introduction to ite chapter 9 computer security. why study security? this is a huge area for...

19
Introduction to ITE Chapter 9 Computer Security

Upload: julianna-newton

Post on 12-Jan-2016

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Introduction to ITE Chapter 9

Introduction to ITE Chapter 9

Computer SecurityComputer Security

Page 2: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Why Study Security?Why Study Security?

This is a huge area for computer technicians.

Security isn’t just anti-virus.

Everyone who uses a computer is affected.

This is a huge area for computer technicians.

Security isn’t just anti-virus.

Everyone who uses a computer is affected.

Page 3: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Computer SecurityComputer Security

Threats can be internal or external.

They involve unauthorized access as well as malicious attacks on hardware or systems.

Threats can be internal or external.

They involve unauthorized access as well as malicious attacks on hardware or systems.

Page 4: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of ThreatsSome Types of Threats

Viruses Are intentionally written to

disrupt computers. Come into the computer

via email, IM’s, transferred files and even web pages.

Once on a computer viruses reproduce and attack other files.

Viruses Are intentionally written to

disrupt computers. Come into the computer

via email, IM’s, transferred files and even web pages.

Once on a computer viruses reproduce and attack other files.

Page 5: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of ThreatsSome Types of Threats

Worms Worms are similar to

viruses, except they need not attach themselves to files in order to spread.

Worms do not destroy files, but instead consume bandwidth. They slow network operations.

Worms Worms are similar to

viruses, except they need not attach themselves to files in order to spread.

Worms do not destroy files, but instead consume bandwidth. They slow network operations.

Page 6: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of ThreatsSome Types of Threats

Trojans Trojans enter the system

as part of software that appears to serve a legitimate purpose.

Trojans can be set up to damage files or send data to an outside computer.

Trojans Trojans enter the system

as part of software that appears to serve a legitimate purpose.

Trojans can be set up to damage files or send data to an outside computer.

Page 7: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of ThreatsSome Types of Threats

Adware Displays advertising on

your computer. You don’t even have to be

on-line for the ads to pop-up.

Phishing Phishing tries to persuade

people to provide personal information like social security or bank account numbers.

Adware Displays advertising on

your computer. You don’t even have to be

on-line for the ads to pop-up.

Phishing Phishing tries to persuade

people to provide personal information like social security or bank account numbers.

Page 8: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of ThreatsSome Types of Threats

Spyware Spyware reports your on-

line activity to an outside entity.

It may also report personal information it finds on your computer.

Spyware Spyware reports your on-

line activity to an outside entity.

It may also report personal information it finds on your computer.

Page 9: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Some Types of Threats Some Types of Threats

DoS Denial of Service attacks.

Data is sent to a network computer in such large numbers that the machine is effectively shut down.

DDoSDistributed Denial of Service

attacks. Use additional computers

called “Zombies” to assist in the attack.

DoS Denial of Service attacks.

Data is sent to a network computer in such large numbers that the machine is effectively shut down.

DDoSDistributed Denial of Service

attacks. Use additional computers

called “Zombies” to assist in the attack.

Page 10: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

More DoS typesMore DoS types

Ping of death Email bomb

So many emails sent at once that the server becomes overwhelmed.

Ping of death Email bomb

So many emails sent at once that the server becomes overwhelmed.

Page 11: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Other ProblemsOther Problems

Spam Junk emails

Spam filters can remove many of these.

Social Engineering Depend upon the stupidity of

the user.

SYN attacks Opens up random ports and

ties up hardware

Spam Junk emails

Spam filters can remove many of these.

Social Engineering Depend upon the stupidity of

the user.

SYN attacks Opens up random ports and

ties up hardware

Page 12: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Other ProblemsOther Problems

Man-in-the-Middle Intercepts communications

Replay Captures keystrokes and sends

the data to outside sources.

DNS Poisoning DNS Servers are altered to

redirect traffic to counterfeit sites.

Man-in-the-Middle Intercepts communications

Replay Captures keystrokes and sends

the data to outside sources.

DNS Poisoning DNS Servers are altered to

redirect traffic to counterfeit sites.

Page 13: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Destroying Sensitive Data Destroying Sensitive Data

Erasing data normally only erases the first letter of the first work of the file name.

There is software that can completely erase a drive or the drive can be physically destroyed.

Erasing data normally only erases the first letter of the first work of the file name.

There is software that can completely erase a drive or the drive can be physically destroyed.

Page 14: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Security LevelsSecurity Levels

Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked

anytime they are on an unsecured network

Security is an issue on many levels Physical (Hardware) File Access Data protection Media (Wired or Wireless) Machines can be hacked

anytime they are on an unsecured network

Page 15: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Physical SecurityPhysical Security

Laptops and hard drives can be stolen for their data.

Sensors similar to those used in stores can be used to track equipment.

Laptops and hard drives can be stolen for their data.

Sensors similar to those used in stores can be used to track equipment.

Page 16: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Secured NetworksSecured Networks

Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.

Passwords need to be secure. “Nothing in the dictionary” is a common rule.

Passwords, Mac Address Filtering and Encryption can keep unauthorized users off a network.

Passwords need to be secure. “Nothing in the dictionary” is a common rule.

Page 17: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

Wireless NetworksWireless Networks

Wireless Networks have their own issues. Wireless networks can be

secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.

Wireless Networks have their own issues. Wireless networks can be

secured through WEP encryption, Not advertising the SSID, Mac Filtering and Password protecting the router.

Page 18: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

OS UpdatesOS Updates

New vulnerabilities are constantly being discovered.

OS Updates often patch these security holes.

Anti-spy and anti-virus programs need to be updated often.

New vulnerabilities are constantly being discovered.

OS Updates often patch these security holes.

Anti-spy and anti-virus programs need to be updated often.

Page 19: Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus

The troubleshooting process

The troubleshooting process

Section 9.5 outlines the troubleshooting process.

Most of these are simple common-sense approaches.

Please read through them on your own, it’s only a few screens.

Section 9.5 outlines the troubleshooting process.

Most of these are simple common-sense approaches.

Please read through them on your own, it’s only a few screens.