Professional Documents
Culture Documents
Cyber Crime
Cyber Crime
What is Cybercrime?
Using the Internet to commit a crime.
Identity Theft Hacking
Viruses
Stealing information
Child Pornography
Cybercrime Components
Computers
Cell Phones PDAs Game Consoles
Kwame Kilpatrick
Cell phone text messages
Computer Security
Confidentiality
Only those authorized to view information
Integrity
Information is correct and hasnt been altered by
Availability
Data is accessible to authorized users
Computer Security
Malware
Software that has a malicious purpose Viruses Trojan horse Spyware
Intrusions
Any attempt to gain unauthorized access to a
really isnt
Ethical Hacker
Someone hired to hack a system to find
Proxy server Sits between users and server. Two main functions are to improve performance and filter requests.
Intrusion Detection Systems (IDS) Monitors network traffic for suspicious activity.
Intermediate
MSCE Security
http://www.microsoft.com/learning/en/us/certification /mcse.aspx#tab3
Professional
CISSP www.isc2.org SANS www.sans.org
http://www.emich.edu/ia/undergraduate.html