150 likes | 350 Views
Cyber Security. Sadia Ahmad Jeffrey Au Onika Emanuel March 27, 2012. What Is It?. Definition: “Measures taken to protect a computer or a computer system against unauthorized access or attack Also known as: Information Security Attacks include (but not limited to): Viruses Hacks
E N D
Cyber Security Sadia Ahmad Jeffrey Au Onika Emanuel March 27, 2012
What Is It? • Definition: “Measures taken to protect a computer or a computer system against unauthorized access or attack • Also known as: Information Security • Attacks include (but not limited to): • Viruses • Hacks • Identity theft
Why Is It Important? • President Barack Obama declared that the “cyber threat is one of the most serious economic and national security challenges we face as a nation” and that “America’s prosperity in the 21st century will depend on cyber security.” • In 2010, Obama declared an investment of $13 million toward a strategy for cyber security
How You Can Protect Yourself • Install Anti-Virus software to protect yourself from crippling bugs • Norton, Kapersky, Trend-Micro, and Webroot • Report anything suspicious to siteowners • Siteowners have the right to kick suspicious users off their websites • Don’t store personal information on websites • Phone numbers, addresses, social security numbers, credit card numbers
How to Protect cont’d • Do not talk to strangers online • Not everyone is who they claim to be online • Never give your information over the phone • Some telemarketing companies don’t admit when they plan on selling your information to websites • Never reply to emails that look suspicious • They may be scams from people asking for money – i.eemails that say you’ve won money
How to Protect cont’d • Never give out your password • Never use the same password for your computer, phones, credit/debit cards, etc. • Change your password regularly • Change your password if you have had unwanted access • Upgrade your software on your computer regularly • Enable the firewall on your computer
How to Protect cont’d • Monitor your online presence • Check your accounts for any suspicious activity • Turn off your Bluetooth on your phone • Computer hackers may find a way to use it • Don’t log onto Wi-Fi hotspots unless you know that it is secure • If you see an advertisement with outrageously low selling prices, they are generally untrue
How to Protect cont’d • Think twice before clicking on a link • It might not be secured or what you think it might be • Never save your personal information on a public computer • You never know who might be on the computer after you
History of Cyber Security • 1983: The FBI tracks down the “414s” • The “414s” were a group of young hackers who broke into several U.S. government networks, often only using an Apple II+ computer and modem • 1983: Fred Cohen (USC) coins the term “computer virus” • A computer program that can “affect other computer programs by modifying them in such a way as to include a possibly evolved copy of itself”
History cont’d • 1986: One of the first PC viruses ever created was released by programmers in Pakistan • This virus was named “The Brain” • 1991: Phillip Zimmerman released “Pretty Good Privacy,” a free, powerful data-encryption tool • The U.S. government began a three-year criminal investigation on Zimmerman, alleging he broke U.S. encryption laws after his program spread rapidly around the globe (The government later dropped the charges).
History cont’d • 1991: Symantec released Norton Anti-Virus software • 1994: Inexperienced e-mail users dutifully forwarded an e-mail warning people not to open any message with the phrase “Good Times” in the subject line. • The missive, which warns of a virus with the power to erase a recipient’s hard drive, demonstrates the self-replicating power of e-mail virus hoaxes that continue to circulate in different forms today.
History cont’d • 1995: Microsoft Corp. released Windows 95 – Anti-Virus companies worry that the operating system will be resistant to viruses. • Later that year, evolved “macro” viruses started appearing to be able to corrupt the new Windows system • 1997: Kapersky Lab was founded by Natalia and Eugene Kapsersky
History cont’d • 2000: The "I Love You" virus infects millions of computers virtually overnight, using a method similar to the Melissa virus. The virus also sends passwords and usernames stored on infected computers back to the virus's author. • Authorities traced the virus to a young Filipino computer student who got away free because the Philippines had no laws against hacking and spreading computer viruses. • This spurs the creation of the European Union's global Cybercrime Treaty.
Sources • http://www.whitehouse.gov/cybersecurity • http://www.washingtonpost.com/wp-dyn/articles/A50636-2002Jun26.html • www.merriam-webster.com/dictionary/cybersecurity