Network and Internet Security
Why Be Concerned About Network and Internet Security?
2
down a Web server)
the precautions that can be taken
Unauthorized Access and Unauthorized Use
3
resource without permission
business or school
Unauthorized Access and Unauthorized Use
4
system
– Many wireless networks are left unsecured
access and use without authorization
Unauthorized Access and Unauthorized Use
5
hacker’s current location without authorization
intercepted using software designed for that purpose
Protecting Against Unauthorized Access and Unauthorized Use
6
company databases, and Web site accounts
system is an authorized user
Protecting Against Unauthorized Access and Unauthorized Use
10
Protecting Against Unauthorized Access and Unauthorized Use
8
Protecting Against Unauthorized Access and Unauthorized Use
9
remember (birthplace, pet names, etc.)
Protecting Against Unauthorized Access and Unauthorized Use
10
Protecting Against Unauthorized Access and Unauthorized Use
11
possession to identify that individual
Protecting Against Unauthorized Access and Unauthorized Use
12
individual
characteristic
in a database
Protecting Against Unauthorized Access and Unauthorized Use
13
enforcement, etc.
Protecting Against Unauthorized Access and Unauthorized Use
14
Protecting Against Unauthorized Access and Unauthorized Use
15
be secured
– Can hide network name (SSID)
Protecting Against Unauthorized Access and Unauthorized Use
16
How It Works Box
Securing a Wireless Home Router
screen
access password
20
Protecting Against Unauthorized Access and Unauthorized Use
18
Internet) and outgoing (to the Internet) traffic
Protecting Against Unauthorized Access and Unauthorized Use
19
Protecting Against Unauthorized Access and Unauthorized Use
20
block it
them unreadable if intercepted
Protecting Against Unauthorized Access and Unauthorized Use
21
Protecting Against Unauthorized Access and Unauthorized Use
22
Protecting Against Unauthorized Access and Unauthorized Use
23
Protecting Against Unauthorized Access and Unauthorized Use
24
network via the Internet
geographical area
networks via the Internet
Protecting Against Unauthorized Access and Unauthorized Use
25
– Individuals should take additional precautions when using public hotspots in addition to using security software, secure Web pages, VPNs, and file encryption
Protecting Against Unauthorized Access and Unauthorized Use
26
Protecting Against Unauthorized Access and Unauthorized Use
30
Inside the Industry Box
28
Securing BYOD
Computer Sabotage
29
resource
Computer Sabotage
30
deleting files, erasing drives, etc.)
Computer Sabotage
31
messages (games, videos, music files)
copies of itself to other computers via a network
Computer Sabotage
32
Computer Sabotage
33
as something else
downloaded and installed
Computer Sabotage
34
attack
Computer Sabotage
35
Computer Sabotage
40
system in order to delete/change data or modify programs
deleting or changing corporate data
contents (Facebook pages, Twitter tweets, etc.)
Protecting Against Computer Sabotage
37
computer against a variety of threats
other types of malware
Protecting Against Computer Sabotage
38
malware protection to their subscribers
Protecting Against Computer Sabotage
39
Trend Box
40
Beyond Fingerprint Readers—Digital Tattoos and More
winking at it
secure Web sites
are swallowed
Online Theft, Online Fraud, and Other Dot Cons
41
Online Theft, Online Fraud, and Other Dot Cons
42
spyware, etc.
Online Theft, Online Fraud, and Other Dot Cons
43
Online Theft, Online Fraud, and Other Dot Cons
44
numbers and other personal data
individuals
Online Theft, Online Fraud, and Other Dot Cons
50
Online Theft, Online Fraud, and Other Dot Cons
46
information
Online Theft, Online Fraud, and Other Dot Cons
47
is never delivered or the item is not as specified
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
48
check for accounts listed in your name
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
Web site—always type the URL in the browser instead
warn you of potential phishing sites
additional step in their logon process
49
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
50
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
51
Technology and You Box
52
Online Financial Alerts
for account activity
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
53
identity of a person or organization
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
54
message or document
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
60
Protecting Against Online Theft, Online Fraud, and Other Dot Cons
56
can be disputed if needed
Personal Safety Issues
57
via the Internet
Personal Safety Issues
58
cyberstalking, all states have made it illegal
have not been successful
Protecting Against Cyberbullying, Cyberstalking, and Other Personal Safety Concerns
59
online dire
Network and Internet Security Legislation
60
Thank You