Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 17 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
17
Dung lượng
431,03 KB
Nội dung
Computer Crime SinhVienZone.com https://fb.com/sinhvienzonevn Number of Incidents Reported to Computer Emergency Response Team (CERT) SinhVienZone.com https://fb.com/sinhvienzonevn Computer Crime and Security Survey SinhVienZone.com https://fb.com/sinhvienzonevn The Computer as a Tool to Commit Crime Social engineering E.g pre-texting, phishing (email) Dumpster diving To get sensitive personal information such as address, password, credit card numbers, etc Identity theft Cyberterrorism SinhVienZone.com https://fb.com/sinhvienzonevn Computers as Objects of Crime Illegal access and use Hackers Crackers Information and equipment theft Software and Internet piracy Computer-related scams International computer crime SinhVienZone.com https://fb.com/sinhvienzonevn How to Respond to a Security Incident SinhVienZone.com https://fb.com/sinhvienzonevn Data Alteration and Destruction Virus Worm Logic bomb Trojan horse SinhVienZone.com https://fb.com/sinhvienzonevn The Six Computer Incidents with the Greatest Worldwide Economic Impact SinhVienZone.com https://fb.com/sinhvienzonevn Top Viruses – July 2002 SinhVienZone.com https://fb.com/sinhvienzonevn Preventing Computer-Related Crime Crime prevention by state and federal agencies Crime prevention by corporations Public Key Infrastructure (PKI) Biometrics Anti-virus programs 10 SinhVienZone.com https://fb.com/sinhvienzonevn Preventing Computer-Related Crime Intrusion Detection Software Managed Security Service Providers (MSSPs) Internet Laws for Libel and Protection of Decency 11 SinhVienZone.com https://fb.com/sinhvienzonevn Preventing Crime on the Internet Develop effective Internet and security policies Use a stand-alone firewall with network monitoring capabilities Monitor managers and employees Use Internet security specialists to perform audits 12 SinhVienZone.com https://fb.com/sinhvienzonevn Common Methods Used to Commit Computer Crimes 13 SinhVienZone.com https://fb.com/sinhvienzonevn How to Protect Your Corporate Data from Hackers 14 SinhVienZone.com https://fb.com/sinhvienzonevn Internet Security Threads Viruses and hostile Web applications (e.g Java Applets or ActiveX controls) Trojan horses Adware and spyware Spam emails Identity theft and spoofing Social engineering 15 SinhVienZone.com https://fb.com/sinhvienzonevn Internet Security Measures Firewall Antivirus software Email encryption Encryption and authentication Frequent updates of software Always beware of incoming threads 16 SinhVienZone.com https://fb.com/sinhvienzonevn Antivirus Software Symantec: Norton Antivirus, Norton Internet Security, etc McAfee: McAfee Virus Scan, McAfee Internet Security, etc Kaspersky Bit defender BKAV … 17 SinhVienZone.com https://fb.com/sinhvienzonevn ... Reported to Computer Emergency Response Team (CERT) SinhVienZone. com https://fb .com/ sinhvienzonevn Computer Crime and Security Survey SinhVienZone. com https://fb .com/ sinhvienzonevn The Computer... Use Internet security specialists to perform audits 12 SinhVienZone. com https://fb .com/ sinhvienzonevn Common Methods Used to Commit Computer Crimes 13 SinhVienZone. com https://fb .com/ sinhvienzonevn... horse SinhVienZone. com https://fb .com/ sinhvienzonevn The Six Computer Incidents with the Greatest Worldwide Economic Impact SinhVienZone. com https://fb .com/ sinhvienzonevn Top Viruses – July 2002 SinhVienZone. com