1 / 20

Lighting Up the Dark Side of the Web

This article explores the rising costs of security breaches and the drawbacks and consequences of increased user internet and email access. It also delves into the dark side of the web, covering issues such as pornography, hacking, and cyber warfare. The article emphasizes the importance of users in computer networks and offers insights on how to use the internet safely.

jmarchand
Download Presentation

Lighting Up the Dark Side of the Web

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Lighting Upthe Dark Side of the Web Colin Rose Quarter Past Five Limited Monday 11th October 2004

  2. The cost of widespread company network security breaches keeps rising…Occurrence and Average Annual Cost of a Security Attack (IDC)

  3. InformationWeek estimates: • Security breaches cost businesses $1.4 trillion worldwide this year • 2/3 of companies have experienced viruses, worms, or Trojan horses • 15% have experienced Denial of Service attacks • “60% of security breaches occur within the company – behind the firewall” (IDC)

  4. What are the drawbacks?Of increased user internet and e-mail access“Users; who would have them?” • Users do not know what to do • Users mess things up • Users are lazy • Users change things • Users are a maverick component

  5. What are the consequences?Of increased user internet and e-mail access“Users; what would you do without them?” • Users need to be told what to do(and what not to do) • Users are the main reason why you have a computer network • Users are the larger half of your information systems • Users can spot problems • Users need to be “configured”, you just need to understand how to “configure” them.

  6. Other Issues • Legal liabilities • Who is on your network -   • Sexual or racial harassment • Bad publicity and lost reputation • Improper use of the systems • Inside out and Outside in??

  7. The Dark Side of the Web Pornography Anarchy and theft Credit card fraud Telephone fraud Lock picking

  8. The Dark Side of the Web Hacking Steganography Spoofs and sucksites Virus creation Password crackers MP3 music files

  9. Cyber WarfareInternational and commercial • Denial of Service • Commercial cyber warfare • Terminate your existence in cyberspace • Puts you out of business • Easy to carry – downloadable from the web

  10. User Abuse of a Computer System You would be amazed to discover how imaginative users can be. Seeing might be believing!!

  11. People Process Technology No matter how much the technology changes, the individuals change, even how much the environment changes. There are still some things that remain the same A Word About The Future

  12. To re-cap…. The internet can be used safely, we just have to be a bit more sophisticated than we used to…

  13. Steganography Fred Smith, currently on placement, can always be found hard at work at his desk. Fred works independently, without wasting company time talking to colleagues. Fred never thinks twice about assisting fellow employees, and he always finishes given assignments on time. Often Fred takes extended measures to complete his work, sometimes skipping coffee breaks. Fred is an individual who has absolutely no vanity in spite of his high accomplishments and profound knowledge in his field. I firmly believe that Fred can be classed as a high-caliber asset, the type which cannot be dispensed with. Consequently, I duly recommend that Fred be offered permanent employment at Quarter Past Five, and a Proposal be executed as soon as possible.

  14. Steganography Fred Smith, currently on placement, can always be found wasting company time talking to colleagues. Fred never finishes given assignments on time. Often Fred takes extended breaks. Fred is an individual who has absolutely no knowledge in his field. I firmly believe that Fred can be dispensed with. Consequently, I duly recommend that Fred be Proposal be executed as soon as possible.

  15. Confidentiality • Inadvertent disclosure (MS Word) • Cached information (Hotel Phoenix) • Revelation • Phishing

  16. Virus Creation Viruses no longer require a low level understanding of computers. Increased e-mail and web use makes viruses easy to distribute. Viruses are very easy to writeVCL / Mutation Engine / etc...

More Related