Académique Documents
Professionnel Documents
Culture Documents
McGraw-Hill Technology
14A-2
14A-3
14A-4
Threats To Users
Identity Theft
Occurs when someone Impersonates you
by using your private information.
Thief can become the victim
14A-5
Threats To Users
Loss of privacy
Personal information is stored electronically
Purchases are stored in a database
Data is sold to other companies
14A-6
Threats to Users
Cookies
A cookies is a small text file that a web
server asks your browser to place on your
computer.
The cookie might list the last time you
visited the site, which pages you
downloaded, and how long you were at the
site before leaving.
14A-7
Threats to Users
Spyware
When you install and register a program, it
may ask you to fill out a form. The program
then sends the information to the
developer, who stores it in a database.
14A-8
Threats to Users
Web bugs
A web bug is a small GIF-format image file
that can be embedded in a web page or an
MTML-format e-mail message.
A web bug can be as small as a single pixel
in size and can easily be hidden any where
in an MTML document
Like cookies bugs creator track many of
your online activities.
14A-9
Threats to Users
Spam
Spam is internet junk mail or unsolicited
commercial email
Almost all spam is commercial advertising
Networks and PCs need a spam blocker
Stop spam before reaching the inbox
Threats to Hardware
Affect the operation or reliability
Power-related threats
Power fluctuations
Power spikes or browns out
14A-11
Threats to Hardware
Theft and vandalism
Thieves steal the entire computer
Accidental or intentional damage
Countermeasures
14A-12
Threats to Hardware
Natural disasters
Disasters differ by location
Typically result in total loss
Earthquakes, hurricanes
Disaster planning
14A-13
Threats to Data
Viruses
Software that distributes and installs itself
Viruses are pieces of a computer program
that attach themselves to host programs.
Countermeasures
Anti-virus software
Popup blockers
Do not open unknown email
14A-14
Threats to Data
Trojan horses
Program that poses as beneficial software
User willingly installs the software
Countermeasures
Anti-virus software
Spyware blocker
14A-15
Threats to Data
Cybercrime
Using a computer in an illegal act
Fraud and theft are common acts
14A-16
Threats to Data
Internet fraud
Most common cybercrime
Fraudulent website
Have names similar to legitimate sites
14A-17
Threats to Data
Hacking
Using a computer to enter another network
Cost users $1.3 trillion in 2003
Hackers motivation
Recreational hacking
Financial hackers
Grudge hacking
Hacking methods
14A-18
Sniffing
Social engineering
Spoofing
Threats to Data
Distributed denial of service attack
Attempt to stop a public server
Hackers plant the code on computers
Code is simultaneously launched
Too many requests stops the server
14A-19
Threats to Data
Cyber terrorism
Attacks made at a nations information
Targets include power plants
Threat first realized in 1996
Organizations combat cyber terrorism
Computer Emergency Response Team (CERT)
Department of Homeland Security
14A-20
Chapter 13A
End of Chapter
McGraw-Hill Technology