22-05-2012, 03:51 PM
CYBERCRIME & NETWORK SECURITY
NETWORK SECURITY.ppt (Size: 1.61 MB / Downloads: 167)
INFORMATION SYSTEMS SECURITY
A discipline that protects the
Confidentiality,
Integrity and
Availability
of information and information services
aka: Network Security, Computer Security, Information Assurance, Cyber Warfare
Threats:Illicit Activities
Hackers: enjoy intellectual challenges of overcoming software limitations and how to increase capabilities of systems
Crackers: illegally break into other people’s secure systems and networks
Cyber Terrorists: threaten and attack other people’s computers to further a social or political agenda
Threats:Illicit Activities
Malware Writers: responsible for the creation of malicious software
Samurai: hackers hired to legally enter secure computer/network environments
‘Phreakers’: Focus on defeating telephone systems and associated communication technologies
Phishing’: sending out ‘scam’ e-mails with the criminal intent of deceit and extortion
Spam: unsolicited and/or undesired bulk e-mail messages, often ‘selling’ a product (See also SPIM – targeting of instant messaging services)
Zombie Computers: Yours
Phishing
Phishing is a technique used by strangers to "fish" for information about you, information that you would not normally disclose to a stranger, such as your bank account number, PIN, and other personal identifiers such as your National Insurance number. These messages often contain company/bank logos that look legitimate and use flowery or legalistic language about improving security by confirming your identity details.
Malware Writer Motivations
To see how far the virus can spread
To cause damage and destruction to a targeted individual or organisation
To achieve a feeling of superiority/power
To leverage some form of personal gain
To provide a ‘lesson’ in Internet security
To conduct an experiment