ICS 392 Ch7 - Source http/www.ic3.gov Source...

Info iconThis preview shows pages 1–17. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 7 Randall Arakawa DePaul University ICS 392 Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Computer Crime Mail Fraud Romance Fraud Adoption Fraud Pet Scams Phishing/Pharming Source: http://www.fbi.gov
Background image of page 2
Computer Fraud An Ohio man was sentenced to 37 months in prison. 1,187 customers $964,560 Source: http://www.fbi.gov Not the Actual Criminal
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Computer Fraud 3 men Southern District of Florida pled guilty to mail fraud. Set up lines of credit with suppliers Ordered high-end consumer electronics Sold on eBay $2,000,000 Source: http://www.fbi.gov
Background image of page 4
2007 Internet Crime Report Internet Crime Complaint Center (IC3) Perpetrators were predominantly male (75.8%) Electronic mail (e-mail) (73.6%) and web pages (32.7%) Source: http://www.ic3.gov
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 6
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 8
Background image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 10
Background image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 12
Background image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 14
Background image of page 15

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Background image of page 16
Background image of page 17
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Source: http://www.ic3.gov Source: http://www.ic3.gov Source: http://www.ic3.gov Source: http://www.ic3.gov Connecting to the Web Network I’m Mean! Privacy Basics Access control Authentication Data privacy and integrity Firewall Network ?#@$% Firewall Methods Packet filtering Proxy service Stateful inspection Firewall Filtering Based on IP Domain names Type of transmission Key words/Content Firewall Protection Viruses/Worms Remote Access Spam Denial of Service Other Concerns Content Security Digital Certificates Secure Socket Layer Chapter 7 Randall Arakawa DePaul University ICS 392 Security...
View Full Document

{[ snackBarMessage ]}

Page1 / 17

ICS 392 Ch7 - Source http/www.ic3.gov Source...

This preview shows document pages 1 - 17. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online