysis for Smart Open Fleets
 
Análisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMMAnálisis de sentimientos en Twitter mediante HMM
Análisis de sentimientos en Twitter mediante HMM
 

Kürzlich hochgeladen

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Kürzlich hochgeladen (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

Computer Security and Risks

  • 1. Computer Security and Risks Introduction to Computer Science 2007-2008
  • 2. Aims • Describing several types of computer crime • Describing the major security issues that computer users have to face • Describing how it affects to personal privacy • Explaining the relationship between security and computer reliability 4626. Introd to Computer Science
  • 3. Computer Crime Crime accomplished through computer tech. • widely extended: easiness of computer usage • most of them committed by company insiders • high cost: foresight + repair Current threats • spoofing (or phishing): identity theft 4626. Introd to Computer Science
  • 4. Software Piracy • Illegal duplication of copyrighted software • Reasons: • price of software • means to create copies How many pirate programs do you have? 4626. Introd to Computer Science
  • 5. Intellectual Property • Privileges granted over intangible goods with financial value • They are defined over • copyright Authorship rights • commercial secret • patents Industrial property • trademarks • Software is covered by copyright 4626. Introd to Computer Science
  • 6. Computer Sabotage Use of malware to spoil hardware & software • Trojan horses • Viruses • Worms 4626. Introd to Computer Science
  • 7. Trojans • hidden inside programs that perform useful tasks • logic bombs: programmed to ‘attack’ in response to a particular event (e.g. time bombs) • solutions • software from reliable sources (avoids) • anti-trojan (detects) • firewall -output- (blocks) 4626. Introd to Computer Science
  • 8. Viruses • as biological ones • invade programs and use them to reproduce themselves • operative system specific • solution: • use carefully removable media (avoids) • antivirus (detects and cleans) 4626. Introd to Computer Science
  • 9. Worms • as viruses: use computers to reproduce themselves • autonomous spread through computer networks • solution: • email from confident sources (avoids) • firewall -input- (blocks) • security patches 4626. Introd to Computer Science
  • 10. Hacking • Discovering and exploiting computer system failures • Reasons: • curiosity • intellectual challenge • Cracking = criminal hacking 4626. Introd to Computer Science
  • 11. Reducing Risks Information systems have to be protected... • to work properly • to guarantee access to information only to granted users • to guarantee privacy 4626. Introd to Computer Science
  • 12. Physical Access Restrictions Only authorised staff have access to the equipment Security checks based on… • something you have (card) • something you know (password) • something you do (signature) • something about you (scans) 4626. Introd to Computer Science
  • 13. How can we protect sensitive information?
  • 15. UPS • uninterruptible power supply • protects data during power failures (minutes) • give users time to switch off the system
  • 16. Surge protectors • shield computers from power spikes • protect the computer from physical damage 4626. Introd to Computer Science
  • 18. Passwords The most common tool, but carefully chosen • which kind of password do you use? • how frequently do you change your passwords? • how many passwords do you use? Never use a word or your b-day!! 4626. Introd to Computer Science
  • 19. Firewalls • guard against unauthorised access • blocks accessing ports for input and output • by hardware or software
  • 20. Encryption • keys to code messages and documents • symmetric: common key • asymmetric: public / private keys 4626. Introd to Computer Science
  • 21. Audit Control SW • Records computer transactions • Auditors can trace and identify suspicious activities 4626. Introd to Computer Science
  • 23. Backup Copies • periodic copies of important information • for companies, it is recommended that copies be stored in a different location 4626. Introd to Computer Science
  • 24. RAID • Redundant Array of Independent Disks • multiple disks as one logical unit • mirroring: data redundancy 4626. Introd to Computer Science