SlideShare uma empresa Scribd logo
1 de 17
COOKIES
•   A message passed from a web server to a web browser that is sent
    back to the server each time the browser requests a page from that
    server

•   Normally used for authentication purposes

•   May contain sensitive/private info, thus posing security risk
BOTNETS AND CYBERATTACK SUPPLY
            CHAIN
•   “Destructive software robots working together on a collection of
    zombie computers”!!

•   Ouch, straight out of a SiFi horror story but the threat is very real.
HIGHLY SPECIALIZED
             IDENTITY THEFT
•A
 phishing attack on the internet can be a professional
multi-step task involving:
 •   A programmer (writes attack templates)

 •   A phisher (designs the attack)

 •   A cracker (provides hosting space for attack)

 •   A Bot herder (access to botnet zombie computers)
INTERNET HOAXES

•   A false message circulated online about new viruses

•   May cause your inbox to get flooded with junk-mail

•   Hoaxbusters warn about know hoaxes
CYBERSQUATTING
•   The practice of registering a domain name and trying to sell it to
    those who are most likely to want their trademark back

    •   Ex: eminemmobile.com sued by Eminem for use of his name to
        make money

•   This crime may lead to $100,000 fine and forfeiture of disputed
    name for offenders.
CYBER HARRASSMENT, STALKING,
               AND BULLYING
•   Victims endure

    •   Distress from obscene, vulgar, or threatening content

    •   Repeated unwanted contact from aggressor

    •   Posting of personal information on chat rooms and web sites

•   Social networks provide ways to report predators as a defense
SOFTWARE PRIACY

•   Illegal distribution of bootleg copies to others (for free or to sell)

•   Software is intellectual property and offenders are subject to patent
    and copyright laws

•   Solving piracy problem is still a major issue
GLOBAL PROBLEM

•   Piracy is an international issue

•   The unwillingness of governments and individuals to recognize
    software copyrights is a huge roadblock to solving the issue

•   Billions of dollars lost each year
CYBERWAR
•   This is one country’s military attempt to destroy the information and
    communication systems of another

•   Most advanced nations are most vulnerable

•   Attacks shut down country’s economic system, transportation and
    medical capabilities, etc.
FUNCTIONS OF CYBERWAR

•   Disabling enemy’s smart weapons and controls systems

•   Distributing cyberpropaganda

•   Stealing or modifying information (espionage)
A NEW COLD WAR
•   Nations secretly testing networks to gain advantage or inflict damage
    on potential enemy nations ushers in a new type of cold war
CYBERTERRORISM
•   Individuals or organized groups using technology to intimidate or
    harm governments and/or civilians

•   Causes virtual physical damage

•   Nuclear power plants, dams, power grids, etc., are all affected
DISADVANTAGES FOR THE CYBER
               ATTACKER
•   May not achieve as much destruction as physical weapons

•   Requires continuous updating of systems as older methods quickly
    become outdated

•   Less drama and emotional appeal as traditional attacks
GLOBALIZATION OF
                 TERRORISM
•   Cyberwar and Cyberterrorism will only increase as dependence on
    technology increases

•   Controlling these attacks is a great challenge for the future
INFORMATION SYSTEMS
              SECURITY
•   All systems connected to networks are vulnerable to security
    violations

•   Taking precaution is necessary and a variety of technologies have
    been created for this purpose
SAFEGUARDING IS
                   RESOURCES
•   Systems security auditing identifies most vulnerable systems in an
    organization

•   Followed by designing and implementing security measures
RISK ANALYSIS
•    Determines if a company should take one of three courses of
     action:

    1. Risk Reduction (actively invest in protect systems)
    2. Risk Acceptance (do nothing, just absorb any damages)

    3. Risk Transference (buy insurance or outsource risky
        functions)

Mais conteúdo relacionado

Mais procurados

Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagnerDevonWagner
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivismBilal Ali
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Virusesmkgspsu
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagnerDevonWagner
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 

Mais procurados (19)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberware
CyberwareCyberware
Cyberware
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 

Destaque

Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1misecho
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinamisecho
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentationmisecho
 

Destaque (7)

Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Echo p.410 422 ch 10, irina
Echo p.410 422 ch 10, irinaEcho p.410 422 ch 10, irina
Echo p.410 422 ch 10, irina
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Mis
MisMis
Mis
 
Mis 2101 Questions
Mis 2101 QuestionsMis 2101 Questions
Mis 2101 Questions
 

Semelhante a Chapter 10, part 2

Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in educationsrinivasgosula
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecuritySultanaShaikh7
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Mikko Hypponen
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber lawhimanshumunjal
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessArjith K Raj
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to PreventShamiul Lajib
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuityAlisha Korpal
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 

Semelhante a Chapter 10, part 2 (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Hacking
HackingHacking
Hacking
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

Chapter 10, part 2

  • 1. COOKIES • A message passed from a web server to a web browser that is sent back to the server each time the browser requests a page from that server • Normally used for authentication purposes • May contain sensitive/private info, thus posing security risk
  • 2. BOTNETS AND CYBERATTACK SUPPLY CHAIN • “Destructive software robots working together on a collection of zombie computers”!! • Ouch, straight out of a SiFi horror story but the threat is very real.
  • 3. HIGHLY SPECIALIZED IDENTITY THEFT •A phishing attack on the internet can be a professional multi-step task involving: • A programmer (writes attack templates) • A phisher (designs the attack) • A cracker (provides hosting space for attack) • A Bot herder (access to botnet zombie computers)
  • 4. INTERNET HOAXES • A false message circulated online about new viruses • May cause your inbox to get flooded with junk-mail • Hoaxbusters warn about know hoaxes
  • 5. CYBERSQUATTING • The practice of registering a domain name and trying to sell it to those who are most likely to want their trademark back • Ex: eminemmobile.com sued by Eminem for use of his name to make money • This crime may lead to $100,000 fine and forfeiture of disputed name for offenders.
  • 6. CYBER HARRASSMENT, STALKING, AND BULLYING • Victims endure • Distress from obscene, vulgar, or threatening content • Repeated unwanted contact from aggressor • Posting of personal information on chat rooms and web sites • Social networks provide ways to report predators as a defense
  • 7. SOFTWARE PRIACY • Illegal distribution of bootleg copies to others (for free or to sell) • Software is intellectual property and offenders are subject to patent and copyright laws • Solving piracy problem is still a major issue
  • 8. GLOBAL PROBLEM • Piracy is an international issue • The unwillingness of governments and individuals to recognize software copyrights is a huge roadblock to solving the issue • Billions of dollars lost each year
  • 9. CYBERWAR • This is one country’s military attempt to destroy the information and communication systems of another • Most advanced nations are most vulnerable • Attacks shut down country’s economic system, transportation and medical capabilities, etc.
  • 10. FUNCTIONS OF CYBERWAR • Disabling enemy’s smart weapons and controls systems • Distributing cyberpropaganda • Stealing or modifying information (espionage)
  • 11. A NEW COLD WAR • Nations secretly testing networks to gain advantage or inflict damage on potential enemy nations ushers in a new type of cold war
  • 12. CYBERTERRORISM • Individuals or organized groups using technology to intimidate or harm governments and/or civilians • Causes virtual physical damage • Nuclear power plants, dams, power grids, etc., are all affected
  • 13. DISADVANTAGES FOR THE CYBER ATTACKER • May not achieve as much destruction as physical weapons • Requires continuous updating of systems as older methods quickly become outdated • Less drama and emotional appeal as traditional attacks
  • 14. GLOBALIZATION OF TERRORISM • Cyberwar and Cyberterrorism will only increase as dependence on technology increases • Controlling these attacks is a great challenge for the future
  • 15. INFORMATION SYSTEMS SECURITY • All systems connected to networks are vulnerable to security violations • Taking precaution is necessary and a variety of technologies have been created for this purpose
  • 16. SAFEGUARDING IS RESOURCES • Systems security auditing identifies most vulnerable systems in an organization • Followed by designing and implementing security measures
  • 17. RISK ANALYSIS • Determines if a company should take one of three courses of action: 1. Risk Reduction (actively invest in protect systems) 2. Risk Acceptance (do nothing, just absorb any damages) 3. Risk Transference (buy insurance or outsource risky functions)

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n