SlideShare uma empresa Scribd logo
1 de 17
COOKIES
•   A message passed from a web server to a web browser that is sent
    back to the server each time the browser requests a page from that
    server

•   Normally used for authentication purposes

•   May contain sensitive/private info, thus posing security risk
BOTNETS AND CYBERATTACK SUPPLY
            CHAIN
•   “Destructive software robots working together on a collection of
    zombie computers”!!

•   Ouch, straight out of a SiFi horror story but the threat is very real.
HIGHLY SPECIALIZED
             IDENTITY THEFT
•A
 phishing attack on the internet can be a professional
multi-step task involving:
 •   A programmer (writes attack templates)

 •   A phisher (designs the attack)

 •   A cracker (provides hosting space for attack)

 •   A Bot herder (access to botnet zombie computers)
INTERNET HOAXES

•   A false message circulated online about new viruses

•   May cause your inbox to get flooded with junk-mail

•   Hoaxbusters warn about know hoaxes
CYBERSQUATTING
•   The practice of registering a domain name and trying to sell it to
    those who are most likely to want their trademark back

    •   Ex: eminemmobile.com sued by Eminem for use of his name to
        make money

•   This crime may lead to $100,000 fine and forfeiture of disputed
    name for offenders.
CYBER HARRASSMENT, STALKING,
               AND BULLYING
•   Victims endure

    •   Distress from obscene, vulgar, or threatening content

    •   Repeated unwanted contact from aggressor

    •   Posting of personal information on chat rooms and web sites

•   Social networks provide ways to report predators as a defense
SOFTWARE PRIACY

•   Illegal distribution of bootleg copies to others (for free or to sell)

•   Software is intellectual property and offenders are subject to patent
    and copyright laws

•   Solving piracy problem is still a major issue
GLOBAL PROBLEM

•   Piracy is an international issue

•   The unwillingness of governments and individuals to recognize
    software copyrights is a huge roadblock to solving the issue

•   Billions of dollars lost each year
CYBERWAR
•   This is one country’s military attempt to destroy the information and
    communication systems of another

•   Most advanced nations are most vulnerable

•   Attacks shut down country’s economic system, transportation and
    medical capabilities, etc.
FUNCTIONS OF CYBERWAR

•   Disabling enemy’s smart weapons and controls systems

•   Distributing cyberpropaganda

•   Stealing or modifying information (espionage)
A NEW COLD WAR
•   Nations secretly testing networks to gain advantage or inflict damage
    on potential enemy nations ushers in a new type of cold war
CYBERTERRORISM
•   Individuals or organized groups using technology to intimidate or
    harm governments and/or civilians

•   Causes virtual physical damage

•   Nuclear power plants, dams, power grids, etc., are all affected
DISADVANTAGES FOR THE CYBER
               ATTACKER
•   May not achieve as much destruction as physical weapons

•   Requires continuous updating of systems as older methods quickly
    become outdated

•   Less drama and emotional appeal as traditional attacks
GLOBALIZATION OF
                 TERRORISM
•   Cyberwar and Cyberterrorism will only increase as dependence on
    technology increases

•   Controlling these attacks is a great challenge for the future
INFORMATION SYSTEMS
              SECURITY
•   All systems connected to networks are vulnerable to security
    violations

•   Taking precaution is necessary and a variety of technologies have
    been created for this purpose
SAFEGUARDING IS
                   RESOURCES
•   Systems security auditing identifies most vulnerable systems in an
    organization

•   Followed by designing and implementing security measures
RISK ANALYSIS
•    Determines if a company should take one of three courses of
     action:

    1. Risk Reduction (actively invest in protect systems)
    2. Risk Acceptance (do nothing, just absorb any damages)

    3. Risk Transference (buy insurance or outsource risky
        functions)

Mais conteúdo relacionado

Mais procurados

Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
DevonWagner
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
Bilal Ali
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
DevonWagner
 

Mais procurados (19)

Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
"Hacking"
"Hacking""Hacking"
"Hacking"
 
Hackers & hacktivism
Hackers & hacktivismHackers & hacktivism
Hackers & hacktivism
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Brooks18
Brooks18Brooks18
Brooks18
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyberware
CyberwareCyberware
Cyberware
 
PPIT Lecture 19
PPIT Lecture 19PPIT Lecture 19
PPIT Lecture 19
 
Computer security by devon wagner
Computer security by devon wagnerComputer security by devon wagner
Computer security by devon wagner
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 

Destaque (7)

Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Chapter 10, part 2
Chapter 10, part 2Chapter 10, part 2
Chapter 10, part 2
 
Maeve mis presentation
Maeve mis presentationMaeve mis presentation
Maeve mis presentation
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 
Mis
MisMis
Mis
 
Mis 2101 Questions
Mis 2101 QuestionsMis 2101 Questions
Mis 2101 Questions
 

Semelhante a Echo p.410 422 ch 10, irina

cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
srinivasgosula
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
himanshumunjal
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
Alisha Korpal
 

Semelhante a Echo p.410 422 ch 10, irina (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
cs computer notes of studies in education
cs computer notes of studies in educationcs computer notes of studies in education
cs computer notes of studies in education
 
Grade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and SecurityGrade 7 Chap 10 Cyber Threats and Security
Grade 7 Chap 10 Cyber Threats and Security
 
Hacking (1)
Hacking (1)Hacking (1)
Hacking (1)
 
Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]Guerilla warfare by means of netwarfare [2001]
Guerilla warfare by means of netwarfare [2001]
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime & cyber law
cyber crime & cyber lawcyber crime & cyber law
cyber crime & cyber law
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber AwarenessCyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
cybersecurity notes important points.pptx
cybersecurity notes important points.pptxcybersecurity notes important points.pptx
cybersecurity notes important points.pptx
 
Hacking
HackingHacking
Hacking
 
Cyber Crime - How to Prevent
Cyber Crime - How to PreventCyber Crime - How to Prevent
Cyber Crime - How to Prevent
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Cyber crime and secuity
Cyber crime and secuityCyber crime and secuity
Cyber crime and secuity
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Último

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
lizamodels9
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 

Último (20)

Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 

Echo p.410 422 ch 10, irina

  • 1. COOKIES • A message passed from a web server to a web browser that is sent back to the server each time the browser requests a page from that server • Normally used for authentication purposes • May contain sensitive/private info, thus posing security risk
  • 2. BOTNETS AND CYBERATTACK SUPPLY CHAIN • “Destructive software robots working together on a collection of zombie computers”!! • Ouch, straight out of a SiFi horror story but the threat is very real.
  • 3. HIGHLY SPECIALIZED IDENTITY THEFT •A phishing attack on the internet can be a professional multi-step task involving: • A programmer (writes attack templates) • A phisher (designs the attack) • A cracker (provides hosting space for attack) • A Bot herder (access to botnet zombie computers)
  • 4. INTERNET HOAXES • A false message circulated online about new viruses • May cause your inbox to get flooded with junk-mail • Hoaxbusters warn about know hoaxes
  • 5. CYBERSQUATTING • The practice of registering a domain name and trying to sell it to those who are most likely to want their trademark back • Ex: eminemmobile.com sued by Eminem for use of his name to make money • This crime may lead to $100,000 fine and forfeiture of disputed name for offenders.
  • 6. CYBER HARRASSMENT, STALKING, AND BULLYING • Victims endure • Distress from obscene, vulgar, or threatening content • Repeated unwanted contact from aggressor • Posting of personal information on chat rooms and web sites • Social networks provide ways to report predators as a defense
  • 7. SOFTWARE PRIACY • Illegal distribution of bootleg copies to others (for free or to sell) • Software is intellectual property and offenders are subject to patent and copyright laws • Solving piracy problem is still a major issue
  • 8. GLOBAL PROBLEM • Piracy is an international issue • The unwillingness of governments and individuals to recognize software copyrights is a huge roadblock to solving the issue • Billions of dollars lost each year
  • 9. CYBERWAR • This is one country’s military attempt to destroy the information and communication systems of another • Most advanced nations are most vulnerable • Attacks shut down country’s economic system, transportation and medical capabilities, etc.
  • 10. FUNCTIONS OF CYBERWAR • Disabling enemy’s smart weapons and controls systems • Distributing cyberpropaganda • Stealing or modifying information (espionage)
  • 11. A NEW COLD WAR • Nations secretly testing networks to gain advantage or inflict damage on potential enemy nations ushers in a new type of cold war
  • 12. CYBERTERRORISM • Individuals or organized groups using technology to intimidate or harm governments and/or civilians • Causes virtual physical damage • Nuclear power plants, dams, power grids, etc., are all affected
  • 13. DISADVANTAGES FOR THE CYBER ATTACKER • May not achieve as much destruction as physical weapons • Requires continuous updating of systems as older methods quickly become outdated • Less drama and emotional appeal as traditional attacks
  • 14. GLOBALIZATION OF TERRORISM • Cyberwar and Cyberterrorism will only increase as dependence on technology increases • Controlling these attacks is a great challenge for the future
  • 15. INFORMATION SYSTEMS SECURITY • All systems connected to networks are vulnerable to security violations • Taking precaution is necessary and a variety of technologies have been created for this purpose
  • 16. SAFEGUARDING IS RESOURCES • Systems security auditing identifies most vulnerable systems in an organization • Followed by designing and implementing security measures
  • 17. RISK ANALYSIS • Determines if a company should take one of three courses of action: 1. Risk Reduction (actively invest in protect systems) 2. Risk Acceptance (do nothing, just absorb any damages) 3. Risk Transference (buy insurance or outsource risky functions)

Notas do Editor

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n