300 likes | 448 Views
Introduction. IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Rebecca Flynn. Title of presentation. Here are the topics that we will cover – Edel – Cybercrime Rebecca- Patrick- Encryption.
E N D
Introduction IT Tralee Republic of Ireland Speakers – Edel Walsh Patrick O’ Mahony Rebecca Flynn
Title of presentation • Here are the topics that we will cover – • Edel – Cybercrime • Rebecca- • Patrick- Encryption
IT Tralee • Firstly we will tell you a little about our college and Tralee itself.
IT Tralee • The Institute of Technology, Tralee, has been to the forefront of learning since its establishment and has gained a reputation as a centre of distinction for teaching, learning and research. • The Institute offers a range of full-time and part-time programmes ranging from certificate through to honours degree and post-graduate Masters and Doctoral level. Enhancing the taught programmes at the Institute is a world class programme of research.
Tralee • Tralee is the county town of County Kerry, in the south west corner of Ireland. The name Tralee comes from the Irish 'Trá Lí', or 'Trá Laoi', which means 'strand of the Lee' (river)
Tralee • Tralee is the largest town in Kerry. The town's population including suburbs was 22,744 in the 2006 census.
Tourism • Tralee is a major tourism destination and has seen some €55 million of tourism investment over the past several years. The town has developed a range of quality all weather visitor attractions. Tralee is also famous for the Rose of Tralee International Festival which is held annually in August.
Sport • Tralee & Kerry has a strong sporting tradition and has a number of successful Gaelic Football Clubs and also a strong interest in Basketball.
Education • In common with all parts of Ireland, most schools at all levels in Tralee are managed and owned by the churches. At secondary level most schools are explicitly Roman Catholic in ethos, except Gaelcholáiste Chiarraí, Tobar Mhaigh Dor.
Cybercrime By Edel Walsh
What is cyber crime When a computer or network is a tool of the criminal • Examples include: • Spamming • Unauthorized access • Malicious code • Denial-of-service attacks • Etc
Another way to define cybercrime is simply as criminal activity involving the information technology infrastructure, which include: • illegal access • Illegal interception • Data interference • Systems inference • Misuse of devices • Forgery • Electronic fraud
Research in 2006 • Every 10 seconds in Britain • 3.24 million times • 90% of crimes stay unreported
Shirley McGuirea specialist in psychology of the University of San Francisco performed a study on 4800 students who hack and invade computer systems.
The study revealed that only 1 out of 10 hackers were interested in causing certain harm or earning money. Most teenagers performed illegal computer actions of curiosity, to experience excitement.
The love-bug virus Thursday, 4 May, 2000 • It crippled government and business computers in Asia and Europe • American State Department and the CIA, and major companies like Ford and Time-Warner. • first appeared in Hong Kong in the late afternoon • Analysts estimate hundreds of millions of dollars of damage has been caused in the US • 1.27 million computer files were infected worldwide
The Love Bug e-mail appeared on computer screens in both houses of Congress in Washington and at the Pentagon. • It spread at great speed. One DJ in Texas received the e-mail virus 1,500 times.
The FBI have opened a criminal investigation. Reports suggest the virus may have originated in the Philippines. ISP Sky Internet Inc. in the Philippines are reported by ZDNet News to be hunting for a code writer who signed the virus code "Spyder, Manila, Philippines" and added the comment: "I hate go to school."
Encryption By Patrick O’ Mahony
Encryption • The Internet has grown at an incredibly fast rate and has excited both consumers and businesses with promises of changing the way we live and work. Lets be honest, there is a lot of information that we would not like other people to see, such as: • Bank Account Details • Credit Card Information • Social Security Number • Personal E-Mails • Employee or Business Records
Encryption • E-Business relies on the ability to send and receive information securely. • Internet and computer security comes in a variety of methods but the most popular effective ones all rely on encryption. This process encodes information in such a way that only the person or computer with the “Key” can decode it.
Encryption • Encryption is based on the ancient science of cryptography.
Encryption • Computer encryption systems are divided into two categories: • Public-Key Encryption • Symmetric-Key Encryption
Encryption • Public-Key Encryption –
Encryption • Symmetric-Key Encryption –
Encryption • Authentication – • This process works in tandem with encryption to create a secure environment on your computer. There are several ways to authenticate a person or their information on a computer – • Passwords • Digital Signatures • Biometrics
Encryption • Biometrics uses biological information to verify the user’s identity. Some methods of Biometrics are : • Voice Identification • Face Scan • Retina Scan • Fingerprint Scan
Encryption • Some good links – • www.entrust.com • www.pgp.com • www.ssh.fi/tech/crypto/intro.html • www.tatanka.com • www.elock.com • www.qmw.ac.uk