SlideShare ist ein Scribd-Unternehmen logo
1 von 53
Chapter 11 Computer Security,  Ethics and Privacy
Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses,  botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
Computer Security Risks ,[object Object],p. 556 - 558 Fig. 11-1 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Computer Emergency Response Team Coordination Center below Chapter 11
Internet and Network Attacks ,[object Object],p. 558 Virus  is a potentially damaging  computer  program ,[object Object],Trojan horse   hides within  or looks like legitimate program until triggered Payload  (destructive  event) that is delivered Can spread and damage files Does not replicate itself on other computers Next
Internet and Network Attacks ,[object Object],p. 559 Fig. 11-2 Step 1.  Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a picture and attach the picture to an e-mail message. Step 2.  They use the Internet to send the e-mail message to thousands of users around the world. Step 3b.  Other users do not recognize the name of the sender of the e-mail message. These users do not open the  e-mail message - instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a.  Some users open the attachment and their computers become infected with the virus. Next
Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
Internet and Network Attacks ,[object Object],p. 560 Fig. 11-3 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 560 - 561 Fig. 11-4 ,[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Fig. 11-5 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Keeps file  in separate  area of hard disk Next Records  information  about program such  as file size and  creation  date Attempts  to remove  any detected  virus Uses  information  to detect if  virus tampers  with file Quarantines   infected  files that it  cannot  remove
Internet and Network Attacks ,[object Object],p. 562 Install a personal firewall program If the antivirus program flags an  e-mail attachment  as infected, delete  the attachment immediately Never start a computer with removable media inserted Never open an  e-mail attachment unless you are expecting it and  it is from a  trusted source Install an antivirus program on all of your computers Check all  downloaded  programs for  viruses, worms,  or Trojan horses Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Virus Hoaxes below Chapter 11
Internet and Network Attacks ,[object Object],p. 562 - 563 A  denial of service attack  is an assault which disrupts computer access to an Internet service  such as the Web or e-mail A  back door  is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing  is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network Next
Internet and Network Attacks ,[object Object],p. 563 Fig. 11-7 ,[object Object],Next
Internet and Network Attacks ,[object Object],p. 564 Fig. 11-8 ,[object Object],[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 564 - 565 Next Intrusion detection software analyzes network traffic, assesses  system vulnerabilities, and identifies  intrusions and suspicious behavior Access control defines who  can access computer and  what actions they can take Audit trail  records access attempts
Unauthorized Access and Use ,[object Object],p. 565 Fig. 11-9 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 566 Fig. 11-10 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  CAPTCHAs below Chapter 11
Unauthorized Access and Use ,[object Object],p. 566 - 567 Fig. 11-11 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 ,[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 - 568 Fig. 11-13 ,[object Object],[object Object],Next
Hardware Theft and Vandalism ,[object Object],p. 569 - 570 Fig. 11-14 ,[object Object],[object Object],[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  RTLS below Chapter 11
Software Theft ,[object Object],p. 570 Next Act of stealing or  illegally stealing software, copying  software or  intentionally  erasing  programs Software  piracy   is illegal duplication  of copyrighted software
Software Theft ,[object Object],p. 570 - 571 Fig. 11-15 ,[object Object],[object Object],Next
Software Theft ,[object Object],p. 571 Product activation  allows user to input product identification number online or by telephone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Business Software Alliance below Chapter 11
Information Theft ,[object Object],p. 572 Fig. 11-16 ,[object Object],[object Object],[object Object],[object Object],Next
Information Theft ,[object Object],p. 573 Fig. 11-17 Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  BitLocker below Chapter 11
Information Theft ,[object Object],Secure site   is Web site that uses encryption to secure data p. 573 Digital certificate  is notice that guarantees Web site is legitimate Many Web browsers  use encryption Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Certificates below Chapter 11
Information Theft ,[object Object],p. 573 Fig. 11-18 ,[object Object],[object Object],Next
Information Theft ,[object Object],p. 574 Fig. 11-19 ,[object Object],[object Object],Next
System Failure ,[object Object],p. 574  Caused by aging hardware,  natural disasters, or electrical  power disturbances Can cause loss of hardware,  software, or data Prolonged malfunction  of computer Undervoltage —drop  in electrical supply Next Overvoltage  or  power surge — significant increase  in electrical power Noise —unwanted  electrical signal
System Failure ,[object Object],p. 574 - 575 Figs. 11-20–11-21 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Uninterruptible Power Supply below Chapter 11
Backing Up — The Ultimate Safeguard ,[object Object],p. 576 Duplicate of file, program, or disk Full backup all files in computer Selective backup select which files  to back up Three-generation backup preserves  three copies of important files In case of system failure or corrupted files,  restore  files by copying to original location Next
Wireless Security ,[object Object],p. 577 Fig. 11-22 ,[object Object],[object Object],[object Object],[object Object],Next
Ethics and Society ,[object Object],p. 578 - 579 Information privacy Intellectual property rights —rights to which creators are entitled for their work Software theft Information accuracy Codes of conduct Unauthorized use of computers and networks Moral guidelines that govern use of computers and information systems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Rights Management below Chapter 11
Ethics and Society ,[object Object],p. 580 Fig. 11-25 ,[object Object],[object Object],Next
Information Privacy ,[object Object],p. 580 and 586 Legal for employers to use monitoring software programs Difficult to maintain today because data is stored online Employee monitoring  is using computers to observe employee computer use Right of individuals and companies to deny or restrict collection and use of information about them Next
Information Privacy ,[object Object],p. 581 Fill in only necessary information on rebate, warranty, and  registration forms Avoid shopping club  and buyers cards Install a cookie manager  to filter cookies Inform merchants that you  do not want them to distribute  your personal information Limit the amount of information  you provide to Web sites; fill  in only required information Clear your history file when  you are finished browsing Set up a free e-mail account;  use this e-mail address for  merchant forms Turn off file and print sharing  on your Internet connection Install a personal firewall Sign up for e-mail  filtering through your  Internet access provider or  use an antispam program,  such as Brightmail Do not reply to spam  for any reason Surf the Web anonymously  with a program such as  Freedom Web Secure or  through an anonymous  Web site such as  Anonymizer.com Next
Information Privacy ,[object Object],p. 581 - 582 Fig. 11-27 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 582 Set browser to accept cookies, prompt you to accept cookies, or disable cookies Some Web sites sell or trade information stored in your cookies Small text file on your computer that contains data about you User preferences Interests and browsing habits How regularly you visit Web sites Next
Information Privacy ,[object Object],p. 583 Fig. 11-28 Next
Information Privacy ,[object Object],p. 583 - 584 Fig. 11-29 ,[object Object],[object Object],[object Object],Next Click to view  Web Link, click Chapter 11, Click Web Link from left  navigation, then click  Spam below Chapter 11
Information Privacy ,[object Object],p. 584 E-mail filtering Anti-spam program Next Collects spam in central location  that you can  view any time Service that  blocks e-mail  messages from  designated  sources Sometimes  removes valid  e-mail messages Attempts to  remove spam
Information Privacy ,[object Object],p. 584 Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and  financial information Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 586 - 587 Fig. 11-31 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 587 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],Computer vision syndrome (CVS) —eye and vision problems p. 587 - 589 Repetitive strain injury (RSI) Computer addiction —when computer consumes entire social life Tendonitis—inflammation of tendon due to repeated motion Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-32 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-33 Next
Health Concerns of Computer Use ,[object Object],p. 589 Fig. 11-34  ,[object Object],keyboard height: 23” to 28” feet flat on floor adjustable height chair with 4 or 5 legs for stability adjustable seat elbows at 90° and arms and hands parallel to floor Next
Health Concerns of Computer Use ,[object Object],p. 590 Fig. 11-35 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Green Computing below Chapter 11
Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools,  business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues,  their preventions, and ways to  keep the environment healthy Chapter 11 Complete

Weitere ähnliche Inhalte

Was ist angesagt?

Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
Asmaa Ibrahim
 

Was ist angesagt? (20)

Firewalls
FirewallsFirewalls
Firewalls
 
Fundamental cloud security
Fundamental cloud securityFundamental cloud security
Fundamental cloud security
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Network security
Network securityNetwork security
Network security
 
Network security
Network securityNetwork security
Network security
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...Application Security | Application Security Tutorial | Cyber Security Certifi...
Application Security | Application Security Tutorial | Cyber Security Certifi...
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Cyber Security Introduction.pptx
Cyber Security Introduction.pptxCyber Security Introduction.pptx
Cyber Security Introduction.pptx
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Information security
Information securityInformation security
Information security
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Information security
Information securityInformation security
Information security
 
Data Security
Data SecurityData Security
Data Security
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Network security and protocols
Network security and protocolsNetwork security and protocols
Network security and protocols
 
Introduction IDS
Introduction IDSIntroduction IDS
Introduction IDS
 
Materi Pelatihan analisa malware
Materi Pelatihan analisa malwareMateri Pelatihan analisa malware
Materi Pelatihan analisa malware
 
Ch04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and AttacksCh04 Network Vulnerabilities and Attacks
Ch04 Network Vulnerabilities and Attacks
 

Ähnlich wie Chapter11

Internet security
Internet securityInternet security
Internet security
at1211
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Ähnlich wie Chapter11 (20)

Computer security
Computer securityComputer security
Computer security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Internet security
Internet securityInternet security
Internet security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

Mehr von Izaham

Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
Izaham
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
Izaham
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
Izaham
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
Izaham
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
Izaham
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
Izaham
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
Izaham
 
Flowchart
FlowchartFlowchart
Flowchart
Izaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
Izaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
Izaham
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
Izaham
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
Izaham
 

Mehr von Izaham (20)

Morphology 1
Morphology 1Morphology 1
Morphology 1
 
Morphology
MorphologyMorphology
Morphology
 
Critical reading
Critical readingCritical reading
Critical reading
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
 
Flowchart
FlowchartFlowchart
Flowchart
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Chapter11

  • 1. Chapter 11 Computer Security, Ethics and Privacy
  • 2. Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
  • 3.
  • 4.
  • 5.
  • 6. Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools, business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues, their preventions, and ways to keep the environment healthy Chapter 11 Complete