Académique Documents
Professionnel Documents
Culture Documents
• Corporate networks
Over half largest corporations were invaded
Competitors?
• Government networks
Dept of Defense attacked more than 200,000
times per year
Computer attack abilities of other nations?
• Web sites
How Can Systems be Easily Compromised?
• Social engineering
Con artist – persuade others to give away their
passwords over the phone
• Electronic pickpockets
Use computers to transfer or change assets to
their advantage
Frequently Reported Crimes (1/2)
• Credit-card fraud
Numbers captured and used fraudulently
• Data communications fraud
Piggyback on someone else’s network
Office network for personal purposes
Computer-directed diversion of funds
• Unauthorized access to computer files
Accessing confidential employee records
Theft of trade secrets and product pricing
Frequently Reported Crimes (2/2)
• Unlawful copying of copyrighted software
Casual sharing of copyrighted software
• Data diddling
Changing data before or as it enters the system
• Denial of service attack (DOS)
Hackers bombard a site with more request for
service than it can possible handle
Prevents legitimate users from accessing the site
Appearance of requests coming from many
different sites simultaneously
Possible Solutions
• Discovery
Difficult
85% of computer crimes are never reported
• Prosecution
Legal representatives lack technical knowledge to
understand the crime
Discovery and Prosecution
• Computer Forensics
Uncovering computer-stored information suitable
for legal use
Computer Security
• System of safeguards designed to protect
a computer system and data from
deliberate or accidental damage
Firewall
Dedicated computer
that governs interaction
between internal
network and the
Internet
Encryption
Data Encryption
Standard (DES)
Personal Computer Security
• Physical security with locks and cables
• Surge protector
• Uninterruptible power supply (UPS)
• Backup files regularly and systematically
Disaster Recovery
• Hardware loss
Can be replaced
Temporarily diminished processing ability
• Software loss
Industry standard – make backups of program files
Disaster Recovery
• Data loss
Reassemble records
Customer information
Accounting data
Design information
Major costs and time
Computer Recovery
• Restoring computer processing operations and
data files if operations are halted or files are
damaged by major destruction
How to Plan a Recovery?
• Priorities for programs
• Plans for notifying employees
• List of needed equipment and where it is
located
• Alternative computing facilities
• Procedures for handling input and output data
• Emergency Drills
Backup
Early technique….
How does it work..
Overcoming Early Technique
• Viruses attach themselves to the unused portion
of program hence no changing of length
• Antivirus developers designed software that
examined the bytes in unaffected program and
calculates a checksum (a no. that is calculated by
combining the binary values of all bytes in a file)
and record it. It is compared later with another
checksum calculated when the program is ran
Antivirus
Modern Technique
• Viruses, Trojan horses and worms are no
longer limited to program files
• The use of virus signature to search for viruses
• Virus signature is a section of a virus program,
such as a unique series of instructions that can
be used to identify a known virus much as
fingerprint identifies individual.
Privacy
• How do they get your data?