25-08-2017, 09:32 PM
Computer Crime and Security
computer-security.ppt (Size: 2.72 MB / Downloads: 57)
McGruff, crime dog, goes cyber
McGruff the crime dog is jacking in to the Net. In surely the most convincing sign yet that Internet crime has gone mainstream, the National Crime Prevention Council is teaming up - somewhat incongruously - with the Chief Marketing Officer Council to unleash McGruff on a new virtual beat. Spurred by frightening online crime stats, like the fact that "77% of youths are contacted in some manner by online predators by age 14," the new McGruff campaign has picked up backing by big-name tech firms including Intel, McAfee, Verisign, USA Today and CNET. To match his new turf, the dog has tweaked his old line. He now says: "Take a Bite Out of Cyber Crime." The idea is cute, but the backing is serious. For example, Comcast, reports the Philadelphia Inquirer will ante up $2 million in televised public service announcements.
Computer crime and security
Understand some common forms of computer crime and their impact on individuals and businesses
Recognize some common classes of viruses, how they work, how they spread, and their impact on individuals and businesses
Understand how denial of service (DoS) and distributed DoS attacks are implemented
Discuss spyware, web defacing, identity theft and their consequences
Discuss some typical computer security precautions
Understand the basics of cryptography, symmetric key encryption, and public/private key encryption (and the applications in digital signatures)
Security and Employees
Most of the press reports are about outside attacks on computer systems, but actually, companies are in far more danger of losing money from employee misconduct than they are from outsiders.
TECHNOLOGY AS A WEAPON
Suppose you really wanted to be malicious or nasty to someone. What are all the different IT-related ways in which you could go about this?
Now suppose you were potentially the target. How would you go about protecting yourself?