Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect...
-
Upload
homer-austin -
Category
Documents
-
view
213 -
download
0
Transcript of Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect...
![Page 1: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/1.jpg)
Tutorial
Chapter 5
![Page 2: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/2.jpg)
2
Question 1:
What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
![Page 3: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/3.jpg)
3
Answer: Adware: collects info about users to determine what
adverts to display in browser Phishing: sending fraudulent e-mails to direct recipients
to false web-sites to capture private info keystroke loggers: monitor and record keystrokes to
collect credit card numbers while doing online shopping Sniffing: capturing and recording network traffic to
intercept information Spoofing: attempt to gain access to a network by posing
as an authorized user to find sensitive information.
![Page 4: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/4.jpg)
4
Question 2:
What are the three dimensions of the CIA triangle used to design a security system?
![Page 5: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/5.jpg)
5
Answer:
C- Confidentiality,
I- integrity, and
A- availability
![Page 6: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/6.jpg)
6
Question 3:
Give two examples of intentional threats to network security.
![Page 7: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/7.jpg)
7
Answer:
Hacker attacks and Attacks by disgruntled employees—
spreading a virus or a worm on the company network.
![Page 8: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/8.jpg)
8
Question 4:
1. Give four examples of biometric security.
2. Which one is the most effective?
![Page 9: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/9.jpg)
9
Answer:
Facial recognition, fingerprints, hand geometry, and Iris analysis.
Iris analysis is probably most effective.
![Page 10: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/10.jpg)
10
Question 5:
What two types of encryption were introduced in this chapter?
![Page 11: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/11.jpg)
11
Answer:
Asymmetric (also called public key encryption) and
symmetric.
![Page 12: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/12.jpg)
12
Question 6:
What is business continuity planning? Why is it used?
![Page 13: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/13.jpg)
13
Answer:
Outline procedures for keeping an organization operational in the event of a natural disaster or network attack.
To lessen the effects of a natural disaster or a network attack or intrusion.
![Page 14: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/14.jpg)
14
Question 7:
Assume you have been asked to put together a security policy for your local bank: Outline your top five recommendations to the
bank. What are some of the risks to online banking? How can the security and privacy of online
banking be improved?
![Page 15: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/15.jpg)
15
Answer 1: Developing clear, detailed security policy and
procedures Providing security training and security
awareness for key decision makers and computer users
Periodically assessing the security policy’s effectiveness
Developing an audit procedure for system access and use
![Page 16: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/16.jpg)
16
Cont:
Overseeing enforcement of the security policy
AND: designing an audit trail procedure for incoming and outgoing data.
![Page 17: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/17.jpg)
17
Answer 2:
Confidentiality: information can be accessed by other than sender or recipient
Authentication: how can the recipient be sure that the data is actually from the sender
Integrity: How can the recipient know that the contents have not be changed during transmission
Nonrepudiation: the sender can denied sending the data The receiver can denied having received the data
![Page 18: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/18.jpg)
18
Answer 3:
Authentication: Is important because the person logging in isn’t
necessarily the account holder What the receiver knows to be accurate, and what
the sender is providing: mother’s maiden name, ID, DOB
Confirmation: Verifying transaction, usually a digital signed
confirmation with a private key
![Page 19: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/19.jpg)
19
Cont:
Non-repudiation Dispute over the transaction. Digital signatures
are used to bind the two partners. The customer receives a proof of deposit/
withdrawal, and bank is assured of client’s identity.
![Page 20: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/20.jpg)
20
True/False?
A firewall is a combination of hardware and software that acts as a filter or barrier between a private network and external computers or networks, including the Internet.
A Trojan program consists of self-propagating program code that is triggered by a specified time or event
![Page 21: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/21.jpg)
21
Selection:
14.
15.
![Page 22: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/22.jpg)
22
Case Study 1: what is it about?
Destroyed files and stole passwords Around the world in 2 hours; 3 times faster
than Melissa virus NASA and CIA Damages Tracing Cybercrime
![Page 23: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/23.jpg)
23
Questions:
Calculation of costs? Laws for prosecuting hackers? How can organizations guard against
virusses?
![Page 24: Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?](https://reader034.fdocuments.in/reader034/viewer/2022051820/56649e545503460f94b4a8a3/html5/thumbnails/24.jpg)
24
Homework:
Case Study 2