Internet Security - PowerPoint PPT Presentation

1 / 19
About This Presentation
Title:

Internet Security

Description:

Hotmail 4.7 million. Yahoo 4.2 million. MSN 2.1 million. Cisco 1.9 million. G-mail 1.5 million ... A Short History of Hacking. ... – PowerPoint PPT presentation

Number of Views:85
Avg rating:3.0/5.0
Slides: 20
Provided by: students7
Category:

less

Transcript and Presenter's Notes

Title: Internet Security


1
Internet Security
  • By Kyle Lutz, Amber Kariker THE BEST, Greg
    Krutick, A.J. Nezamabadi, Sharon Kimemia

2
Presentation Over
  • Internet Security Threats
  • Current Issues
  • Internet Statistics, did you know?
  • Industry Response
  • Available Tools
  • Hackers History, who they are, techniques
  • Hackers Top tools, most likely to be hacked,
    successful hackers
  • Intrusion Prevention
  • Intrusion Detection
  • Conclusion

3
Internet Security Threats
  • Identity theft
  • Phishing
  • Viruses
  • Spam

4
Current Issues
  • Case Study -TJX Computer breach
  • Costs- 12 million (1st quarter)
  • Legal issues
  • Credit Card Fraud
  • Timeline

5
Internet Statistics, did you know?
  • Top e-mail sites in 2006 for spam
    include.(according to Commtouch).
  • Hotmail 4.7 million
  • Yahoo 4.2 million
  • MSN 2.1 million
  • Cisco 1.9 million
  • G-mail 1.5 million

6
Internet Statistics, did you know?
Both viruses and spam have continued to increase
over the years
7
Industry Response
  • Software analyst meet to discuss the latest
    technology
  • Demand for security professionals
  • Many companies have spent money on security and
    repairs
  • Microsoft estimated two billion dollars in 2005
  • www.Getsafeonline.com
  • http//www.homeoffice.gov.uk/

8
Available Tools
  • Anti-Virus- Norton 2007Best known name in
    anti-virus and internet security
  • Anti-Spy Ware
  • Firewall Protection
  • Anti-spam

9
History of Hackers
  • In December of 1947, the transistor was invented.
  • Captain Crunch
  • Steve Jobs
  • Kevin Mitnick
  • ATT
  • The Worm- Robert Tappan Morris
  • Kevin Poulsen (a.k.a. Dark Dante)
  • Tsumomu Shimomura
  • David Smith
  • Jon Johansen (a.k.a. DVD Jon)

10
Who are Hackers?
  • Definition
  • The word Hacker
  • Computer programming must be a hobby, something
    done for fun, not out of a sense of duty or for
    the money.
  • A person who practices hacking is called a
    hacker.
  • Hacking can be just to find out how it works
    without criminal intent.
  • Hacking can be simply to crack a code
  • A hacker can be breaking into a computer that's
    yours, often not wanted, and now prohibited by
    law.

11
Different Hacker Techniques
  • Information Sharing
  • Information Disseminating
  • The belief that system-cracking for fun and
    exploration is ethically OK as long as the
    cracker commits no theft, vandalism, or breach of
    confidentiality.
  • Telecommunications
  • Studying
  • Redistributing money and credit information
    maintained in credit bureau computers.
  • Obtaining money and property from companies by
    altering the computerized information used by the
    companies.

12
Top Tools Hackers Use
  • Spam
  • Downloads
  • Pop-ups
  • Active X

13
Most Likely to be Hacked
  • Small businesses with 10 or fewer employees.
  • Most vulnerable
  • Less resources
  • Ignore or unaware of risks
  • Large businesses with 100 or more employees
  • Higher profile
  • Larger network

14
Successful Hackers
  • Eric McCarty hacks into USC database
  • Australian hacker attacks sewage control
    computers

15
Intrusion Prevention
  • To prevent virus infection
  • Disable Active X controls on IE
  • Run anti-virus software with updates
  • Do not open suspicous e-mails
  • Malware/Spyware infection
  • Run anti-spyware software
  • Avoid using P2P/file-sharing software
  • Intrusions
  • Run a firewall
  • Be cautious towards ActiveX and Java Applet
    prompts

16
Intrusion Detection
  • Intrusion detection systems are the next
    generation of security beyond firewall protection
  • Host Based IDS For servers that contain
    sensitive information.
  • Network Based IDS Monitors certain network
    segments.
  • Gives administrators a more proactive approach to
    stopping a potential threat.

17
Introduction to Detection
18
Conclusion
  • User awareness is key to a secure
    computer/network
  • Do not open suspicious files/emails
  • Verify ActiveX/Java prompts
  • Avoid using P2P programs
  • Avoid downloading freeware
  • If attacked, disconnect the network. Do not turn
    off the computer

19
Resources
  • Alex (2006). A Short History of Hacking.
    Retrieved May 23, 2007, from Neatorama Web site
    http//www.neatorama.com/2006/08/28/a-short-histor
    y-of-hacking
  • Breeding, M. (2007, January). Spam Wars The
    Battle of the Formbots. Computers in Libraries,
    27(1), 32-34. Retrieved May 22, 2007, from
    Computer Source database.
  • Damman H. Whose problem is it?. Process Control
    Engineering (PACE) serial online. November
    200558(10)31-35. Available from Business
    Source Premier, Ipswich, MA. Accessed May 24,
    2007.
  • Ending the age of the password. (2005, February
    22). Computer Weekly, Retrieved May 23, 2007,
    from Business Source Premier database.
  • Harvery, Brian (1985). What is a Hacker?.
    Retrieved May 23, 2007, from What is a Hacker?
    Web site tml.
  • (2006). Hacking and Hackers An Introduction.
    Retrieved May 23, 2007, from Hacking and Hackers
    Web site http//www.thocp.net/reference/hacking/h
    acking.htm
  • Lemos, R. TJX breach larger than previously
    thought. Retrieved from com/brief/441.
  • Pasquariello A. THREAT REDUCTION. Fast Company
    serial online. May 200711522-23. Available
    from Computer Source, Ipswich, MA. Accessed May
    24, 2007.
  • Spanbauer, S. (2007, March). Thwart the Three
    Biggest Internet Threats of 2007. PC World,
    25(3), 120-122. Retrieved May 23, 2007, from
    Academic Search Premier database.
  • Trigaux, Robert (2000). A History of Hacking.
    Retrieved May 23, 2007, from St. Petersburg Times
    Online Web site http//www.sptimes.com/Hackers/hi
    story.hacking.html
Write a Comment
User Comments (0)
About PowerShow.com