Security on Computers and networks,
and risks that go along with them
Computer Espionage, Information
Warfare, and Cyber Storm
Protecting computer systems and
“The Curious Case of Internet
As our entire economy and infrastructure
move to networked computer systems,
breaches of computer security can be
costly, even without any actual damage
Estimated that security currently accounts
20 percent of all corporate
expenditures on computer systems.
Computer Security Risks
send their traffic across
shared space, and since no one owns the
space the data travels the opportunity for
interference from others is great.
a process where an individual
drives around with a wireless device to look for
wireless networks, and hackers will look for
unsecured networks to hack into to obtain
Security Methods for Wireless
version of WPA)
Earliest of the 3, several well
weaknesses, may be only option on
Developed to provide a stronger
level of security
Uses Advanced Encryption
Standards to provide government
The Unauthorized access of
corporate information, usually
to the benefit of a competitor,
is sharply on the rise.
The offenders are often ex
employees hired by a
competing firm due to their
knowledge of the computer
One estimate puts 80 percent
of all data loss at corporations
due to company insiders
The use of technology to corrupt or destroy an
enemy’s information and infrastructure.
According to an expert, a coordinated attack of just 100
key computer installations could bring the U.S.
economy to a complete halt.
April 2009, the Pentagon issued a statement placing a
cost of cyber
defense for just a 6
month period at $100
million, mostly the cost of cleaning up after attacks.
attack on the country of Estonia brought
the country to basically a technological halt for several
weeks, with the focused on disrupting commerce and
communications in the country.
Coordinated every 2 years
by the U.S. Computer
Cyber Storm 2(2008):
Involved 18 government
agencies, 5 countries, 9
states, 40 companies, and
10 analysis centers.
Simulated attack on
the Internet, and control
systems in the United States
Protecting Computer Systems
cards, badges, etc. to restrict access to
physical trait or characteristic to identify
an individual and grant access.
A computer program or device
used to severely limit the ability of
outsiders to access internal data.
Refers to a coding or scrambling process
that renders a message unreadable by
anyone except the intended recipient.
Has been around for a long time in many
different situations, not just on computers
Same idea as in the video is used today
in technology, just much more complex
Some of the decipher keys used by
banks and the military are so complex it
would take several hundred years by
supercomputers to discover the key
Public Key Encryption
Considered a great scientific achievement of the
It is a computer security process in which two
different keys are used
an encryption (public) key
and a decryption (private) key. The use of 2
different keys safeguards data and provides
The Curious Case of Internet Privacy
In this article the author talks about how people
everyday willingly give up private information
about themselves to companies/websites in order
to gain access to services.
Companies will take your information that they
obtain for next to nothing and either use that
information to make a profit, or sell off your info to
another company that wants to buy it
Why do we seem to value privacy so little?
it's because we are told to.
People don’t realize what is actually
What we agree to
participate in on the Internet isn't a
negotiated trade, but really a one
Trying to preserve privacy
Four possible mechanisms:
…and we’ve been pretty terrible at all of
them so far.
Norms = wagging your finger at a child for being
bad, doesn’t work.
Law = users can instruct their browsers to transmit
a tag that says, “do not track”, but can’t be sure it
works since there’s nothing to see if it’s working.
Code = Can turn cookies completely off or on, not
always the best way to search the web either way.
Markets = Started making an impact with Mozilla
Many risks today with most of the world turning
toward computers for everything.
Companies and even countries are going after
each other for secrets off of each other’s
networks…not just some person going for your
attacks are becoming more prevalent,
which means everyone needs to get better
Newer ideas are being used to protect technology
Encryption is constantly becoming more common,
yet more complex.
People today are too lax with their personal
privacy, and steps are being made to protect