Week 11B - Week11,LectureB: InformationSecurity...

Info iconThis preview shows pages 1–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Week 11, Lecture B:  Information Security Dr. Brian Detlor Associate Professor, Information Systems DeGroote School of Business, McMaster University [email protected]   Commerce 2KA3 – Winter 2010
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security What’s the difference between security and  privacy? Glass Barrier
Background image of page 2
Security Breaches IT can be used to capture or access  information o Key logger (key trapper) software  – a program that,  when installed on a computer, records every keystroke  and mouse click o Hardware key logger  – hardware device that captures  keystrokes moving between keyboard and  motherboard  o Screen capture programs  – capture screen from  video card o E-mail  is stored on many computers as it travels from  sender to recipient
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security Breaches Email is stored on many computers
Background image of page 4
Identity Theft What is it? o The forging of someone’s identity for the purpose of  fraud Percentage Breakdown of Identity Theft by Age Demographic
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Identity Theft Phishing o A technique to gain personal information for the  purpose of identity theft, usually by means of  fraudulent e-mail NEVER reply without question to an e-mail asking for  personal information. NEVER click directly on a Web site provided in such an e- mail.
Background image of page 6
Identity Theft Pharming o Rerouting your request to a legitimate Web site by  sending it to a slightly different Web address, or by  redirecting you after you are already on the legitimate  site. Pharming is accomplished by gaining access to the giant  databases that Internet providers use to route Web traffic.  It often works because it’s hard to spot the tiny difference  in the Web site address.
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Identity Theft Not just about IT o Identities can be stolen just as easily with non-IT  methods Dumpster diving Physical postal mail Faxes Waiters/Waitresses o However, IT has certainly made ID Theft much easier  for criminals to conduct such activity
Background image of page 8
Security and Inside Threats Attacks on information and computer  resources come from both inside and outside  the company o In general, employee misconduct is more costly than  assaults from the outside!
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Security and Inside Threats
Background image of page 10
Security and Outside Threats Hackers o Knowledgeable computer users who use their  knowledge to invade other people’s computers o Various types (see pg. 283) White-hat hackers (Hackers for hire, work for big companies) Black-hat hackers Hactivists (Hackers that are social activists to send their message) Script kiddies / script bunnies (Hackers in training) Crackers (Hackers with criminal intent) Cyberterrorists (infiltrate government info systems, city systems)
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/21/2010 for the course COMM 2ka3 taught by Professor Detlor during the Winter '10 term at McMaster University.

Page1 / 41

Week 11B - Week11,LectureB: InformationSecurity...

This preview shows document pages 1 - 12. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online