Chapter 12 Information Security - PowerPoint PPT Presentation

1 / 32
About This Presentation
Title:

Chapter 12 Information Security

Description:

?????????????????????????? (Virus Scan)??? Anti-virus. ?????????????????? Email ???????????????? ... Virus Scan and Anti-virus software. Virus-Alert by Norton ... – PowerPoint PPT presentation

Number of Views:37
Avg rating:3.0/5.0
Slides: 33
Provided by: mkpayap
Category:

less

Transcript and Presenter's Notes

Title: Chapter 12 Information Security


1
Chapter 12 Information Security
  • By
  • Kulachatr Chatrakul Na Ayudhya

2
Objectives
  • ??????????????????????????????????????????????????
    ????????????
  • ??????????????????????????????????????????
    ?????????????????????????????
  • Reference and Guide Book
  • ????? ?????????????? ????????????????????????
    ????????????????????
  • Whitman , Mattord Principle of Information
    Security , Boston Thomson , 2003
  • (ISBN 0-619-06318-1)
  • ??????,?????? ??????,????? ????????????????????
    ?????? , ???????
  • ????????? ???????????? ?????????? ,
    2545. (ISBN 974-883-120-5)

3
Information Security
  • The protection of information and the systems
    and hardware that use ,store ,and transit that
    information. But to protect the information and
    its related systems from danger, such tools as
    policy, awareness ,training and education, and
    technology are necessary.
  • ??????????????????????????????????????????????
    ??????????????? ??????????????????????????????????
    ?????????????????????? ?????????? ????????
    ??????? ??????????????????????????????????????
    (Whitman , Mattord p. 9-10)

4
??????????????????????????????????????????????
  • Centralization of Information
  • (????????????????????????????????)
  • Increase of networks (From many Server to many
    Clients)
  • (???????????????????????????????????????)
  • Related benefit from many of threat
  • (?????????????????????????????????????????)

5
???????????????????????????????????????????
  • External Environment
  • Natural Disaster , Fraud , Theft or Robbery
  • Internal Environment
  • Hardware failure (???????????????????????
    ?????????????)
  • Software failure (?????????? ???????????????)
  • Penetration of database (??????????????)
  • Terminal sites or clients (?????? Password
    ??????????????????????)
  • Personal (????????????????????????)

6
External Environment
  • Natural Disaster
  • Terrorist and war
  • Fraud
  • Hacker
  • Crime ,Theft or Robbery

7
Internal Environment Personal
  • Computer user or Administration team
  • Database Manager
  • Operator
  • System Administrator
  • System Programmer
  • Application Programmer

8
????????????????????????????????????????
  • ?????????????????????????
  • ????????????????????????????????????? (Theft)
  • ????????????? (Sabotage)
  • ????????????????????????????
  • Accident ???? ???????? ???????????? ??????
  • Natural Disaster ????????????????????
  • Terrorist or War ???????????????????????????
  • Human Error ????????? ?????? ????????????????????
    ?????????????????????????? ??????????????

9
Major types of IS Security problem
  • Human Carelessness
  • ?????????????????
  • ????????????
  • ??????????????????????
  • ???????????????????????
  • Computer Crime
  • ????????????
  • ?????????? (????)
  • ??????????????
  • ??????????????
  • ?????????????
  • Natural Disaster or Accidental and Political
    Effect
  • ?????????????????
  • ?????????? ??????? ????
  • ?????? ???????
  • Hardware/Software Failures
  • ???????????????????
  • ??????????????????????????
  • ????????????
  • ???????????????????

10
Computer Crime
  • ???????????????????? ??????? ?????????????????????
    IT ??????????????????????????????????????????????
    ????????
  • ???????????????????? ?? 4 ?????? ??????
  • ???????????????????????????? (Sabotage)
  • ????????????? (Theft of Services)
  • ???????????????? (Property Crime)
  • ?????????????????????? (Financial Crime)

11
Sabotage
  • ??????????????????????
  • (Physical Destroying)
  • ????????????????????? ???? ????????????? (Virus)
    ???????? ????????????????????????????? ????
    ??????????????? (Worm)
  • Trojan horse Technique
  • Logic Bomb
  • Trapdoors Routines
  • Hacking
  • Computer Virus/Worm

12
Worm
  • ??????????????? ??????????????????
    ??????????????????????????????????????????????????
    ??????????????????????????????????????????????????
    ??????????????? Execute File ?????????????????????
    ??????????????????????????????????????????
    ?????????????????? ??????????????????????????????
  • Worm ?????????????????????
  • W32.Sasser.worm
  • W32.Spybot.worm
  • W32.Blaster.worm
  • W32.Netsky.B_at_mm
  • W32/Mydoom_at_mm

13
Teenager arrested in 'Blaster' Internet attack
  • An 18-year-old high school student suspected of
    creating a version of the virulent "Blaster"
    Internet attack was described by a neighbor
    Friday as "a computer genius," but not a
    criminal.

14
Sven Jaschan Load of the Worm
Sven Jaschan
  • Lord of the worm ?????????????????? 18 ??
    ???????????????????????????? Netsky ??? Sasser
    ??????????

15
???????????????????? Virus / Worm
  • ??????????????????????????????????????????????????
    ??????
  • ?????? Download ?????? www.thaicert.nectec.or.th
    ,
  • http//it.dusit.ac.th/symantec-removabletools.php
  • http//it.science.cmu.ac.th/Antivirus/
  • ??????????????????????????????????????????????????
    ??? ???? ???????????????
  • ?????????? Firewall
  • ?????????????????????????? (Virus Scan)???
    Anti-virus
  • ?????????????????? Email ????????????????
  • ?????????????????????????? (??????????????????????
    ??????????????????????)
  • ????????????????????????? Hard Disc

16
Virus Scan and Anti-virus software
17
Virus-Alert by Norton anti-virus
File ??? Infected
18
Virus Scan by Norton anti-virus
W32.Spybot.Worm
19
System Warning NOD32 anti-virus
20
Firewall
21
Configuration
22
Configuration Star
23
Configuration Wireless
24
Thief of Services
  • ????????????????????????????????????????????????
  • ????????????????????????????????????
  • ??????????????????????????????????????? (Hacking)
  • ??????????????????
  • ??????????????????? (Copying)
  • ????????????? (Shoulder surfing or Window)
  • ??????????????????????????????
  • ??????????????? (Wiring Trapping)
  • ??????????????????????????????????????
  • ???????????????????????????????
    ????????????????????????????????????
    ?????????????????????????????????????????

25
Hacker Behavior
  • Hacker ????????????????????? ?????????????????????
    ??????????????????????? Password
    ??????????????????????? ???????????????
  • ???????????????????????? Hacker
  • ???????????????????? ??????????? ????????
  • ??????????????????????? ??????? ????? ?????????
  • ????????????????????? (Denied of Service)
    ??????????
  • ???????????????????? ???? ??????????
    ???????????????? (Trojan)

26
Hacker Attacking (???????????????????????)
  • Shoulder Surfing
  • User Un-logout
  • Trojan Horse Technique
  • Brute Force Technique
  • (Guess password)
  • Dictionary Attack
  • Mail Bombing
  • Social Engineer
  • Timing Attack
  • (Create malicious from cookies)
  • Cryptographic technique
  • ??????????????? Hacker
  • ??????????? Firewall
  • ????????????????????????????????
  • ??????????????????????????????????????
  • ??????????? (Port) ????? ????????? (???? Internet
    port 80 ?????????? firewall)

27
Protect from Hacker
28
Property Crime
  • ????????????????????????? Hardware ???
    accessories ????? ???????????????????????
  • ??????????????
  • Physical Security
  • ???????????????????????????????????????????????
    ??????????????????????????????
    ???????????????????????????????????????
  • ???????????????????????????????
    ???????????????????????????
  • Security Policy
  • ?????????????????? ??????????????????????????????
    ??????? ????????????????????????????????
    ???????????????????????????????

29
Financial Crime
  • ???????????????????????????????????????????????
  • ??????????????????????????????????????????????????
    ?????
  • ?????????????? ?/? ??????
  • ???????????????????????????
  • ????????????????????????????????????????? ?/?
    ?????
  • ??????????????????????????????????????????????????
    ??
  • ??????????????????????????????????
  • ???????????????????????????????????????????
  • ??????????????????????????????????????-ATM
  • ?????????????????????????

30
??????????????????????????????
  • ?????????????????????????????
  • ??????????????????????????????? IT
    ???/????????????????
  • ?????????????????????????????? IT
    ??????????????????????
  • ??????????????????????????????????????????????????
    ??
  • ??????????????????????????????????????????????????
    ?????
  • ???????????????????????????????????????????
  • ????? Password ????????????????????????
    ?????????????????????????????
  • ????????????????????????? ????????????????????????
    ????
  • ???????????????????????????????????????????
    ?????????????????????

31
??????????????????????????????
  • ??????????????????????????????????????????????????
    ????????????????????
  • ??????????????????????????????????????????????????
    ??? ??????????????????????????????????????????????
    ???????????????
  • ??????????????????????????????????????????????????
    ??????????????????????????????????????????????????
    ???????????????????????? ?????????????????????????
    ????????????????????
  • ?????????????????????????????????????????
    ??????????????????????????????????????????????????
    ????????????????

32
End of Chapter
  • Aj-Kulachatr
  • Chatrakul Na Ayudhya
  • Thank You
Write a Comment
User Comments (0)
About PowerShow.com