Computer Security & Risks. Chapter 11 Part 1. userso o Händlingg inci&nts organization scatF rrmaganent information incident attack wee.
Outline. Overview Computer Forensics Computer Theft Identity theft Malwares Virus/Worms DDoS Hacking.
Computer Security. The protection of computing systems and data from unauthorized access, change or destruction..
Investigation of a variety of computer crimes.. Use special software to store and reference clues in complex cases.
Cybercrime. Any crime using computers or networks.
Cyberstalking. Computer Crime. 6. To repeatedly harm or harass people in a deliberate manner on the internet.
Intellectual Property Theft. Software Piracy. Cybercrime.
What is stolen?. Money. Cybercrime. Goods. 8. Information.
Theft of computer itself. Laptops and Smartphones are often stolen.
Spoofing. Trick that target to extract secret information.
Phishing (fishing for sensitive info.). Is the act of attempting to acquire sensitive information by masquerading as a trustworthy entity in an electronic communication.
URL : fuizuebooks /update/index4.php. 12. P-•cx n— facebook onnect with friends and the orld around you on Facebook. See photos and updates Find more Sign Up It's free and always will First Name Emad Re-enter Email New Password.
Frorn: Microsoft office365 Team [mailto:cvh11241@lausd.net] Sent: Monday, September 25, 2017 1:39 PM To: Subject: Your Mailbox Will Your Account O Office 365 Detected spam messages from your <EMAIL APPEARED HERE> account will be blocked. If you do not verify your mailbox, we will be force to block your account. If you want to continue using your email account please Verify Now Microsoft Security Assistant Microsoft office365 Team! 02017 All Rights Reserved.
Extract personal information to commit a crime in another person identity.
Use separate credit card for online use. Use secure websites (https://).
Malicious Software. Malware used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Are attached to a file/program and spread when files are exchanged via email attachments or flash drives.
They are independent programs. Worms. Capable of reproducing themselves.
Disguise themselves as useful programs or apps, but has hidden destructive program (viruses).
Gets installed and collects information without user’s knowledge.
Malware that locks your computer and encrypts data in your hard drive..
Hacking and Electronic Trespassing. Hackers People who break into computer systems or networks unlawfully Hackers can control computers or steal personal information to commit identity theft.
Black-Hat Hacker. Criminals develop new techniques to penetrate systems to gain illegal access or destroy information.
Zombie Computers. Hacking and Electronic Trespassing.
Botnets. Hacking and Electronic Trespassing. 25. Group of software programs called bots.
Hacking and Electronic Trespassing. DDoS : Distributed Denial of Service bombards servers and web sites with traffic that shuts them down using thousands of zombie computers (botnets) Authorized users cannot use their computer.