Sadia Ahmad Jeffrey Au Onika Emanuel March 27 2012 What Is It Definition Measures taken to protect a computer or a computer system against unauthorized access or attack Also known as Information Security ID: 356774
Download Presentation The PPT/PDF document "Cyber Security" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Cyber Security
Sadia
Ahmad
Jeffrey Au
Onika
Emanuel
March 27, 2012Slide2
What Is It?
Definition: “Measures taken to protect a computer or a computer system against unauthorized access or attack
Also known as: Information Security
Attacks include (but not limited to):
Viruses
Hacks
Identity theftSlide3
Why Is It Important?
President Barack Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s prosperity in the 21
st
century will depend on cyber security.”
In 2010, Obama declared an investment of $13 million toward a strategy for cyber securitySlide4
How You Can Protect Yourself
Install Anti-Virus software to protect yourself from crippling bugs
Norton,
Kapersky
, Trend-Micro, and
Webroot
Report anything suspicious to
siteowners
Siteowners
have the right to kick suspicious users off their websites
Don’t store personal information on websites
Phone numbers, addresses, social security numbers, credit card numbersSlide5
How to Protect cont’d
Do not talk to strangers online
Not everyone is who they claim to be online
Never give your information over the phone
Some telemarketing companies don’t admit when they plan on selling your information to websites
Never reply to emails that look suspicious
They may be scams from people asking for money –
i.e
emails that say you’ve won moneySlide6
How to Protect cont’d
Never give out your password
Never use the same password for your computer, phones, credit/debit cards, etc.
Change your password regularly
Change your password if you have had unwanted access
Upgrade your software on your computer regularly
Enable the firewall on your computerSlide7
How to Protect cont’d
Monitor your online presence
Check your accounts for any suspicious activity
Turn off your Bluetooth on your phone
Computer hackers may find a way to use it
Don’t log onto Wi-Fi hotspots unless you know that it is secure
If you see an advertisement with outrageously low selling prices, they are generally untrueSlide8
How to Protect cont’d
Think twice before clicking on a link
It might not be secured or what you think it might be
Never save your personal information on a public computer
You never know who might be on the computer after youSlide9
History of Cyber Security
1983: The FBI tracks down the “414s”
The “414s” were a group of young hackers who broke into several U.S. government networks, often only using an Apple II+ computer and modem
1983: Fred Cohen (USC) coins the term “computer virus”
A computer program that can “affect other computer programs by modifying them in such a way as to include a possibly evolved copy of itself”Slide10
History cont’d
1986: One of the first PC viruses ever created was released by programmers in Pakistan
This virus was named “The Brain”
1991: Phillip Zimmerman released “Pretty Good Privacy,” a free, powerful data-encryption tool
The U.S. government began a three-year criminal investigation on Zimmerman, alleging he broke U.S. encryption laws after his program spread rapidly around the globe (The government later dropped the charges).Slide11
History cont’d
1991: Symantec released Norton Anti-Virus software
1994: Inexperienced e-mail users dutifully forwarded an e-mail warning people not to open any message with the phrase “Good Times” in the subject line.
The missive, which warns of a virus with the power to erase a recipient’s hard drive, demonstrates the self-replicating power of e-mail virus hoaxes that continue to circulate in different forms today.Slide12
History cont’d
1995: Microsoft Corp. released Windows 95 – Anti-Virus companies worry that the operating system will be resistant to viruses.
Later that year, evolved “macro” viruses started appearing to be able to corrupt the new Windows system
1997:
Kapersky
Lab was founded by Natalia and Eugene
KapserskySlide13
History cont’d
2000: The
"I Love You" virus infects millions of computers virtually overnight, using a method similar to the Melissa virus. The virus also sends passwords and usernames stored on infected computers back to the virus's author.
Authorities traced
the virus to a young Filipino computer student who
got away
free because the Philippines
had
no laws against hacking and spreading computer viruses.
This
spurs the creation of the
European Union's global Cybercrime Treaty.Slide14
Questions?Slide15
Sources
http://
www.whitehouse.gov/cybersecurity
http://www.washingtonpost.com/wp-dyn/articles/A50636-2002Jun26.html
www.merriam-webster.com/dictionary/cybersecurity