mis - Outline Internet Security Definition How We Connect...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon
Outline • Internet Security Definition • How We Connect to the Net • Why Use the Net • Needs, Risks, Issues Analysis • Solutions / Options
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet Security Definition
Background image of page 2
Internet Security Definition • Protection of: Information Systems Networks • Against threats to: Confidentiality Integrity Availability ATT Strategy DSL Cable Corporate School
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
How We Connect • Dial - Up • DSL - High Speed • Cable Modem - High Speed • LAN - High Speed • Wireless - High Speed ( Exponential Growth ) – Wireless Router – Cell Phone – PDA – Hot Spots – Etc.
Background image of page 4
• Online banking and shopping • Research • E-mail • Instant messaging • E-bay! • Newsgroups – Music – Video – MySpace, etc.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Internet Security Threats, Needs, Issues Analysis
Background image of page 6
The Importance of Security • Protect your privacy – Prevent information from becoming public • Protect your information assets – Business plans, “term papers” • Insure against information loss – Web site defacements, data corruption
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Misconceptions “Hackers” won’t be interested in me – Break into systems / networks, for malicious purposes You ARE a potential TARGET I have a firewall, I’m protected – It must also be correctly set-up and monitored – You must be using “Virus Protection” – You must be using “Encryption” I’ll worry about security later – Once you become a VICTIM ( Identity theft, crashed PC it will be TOO LATE ! There is no such thing as perfect security
Background image of page 8
Internet User Info How Secure Is Your Internet? 86% Surveyed = Personal Info On PC 66% Lack Firewalls 67% Lack Anti-Virus 97% Lack Parental Controls 90% Hot-Spot Users-NO defense *Source - National Cyber Security Alliance – Broadband Gartner Group
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Warfare Attacks Arsenal Trojans Virus Protection Software Data corruption Backup Devices Unwanted Content Filters Firewalls Denial of Service Hackers Data interception/theft Encryption
Background image of page 10
“Intrusion” Categorgies • Email spam • Pop-up browser windows • Persistent browser windows • Aggressive applications • Footprinting • Port scanning • Enumeration • War dialing • Viruses • Worms • Trojan Horses • Logic Bombs • Denial of Service • Web defacement • Session hijacking • Eavesdropping • “Phishing” Annoyances Reconnaissance Attack Types
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Some Common Terms Vulnerability – Application flaw allowing hacker to gain system entry Exploit – Method of gaining entry to a vulnerable system Virus Computer code that can cause damage when run
Background image of page 12
Image of page 13
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 04/10/2008 for the course MIS 311F taught by Professor Cleveland during the Spring '07 term at University of Texas at Austin.

Page1 / 38

mis - Outline Internet Security Definition How We Connect...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online