DT4 Security
DT4 Security
Dr Rashad Ragab
Math. Dept., Helwan University
[email protected]
Competencies
Identify one of the most significant concerns for
effective implementation of computer
technology- Security.
Discuss cybercrimes including creation of
malicious programs such as viruses, worms,
Trojan horse, and zombies as well as denial of
service attacks, Internet scams, social
networking risks, cyberbullying, rogue Wi-Fi
hotspots, theft, and data manipulation.
Detail ways to protect computer security
including restricting access, encrypting data,
anticipating disasters, and preventing data loss.
2
People
3
Security
Cybercrime or computer crime is any
offense that involves a computer and a
network
Hackers
Gain unauthorized access
4
Computer Crime (Page 1 of 3)
Malicious Programs - Malware
Viruses
Worms
Trojan horse
Zombies
Denial of Service
(DoS) attack
5
Computer Crime (Page 2 of 3)
Internet scams
Phishing
6
Computer Crime (Page 3 of 3)
Social networking
risks
Cyber-bullying
Rogue Wi-Fi hotspots
Theft
Data manipulation
Computer Fraud and
Abuse Act
7
Making IT Work for You ~ Security Suites
Security Suites
are software
packages that
include various
utilities that help
protect your
computer from
cybercrime.
8
Making IT Work for You ~ Cloud-Based
Backup
Cloud-based
backup services
such as Carbonite
provide cloud-
based backup
services.
9
Information Security
Confidentiality
◦ Data confidentiality: Assures that confidential information
is not disclosed to unauthorized individuals
◦ Privacy: Assures that individual control or influence what
information may be collected and stored
Integrity
◦ Data integrity: assures that information and programs are
changed only in a specified and authorized manner
◦ System integrity: Assures that a system performs its
operations in unimpaired manner
Availability: assure that systems works promptly and
service is not denied to authorized users
Key Security Concepts
Other concepts to a complete security
picture
Authenticity: the property of being genuine
and being able to be verified and trusted;
confident in the validity of a transmission, or
a message, or its originator
Accountability: generates the requirement
for actions of an entity to be traced uniquely
to that individual to support nonrepudiation,
deference, fault isolation, etc
Levels of security breach impact
20
Open-Ended Questions (Page 1 of 2)
Define security. Define computer crime and
the impact of malicious programs, including
viruses, worms, Trojan horses, and
zombies, as well as cyberbullying, denial of
service attacks, Internet scams, social
networking risks, rogue Wi-Fi hotspots,
thefts, data manipulation, and other
hazards.
21
Open-Ended Questions (Page 2 of 2)
Discuss ways to protect computer security
including restricting access, encrypting
data, anticipating disasters, and preventing
data loss.
22