Lecture Computer networks 1: Computer crime - Phạm Trần Vũ

17 31 0
Lecture Computer networks 1: Computer crime - Phạm Trần Vũ

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Lecture Computer networks 1: Computer crime has contents: Computer crime and security survey, the computer as a tool to commit crime, computers as objects of crime, preventing computer related crime,... and other contents.

Computer Crime CuuDuongThanCong.com https://fb.com/tailieudientucntt Number of Incidents Reported to Computer Emergency Response Team (CERT) CuuDuongThanCong.com https://fb.com/tailieudientucntt Computer Crime and Security Survey CuuDuongThanCong.com https://fb.com/tailieudientucntt The Computer as a Tool to Commit Crime  Social engineering   E.g pre-texting, phishing (email) Dumpster diving  To get sensitive personal information such as address, password, credit card numbers, etc  Identity theft  Cyberterrorism CuuDuongThanCong.com https://fb.com/tailieudientucntt Computers as Objects of Crime  Illegal access and use  Hackers  Crackers  Information and equipment theft  Software and Internet piracy  Computer-related scams  International computer crime CuuDuongThanCong.com https://fb.com/tailieudientucntt How to Respond to a Security Incident CuuDuongThanCong.com https://fb.com/tailieudientucntt Data Alteration and Destruction  Virus  Worm  Logic bomb  Trojan horse CuuDuongThanCong.com https://fb.com/tailieudientucntt The Six Computer Incidents with the Greatest Worldwide Economic Impact CuuDuongThanCong.com https://fb.com/tailieudientucntt Top Viruses – July 2002 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Computer-Related Crime  Crime prevention by state and federal agencies  Crime prevention by corporations   Public Key Infrastructure (PKI)  Biometrics Anti-virus programs 10 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Computer-Related Crime  Intrusion Detection Software  Managed Security Service Providers (MSSPs)  Internet Laws for Libel and Protection of Decency 11 CuuDuongThanCong.com https://fb.com/tailieudientucntt Preventing Crime on the Internet  Develop effective Internet and security policies  Use a stand-alone firewall with network monitoring capabilities  Monitor managers and employees  Use Internet security specialists to perform audits 12 CuuDuongThanCong.com https://fb.com/tailieudientucntt Common Methods Used to Commit Computer Crimes 13 CuuDuongThanCong.com https://fb.com/tailieudientucntt How to Protect Your Corporate Data from Hackers 14 CuuDuongThanCong.com https://fb.com/tailieudientucntt Internet Security Threads  Viruses and hostile Web applications (e.g Java Applets or ActiveX controls)  Trojan horses  Adware and spyware  Spam emails  Identity theft and spoofing  Social engineering 15 CuuDuongThanCong.com https://fb.com/tailieudientucntt Internet Security Measures  Firewall  Antivirus software  Email encryption  Encryption and authentication  Frequent updates of software  Always beware of incoming threads 16 CuuDuongThanCong.com https://fb.com/tailieudientucntt Antivirus Software  Symantec: Norton Antivirus, Norton Internet Security, etc  McAfee: McAfee Virus Scan, McAfee Internet Security, etc  Kaspersky  Bit defender  BKAV  … 17 CuuDuongThanCong.com https://fb.com/tailieudientucntt ... https://fb.com/tailieudientucntt Preventing Computer- Related Crime  Crime prevention by state and federal agencies  Crime prevention by corporations   Public Key Infrastructure (PKI)  Biometrics Anti-virus programs... https://fb.com/tailieudientucntt Computers as Objects of Crime  Illegal access and use  Hackers  Crackers  Information and equipment theft  Software and Internet piracy  Computer- related scams  International computer. .. to Computer Emergency Response Team (CERT) CuuDuongThanCong.com https://fb.com/tailieudientucntt Computer Crime and Security Survey CuuDuongThanCong.com https://fb.com/tailieudientucntt The Computer

Ngày đăng: 10/01/2020, 23:40

Tài liệu cùng người dùng

Tài liệu liên quan