5. INTERNET/CYBER SECURITY ISSUES
Viruses
Viruses infect
computers through
email attachments
and file sharing.
They delete files,
attack other
computers, and
make your computer
run slowly. One
infected computer
can cause problems
for all computers on
a network.
Hackers
Hackers are people
who “trespass” into
your computer from
a remote location.
They may use your
computer to send
spam or viruses,
host a Web site, or
do other activities
that cause computer
malfunctions.
Identity
Thieves
People who obtain
unauthorized access
to your personal
information, such as
Social Security and
financial account
numbers. They then
use this information
to commit crimes
such as fraud or
theft.
Spyware
Spyware is software
that “piggybacks” on
programs you
download, gathers
information about
your online habits,
and transmits
personal information
without your
knowledge. It may
also cause a wide
range of other
computer
malfunctions.
7. MECHANISM and TOOL EVALUATION
HTTP://WWW.MIS-ASIA.COM/RESOURCE/SECURITY/CHINESE-HACKER-GROUP-BEHIND-NEW-
YORK-TIMES-ATTACK-RETURNS-WITH-UPDATED-TOOLS/
8. OS/SOFTWARE UPDATES
Updates, sometimes called patches, fix problems with your operating system (OS) (e.g.,
Windows XP, Windows Vista, Mac OS X) and software programs (e.g., Microsoft Office
applications).
Most new operating systems are set to download updates by default. After updates are
downloaded, you will be asked to install them. Click yes!
Pros
Windows automatic updates download the latest security patches
These patches are designed to solve security vulnerabilities or coding errors that
hackers and others may use to compromise your system
Cons
Windows automatic updates doesn't protect you from everything
We still need to use firewalls, virus protection and spyware protection to keep your
computer secure and safe
In some cases Automatic updates can cause the Operating system to crash. We will
need a backup of the OS files to restore the system.
9. ANTI-VIRUS PROTECTION
To avoid computer problems caused by viruses, install and run an anti-virus program like
Sophos, Norton, Symantec etc.
Anti-virus software removes viruses, quarantines and repairs infected files, and can help
prevent future viruses.
Pros
Stops most viruses coming into your computer
Keeps computer in safe working
Secures computer from other malware
Cons
One of the drawbacks of anti-virus software is its heavy dependence on computer
resources
Most computers, when running a virus scan, can do little to nothing else due to the use of
CPU and Memory by the Antivirus Scans
Some applications cannot run due to conflicts with anti-virus software
Anti-virus software is not fool-proof and cannot protect you from every virus attack, every
time.
10. SPYWARE/ADWARE PROTECTION
Spyware refers to any computer program used to gather data about the user. Contrary
to reputation, not all spyware is harmful. Many programs use spyware to make a
program more user-friendly (the inclusion of this spyware is clearly stated in the terms
of use of any such program).
Watch for allusions to spyware and adware in user agreements before installing free
software programs.
Spyware can collect and distribute your personal information to third parties
Pros
• Prevents leak of personal information
• Secures computer from unauthorized access and hackers.
CONS
• Spyware protection software is not fool-proof.
• Most computers can do little to little else due to the use of CPU and Memory by
the Spyware Scans
11. FIREWALLS
Firewalls act as protective barriers between computers and the internet.
Hackers search the Internet by sending out pings (calls) to random computers
and wait for responses. Firewalls prevent your computer from responding to
these calls.
Pros
• Firewalls give you the ability to configure and customize them based on business
(work) and personal (home) needs
• Keeps computer in safe working condition.
• Firewall allows you to manually allow incoming traffic from other networks
Con
• Configuring Firewalls can require more technical knowledge than most users have or to
which they may have easy access
12. PASSWORD PROTECTION
Passwords are intended to make access to data and programs more difficult
even with physical access to a computer, tablet, or telephone
Pros
• A well chosen password will stymie the casual hacker and almost all nosy
busybodies
Cons
• Too complex a password is easily forgotten
• Personally related passwords are easily hacked
13. DISASTER PREVENTION
Preventing permanent loss of data of all kinds, e.g. documents, photos, presentations,
PDF’s, etc. is the purpose of disaster prevention techniques
Generally this is accomplished by backing up ALL important data and programs to
multiple points, e.g. physical resources such as cd’s and dvd’s, the cloud, e.g. Onedrive,
iCloud, etc. as well as a duplicate copy on the device itself
Pros
• Everything can be recovered
Cons
• Time to recover data may be extended
• Recovered data may be moderately out of date due to timing of backups
15. Future of Cyber Security
Looking toward the future, there are four factors affecting the future of
cyberspace security: people, devices, data, and cloud services
Who will they be?
• younger,
• spending more time online using multiple devices,
• more mobile
• see the world through social media and apps
This group also represents a “target rich” environment for
cybercriminals
16. Future of Cyber Security
2. What devices will they use?
According to The Boston Consulting Group,
• the number of Internet-connected devices is predicted to exceed 15 billion by
2015,
• and to soar to over 50 billion devices by 2020
• the devices will range from wrist band computers to cell phones the size of net
books
3. What data will be online?
Access to almost all of the everyday data used to conduct our business and personal
lives will be available online
• large database sets—so-called big data—will become a key basis of
competition, underpinning new waves of productivity growth, innovation, and
consumer surplus,
• personal data online will continue to expand and duplicate over cyberspace
4. What will drive this Information Society?
Cloud computing will grow in importance.
• fundamental changes to how businesses operate
• how every manner of services are delivered
• global issues that will need to be addressed
• transparency
17. Works Cited
Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory
and Practice. Amsterdam: Syngress, 2011. Kindle.
Beckert, Angie. "Pros & Cons of Automatic Windows Updates." EHow. Demand Media, 24 Aug. 2010. Web.
31 Mar. 2014.
Callaghan, Tom. “Disaster Prevention, Passwords, Pros and Cons." Message to the author. 1 Apr. 2014.
E-mail.
"Chinese Hacker Group behind New York Times Attack Returns with Updated Tools." MIS-Asia -. N.p., n.d.
Web. 01 Mar. 2014. <http://www.mis-asia.com/resource/security/chinese-hacker-group-behind-new-york-
times-attack-returns- with-updated-tools/>.
Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do
about It. New York: HarperCollins, 2010. Kindle.
Kennedy, David. "Anti-virus Software Pros & Cons." EHow. Demand Media, 01 July 2009. Web. 31 Mar.
2014.
Nicholas, Paul. "The Future of Cybersecurity: Understanding How the Next Billion Users Will Change
Cyberspace." Microsoft Security Blog. TechNet Blogs, 6 Oct. 2011. Web. 31 Mar. 2014.
O’Harrow, Robert, Jr. Zero Day, The Threat In Cyberspace. New York: Diversion Books, 2013. Kindle
Simpson, Lennon. "Cons of Spyware." EHow. Demand Media, 25 Jan. 2010. Web. 31 Mar. 2014.
Singer, P.W, and Allan Friedman. Cybersecurity and Cyberwar. New York: Oxford UP, 2014. Kindle.
"Zscaler Direct-to-Cloud Network." Cloud Security Products. N.p., n.d. Web. 01 Mar. 2014.
Notas do Editor
Good evening my name is Kaley Hair and Farheen Fatima. Today we will be discussing the issues, solutions, and the future, when it comes to network and internet cyber security.
KH
This is an image of the environment in which computer networks, LANs, WANs, etc. exist in cyberspace. KH
"Zscaler Direct-to-Cloud Network." Cloud Security Products. N.p., n.d. Web. 01 Mar. 2014. http://www.zscaler.com/product-cloud-security/products.php
I will be telling you about the organization of the presentation, because I have to set the stage by describing the current issues in network and cyber security before getting to the meat about the security mechanisms and tools, their evaluation and what the future holds. KH
Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress, 2011. Kindle.
Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010. Kindle.
O’Harrow, Robert, Jr. Zero Day, The Threat In Cyberspace. New York: Diversion Books, 2013. Kindle
Singer, P.W, and Allan Friedman. Cybersecurity and Cyberwar. New York: Oxford UP, 2014. Kindle.
Todays businesses small, midsize, and large face these issues when building computer networks whether or not they are connected to the Internet/Cloud. KH
Andress, Jason. The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. Amsterdam: Syngress, 2011. Kindle.
Clarke, Richard A., and Robert K. Knake. Cyber War: The Next Threat to National Security and What to Do about It. New York: HarperCollins, 2010. Kindle.
O’Harrow, Robert, Jr. Zero Day, The Threat In Cyberspace. New York: Diversion Books, 2013. Kindle
Singer, P.W, and Allan Friedman. Cybersecurity and Cyberwar. New York: Oxford UP, 2014. Kindle.
While these issues are also faced by business networks, the first line of defense against these are Internet or Cloud based. Internet Node security is a special case facing only a few Internet control physical locations. KH
The above mentioned topics will help us understand, analyze, and prepare for the day-to-day security challenges faced by IT professionals and home users.. FF
According to the University of Maryland “during a senate hearing in 2013, the nations top intelligence officials warned the cyber attacks and digital spying are the top threat to national security, eclipsing terrorism.” Though it seems obvious that cyber-terrorism is terrorism, some mistakenly want to separate cyber-terrorism into its own closed world of geeky hackers without any global or political agenda.
The boogie man is out there so how well do these tools protect you? KH
"Chinese Hacker Group behind New York Times Attack Returns with Updated Tools." MIS-Asia -. N.p., n.d. Web. 01 Mar. 2014. <http://www.mis-asia.com/resource/security/chinese-hacker-group- behind-new-york-times-attack-returns-with-updated-tools/>.
Updates/Patches are latest code release for any given OS/Software
Software updates keep us up to date on the latest technologies and bug fixes. Updates resolves known issues and bug fixes. In certain instances updates resolve known backdoors/vulnerabilities found in the code that are can be used by hackers.
Do we need to apply software updates? YES refer to pros. FF
According to Data Communication and Computer Networks textbook “anti virus is design to detect and remove viruses that have infected the computers memory, disks, or operating system.” “Because new viruses appear all the time, it is important to continuously update anti-virus software with the latest version.” FF
White, Curt M. “Data Communication and Computer Networks.” 7th edition. Page 228. Print.
Windows is the biggest target for viruses and spyware and this applies to Windows based cell phones as well as computers. FF
There are 3 basic types of firewalls are Packet filter, Proxy server, Application layer.
Firewall is a wall that protects computer from allowing incoming traffic from other networks. Firewall as the ability to stop certain internal and external movements. FF
According to Data Communications and Computer Networks, here are some helpful hints when choosing a password.
Change password often
Choose at least 8 characters, mixing uppercase and lowercase letters. Mix the numbers and letters.
Do not choose passwords that are similar to your first or last names, pet names, car names, and etc.
“Even though a password is the most common form of identification, it is also one of the weakest forms of protection.”
Talk about passwords for E-Verify and share my story when creating a password. KH
Callaghan, Tom. "Passwords, Pros and Cons." Message to the author. 1 Apr. 2014. E-mail.
“No one intends to prevent disasters, especially natural disasters such as earthquakes, tsunami’s, or hurricanes.
What is intended is the prevention of the permanent loss of data of all kinds, that could result from such natural and/or many man-made disaster. Disaster recovery may be a better name since generally this is accomplished by backing up ALL important data and programs to multiple points.”KH
Callaghan, Tom. “Disaster Prevention, Passwords, Pros and Cons." Message to the author. 1 Apr. 2014. E-mail.
This image came from cfo.com to show how companies are still learning to fighting these attacks . FF
http://ww2.cfo.com/technology/2013/11/finding-cyber-security-weak-spots/
It basically represents all of us setting here today and our children for the future. FF
Nicholas, Paul. "The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace." Microsoft Security Blog. TechNet Blogs, 6 Oct. 2011. Web. 31 Mar. 2014.
Its in the NSA’s hand if you asked me, but hopefully they can come together as a professional team and figure it out for businesses and personal use. FF
Nicholas, Paul. "The Future of Cybersecurity: Understanding How the Next Billion Users Will Change Cyberspace." Microsoft Security Blog. TechNet Blogs, 6 Oct. 2011. Web. 31 Mar. 2014.
This includes our power point presentation on network and cyber security. FF