2014CyberSecurityProject

11 de Jan de 2017
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
2014CyberSecurityProject
1 de 17

Mais conteúdo relacionado

Mais procurados

Computer security risksComputer security risks
Computer security risksAasim Mushtaq
Computer securityComputer security
Computer securityOZ Assignment help
System  failureSystem  failure
System failurechrispaul8676
Symantec Mobile Security Whitepaper June 2011Symantec Mobile Security Whitepaper June 2011
Symantec Mobile Security Whitepaper June 2011Symantec
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
Computer securityComputer security
Computer securityShashi Chandra

Destaque

Saif Ali CVSaif Ali CV
Saif Ali CVSaif Al-Khafaji
Plant classificationPlant classification
Plant classificationMuhammad Naseem
Alba Lucia Sanchez Mejia	Alba Lucia Sanchez Mejia
Alba Lucia Sanchez Mejia astrydquintero
¿Por qué contaduría?¿Por qué contaduría?
¿Por qué contaduría?angiebernal
6.formas de interação6.formas de interação
6.formas de interaçãoGêrlan Cardoso da Silva
crescent_purecrescent_pure
crescent_pureKunal Aggarwal

Similar a 2014CyberSecurityProject

Computer virusComputer virus
Computer virusrana_babar
Computer virusComputer virus
Computer virusrana_babar
Cyber crimeCyber crime
Cyber crimeSalma Zafar
Cloud securityCloud security
Cloud securityTushar Kayande
Cyber Security: A Hands on reviewCyber Security: A Hands on review
Cyber Security: A Hands on reviewMiltonBiswas8
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas

2014CyberSecurityProject

Notas do Editor

  1. Good evening my name is Kaley Hair and Farheen Fatima. Today we will be discussing the issues, solutions, and the future, when it comes to network and internet cyber security. KH
  2. This is an image of the environment in which computer networks, LANs, WANs, etc. exist in cyberspace. KH "Zscaler Direct-to-Cloud Network." Cloud Security Products. N.p., n.d. Web. 01 Mar. 2014. http://www.zscaler.com/product-cloud-security/products.php
  3. I will be telling you about the organization of the presentation, because I have to set the stage by describing the current issues in network and cyber security before getting to the meat about the security mechanisms and tools, their evaluation and what the future holds. KH Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress, 2011. Kindle. Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010. Kindle. O’Harrow, Robert, Jr. Zero Day, The Threat In Cyberspace. New York: Diversion Books, 2013. Kindle Singer, P.W, and Allan Friedman. Cybersecurity and Cyberwar. New York: Oxford UP, 2014. Kindle.
  4. Todays businesses small, midsize, and large face these issues when building computer networks whether or not they are connected to the Internet/Cloud. KH Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress, 2011. Kindle. Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010. Kindle. O’Harrow, Robert, Jr. Zero Day, The Threat In Cyberspace. New York: Diversion Books, 2013. Kindle Singer, P.W, and Allan Friedman. Cybersecurity and Cyberwar. New York: Oxford UP, 2014. Kindle.
  5. While these issues are also faced by business networks, the first line of defense against these are Internet or Cloud based. Internet Node security is a special case facing only a few Internet control physical locations. KH
  6. The above mentioned topics will help us understand, analyze, and prepare for the day-to-day security challenges faced by IT professionals and home users.. FF
  7. According to the University of Maryland “during a senate hearing in 2013, the nations top intelligence officials warned the cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.” Though it seems obvious that cyber-terrorism is terrorism, some mistakenly want to separate cyber-terrorism into its own closed world of geeky hackers without any global or political agenda. The boogie man is out there so how well do these tools protect you? KH "Chinese Hacker Group behind New York Times Attack Returns with Updated Tools." MIS-Asia -. N.p., n.d. Web. 01 Mar. 2014. <http://www.mis-asia.com/resource/security/chinese-hacker-group- behind-new-york-times-attack-returns-with-updated-tools/>.
  8. Updates/Patches are latest code release for any given OS/Software Software updates keep us up to date on the latest technologies and bug fixes. Updates resolves known issues and bug fixes. In certain instances updates resolve known backdoors/vulnerabilities found in the code that are can be used by hackers. Do we need to apply software updates? YES refer to pros. FF
  9. According to Data Communication and Computer Networks textbook “anti virus is design to detect and remove viruses that have infected the computers memory, disks, or operating system.” “Because new viruses appear all the time, it is important to continuously update anti-virus software with the latest version.” FF White, Curt M. “Data Communication and Computer Networks.” 7th edition. Page 228. Print.
  10. Windows is the biggest target for viruses and spyware and this applies to Windows based cell phones as well as computers. FF
  11. There are 3 basic types of firewalls are Packet filter, Proxy server, Application layer. Firewall is a wall that protects computer from allowing incoming traffic from other networks. Firewall as the ability to stop certain internal and external movements. FF
  12. According to Data Communications and Computer Networks, here are some helpful hints when choosing a password. Change password often Choose at least 8 characters, mixing uppercase and lowercase letters. Mix the numbers and letters. Do not choose passwords that are similar to your first or last names, pet names, car names, and etc. “Even though a password is the most common form of identification, it is also one of the weakest forms of protection.” Talk about passwords for E-Verify and share my story when creating a password. KH Callaghan, Tom. "Passwords, Pros and Cons." Message to the author. 1 Apr. 2014. E-mail.
  13. “No one intends to prevent disasters, especially natural disasters such as earthquakes, tsunami’s, or hurricanes. What is intended is the prevention of the permanent loss of data of all kinds, that could result from such natural and/or many man-made disaster. Disaster recovery may be a better name since generally this is accomplished by backing up ALL important data and programs to multiple points.”KH Callaghan, Tom. “Disaster Prevention, Passwords, Pros and Cons." Message to the author. 1 Apr. 2014. E-mail.
  14. This image came from cfo.com to show how companies are still learning to fighting these attacks . FF http://ww2.cfo.com/technology/2013/11/finding-cyber-security-weak-spots/
  15. It basically represents all of us setting here today and our children for the future. FF Nicholas, Paul. "The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace." Microsoft Security Blog. TechNet Blogs, 6 Oct. 2011. Web. 31 Mar. 2014.
  16. Its in the NSA’s hand if you asked me, but hopefully they can come together as a professional team and figure it out for businesses and personal use. FF Nicholas, Paul. "The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace." Microsoft Security Blog. TechNet Blogs, 6 Oct. 2011. Web. 31 Mar. 2014.
  17. This includes our power point presentation on network and cyber security. FF