Bài giảng Mạng máy tính 1 - Lecture 14: Computer Crime - Phạm Trần Vũ

The Computer as a Tool to Commit Crime  Social engineering  E.g. pre-texting, phishing (email)  Dumpster diving  To get sensitive personal information such as address, password, credit card numbers, etc.  Identity theft  Cyberterrorism Computers as Objects of Crime  Illegal access and use  Hackers  Crackers  Information and equipment theft  Software and Internet piracy  Computer-related scams  International computer crime

pdf17 trang | Chia sẻ: thanhle95 | Lượt xem: 425 | Lượt tải: 2download
Bạn đang xem nội dung tài liệu Bài giảng Mạng máy tính 1 - Lecture 14: Computer Crime - Phạm Trần Vũ, để tải tài liệu về máy bạn click vào nút DOWNLOAD ở trên
Computer Crime 1 CuuDuongThanCong.com https://fb.com/tailieudientucntt Number of Incidents Reported to Computer Emergency Response Team (CERT) 2 CuuDuongThanCong.com https://fb.com/tailieudientucntt Computer Crime and Security Survey 3 CuuDuongThanCong.com https://fb.com/tailieudientucntt The Computer as a Tool to Commit Crime  Social engineering  E.g. pre-texting, phishing (email)  Dumpster diving  To get sensitive personal information such as address, password, credit card numbers, etc.  Identity theft  Cyberterrorism 4 CuuDuongThanCong.com https://fb.com/tailieudientucntt Computers as Objects of Crime  Illegal access and use  Hackers  Crackers  Information and equipment theft  Software and Internet piracy  Computer-related scams  International computer crime 5 CuuDuongThanCong.com https://fb.com/tailieudientucntt How to Respond to a Security Incident 6 CuuDuongThanCong.com https://fb.com/tailieudientucntt Data Alteration and Destruction  Virus  Worm  Logic bomb  Trojan horse 7 CuuDuongThanCong.com https://fb.com/tailieudientucntt The Six Computer Incidents with the Greatest Worldwide Economic Impact 8 CuuDuongThanCong.com https://fb.com/tailieudientucntt Top Viruses – July 2002 9 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Computer-Related Crime  Crime prevention by state and federal agencies  Crime prevention by corporations  Public Key Infrastructure (PKI)  Biometrics  Anti-virus programs 10 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Computer-Related Crime  Intrusion Detection Software  Managed Security Service Providers (MSSPs)  Internet Laws for Libel and Protection of Decency 11 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Crime on the Internet  Develop effective Internet and security policies  Use a stand-alone firewall with network monitoring capabilities  Monitor managers and employees  Use Internet security specialists to perform audits 12 CuuDuongThanCong.com https://fb.com/tailieudientucntt Common Methods Used to Commit Computer Crimes 13 CuuDuongThanCong.com https://fb.com/tailieudientucntt How to Protect Your Corporate Data from Hackers 14 CuuDuongThanCong.com https://fb.com/tailieudientucntt Internet Security Threads  Viruses and hostile Web applications (e.g. Java Applets or ActiveX controls)  Trojan horses  Adware and spyware  Spam emails  Identity theft and spoofing  Social engineering 15 CuuDuongThanCong.com https://fb.com/tailieudientucntt Internet Security Measures  Firewall  Antivirus software  Email encryption  Encryption and authentication  Frequent updates of software  Always beware of incoming threads 16 CuuDuongThanCong.com https://fb.com/tailieudientucntt Antivirus Software  Symantec: Norton Antivirus, Norton Internet Security, etc.  McAfee: McAfee Virus Scan, McAfee Internet Security, etc  Kaspersky  Bit defender  BKAV  17 CuuDuongThanCong.com https://fb.com/tailieudientucntt