SlideShare ist ein Scribd-Unternehmen logo
1 von 56
Downloaden Sie, um offline zu lesen
Discovering
    Computers 2011
    Living in a Digital World
Objectives Overview
Objectives Overview


    Define the term,             Describe various types 
                                                                                     Discuss techniques to
                                                                                     Discuss techniques to 
computer security risks, 
                i ik            of Internet and network 
                                 fI            d         k
                                                                                     prevent unauthorized 
and briefly describe the          attacks, and identify 
                                                                                     computer access and 
  types of cybercrime               ways to safeguard 
                                                                                              use
     perpetrators                 against these attacks


                                    Explain the ways 
   Identify safeguards                                                               Discuss how encryption 
                                software manufacturers 
 against hardware theft                                                              works, and explain why 
                                     p        g
                                     protect against 
     and vandalism
     and vandalism                                                                        it is necessary
                                                                                          it is necessary
                                    software piracy



See Page 555                Discovering Computers 2011: Living in a Digital World                         2
for Detailed Objectives                        Chapter 11
Objectives Overview
Objectives Overview


  Discuss the types of 
  Discuss the types of                                                                  Identify risks and 
                                                                                        Identify risks and
                                   Explain the options 
 devices available that                                                               safeguards associated 
                                 available for backing up 
protect computers from                                                                     with wireless 
                                   computer resources
     system failure
     system failure                                                                      communications


                                 Recogni e issues related
                                 Recognize issues related 
Discuss ways to prevent 
                                 to information accuracy,                                 Discuss issues 
health‐related disorders 
                                    intellectual property                            surrounding information 
         j
  and injuries due to 
                                 rights, codes of conduct, 
                                 rights codes of conduct                                     privacy
     computer use
                                   and green computing



See Page 555                Discovering Computers 2011: Living in a Digital World                              3
for Detailed Objectives                        Chapter 11
Computer Security Risks
Computer Security Risks

• A computer security risk is any event or action that could 
  cause a loss of or damage to computer hardware, 
  software, data, information, or processing capability
• A cybercrime is an online or Internet‐based illegal act

         Hackers                 Crackers                        Script Kiddies
                                                                 Script Kiddies             Corporate Spies
                                                                                            Corporate Spies




                    Unethical 
                                           Cyberextortionists                     Cyberterrorists
                   Employees


Pages 556 ‐ 557                  Discovering Computers 2011: Living in a Digital World                        4
                                                    Chapter 11
Computer Security Risks
Computer Security Risks




Pages 556 – 557   Discovering Computers 2011: Living in a Digital World    5
Figure 11‐1                          Chapter 11
Internet and Network Attacks
Internet and Network Attacks

• Information transmitted over networks has a higher 
  degree of security risk than information kept on an 
  organization’s premises
• An online security service is a Web site that evaluates 
  your computer to check for Internet and e‐mail 
  vulnerabilities


              Click to view Web Link,
              click Chapter 11, Click Web
              Link from left navigation,
              then click Computer
              Emergency Response Team
              Coordination Center below
              Chapter 11
Page 558                                    Discovering Computers 2011: Living in a Digital World    6
Figure 11‐2                                                    Chapter 11
Internet and Network Attacks
Internet and Network Attacks

    Computer 
                        Worm                           Trojan Horse                Rootkit
      Virus
• Affects a        • Copies itself                  • A malicious               • Program that 
  computer           repeatedly,                      program that                hides in a 
  negatively by 
       ti l b        using up 
                       i                              hides within 
                                                      hid      ithi               computer 
                                                                                         t
  altering the       resources                        or looks like               and allows 
  way the            and possibly                     a legitimate                someone 
  computer           shutting                         program                     from a 
  works              down the                                                     remote 
                         p
                     computer or                                                  location to 
                     network                                                      take full 
                                                                                  control


Page 558               Discovering Computers 2011: Living in a Digital World                  7
                                          Chapter 11
Video: Attack of the Mobile Viruses
Video: Attack of the Mobile Viruses




                           CLICK TO START
                           CLICK TO START
            Discovering Computers 2011: Living in a Digital World    8
                               Chapter 11
Internet and Network Attacks
Internet and Network Attacks

• An infected computer has one or more of the 
          g y p
  following symptoms:
        Operating system     Available memory                                            Screen displays 
                                                               Files become 
        runs much slower        is less than                                            unusual message 
                                                                 corrupted
           than usual            expected                                                   or image


                                                                                           Unknown 
        M i            l
        Music or unusual                                    P            fil
                                                            Programs or files 
                            Existing programs                                           programs or files 
         sound plays                                          do not work 
                            and files disappear                                           mysteriously 
          randomly                                              properly
                                                                                            appear


                                                                            Operating system 
                  System properties         Operating system 
                                                                              shuts down 
                       change               does not start up
                                            does not start up
                                                                             unexpectedly

Pages 558 ‐ 559                Discovering Computers 2011: Living in a Digital World                         9
                                                  Chapter 11
Internet and Network Attacks
Internet and Network Attacks




Page 559      Discovering Computers 2011: Living in a Digital World    10
Figure 11‐3                      Chapter 11
Internet and Network Attacks
Internet and Network Attacks




Page 561      Discovering Computers 2011: Living in a Digital World    11
Figure 11‐6                      Chapter 11
Internet and Network Attacks
Internet and Network Attacks

    • Users can take several 
      precautions to protect 
      their home and work 
      computers and mobile 
      devices from these 
      malicious infections




Page 560 – 561      Discovering Computers 2011: Living in a Digital World    12
Figure 11‐7                            Chapter 11
Internet and Network Attacks
Internet and Network Attacks

• A botnet is a group of compromised computers connected to a 
  network
       – A compromised computer is known as a zombie
         A compromised computer is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to 
  Internet services
  Internet services
       – Distributed DoS (DDoS)
• A back door is a program or set of instructions in a program that 
                   p g                                 p g
  allow users to bypass security controls
• Spoofing is a technique intruders use to make their network or 
  Internet transmission appear legitimate
           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click DoS Attacks
           below Chapter 11

Pages 562 ‐ 563                          Discovering Computers 2011: Living in a Digital World    13
                                                            Chapter 11
Internet and Network Attacks
Internet and Network Attacks

• A firewall is hardware and/or software that 
  p
  protects a network’s resources from intrusion




           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Firewalls
           below Chapter 11

Pages 563 ‐ 564                          Discovering Computers 2011: Living in a Digital World    14
Figure 11‐8                                                 Chapter 11
Internet and Network Attacks
Internet and Network Attacks

 Intrusion detection software
  •A l
    Analyzes all network traffic
               ll t    k t ffi
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
     d ifi              h i di        i
  • Notifies network administrators of suspicious behavior 
      tt           t   b     h
    patterns or system breaches
 Honeypot
     yp
  • Vulnerable computer that is set up to entice an intruder to 
    break into it
    break into it
Page 564             Discovering Computers 2011: Living in a Digital World    15
                                        Chapter 11
Unauthorized Access and Use
Unauthorized Access and Use




  Unauthorized access is 
  Unauthorized access is                                        Unauthorized use is the 
                                                                Unauthorized use is the
 the use of a computer or                                       use of a computer or its 
     network without                                            data for unapproved or 
        permission                                              possibly illegal activities




Page 564             Discovering Computers 2011: Living in a Digital World                16
                                        Chapter 11
Unauthorized Access and Use
Unauthorized Access and Use

    • O
      Organizations take 
            i i       k
      several measures to 
      help prevent 
      help prevent
      unauthorized access 
      and use
      and use
           – Acceptable use policy
           – Disable file and printer
             Disable file and printer 
             sharing
           – Firewalls
           – Intrusion detection 
             software

Page 565                    Discovering Computers 2011: Living in a Digital World    17
Figure 11‐10                                   Chapter 11
Unauthorized Access and Use
Unauthorized Access and Use

• Access controls define who can access a 
       p              y
  computer, when they can access it, and what 
  actions they can take
      – Two‐phase processes called identification and
        Two‐phase processes called identification and 
        authentication
      –UUser name
      – Password
      – Passphrase
      – CAPTCHA
Pages 565 – 567      Discovering Computers 2011: Living in a Digital World    18
Figure 11‐11                            Chapter 11
Unauthorized Access and Use
Unauthorized Access and Use

    • A possessed object is any                                       • A biometric device
      item that you must carry to                                       authenticates a person’s 
      gain access to a computer 
      gain access to a computer                                         identity by translating a 
                                                                        identity by translating a
      or computer facility                                              personal characteristic into 
           – Often are used in                                              g
                                                                        a digital code that is 
             combination with a personal                                compared with a digital 
             identification number (PIN)                                code in a computer




           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Biometric Devices
           below Chapter 11

Page 568                                  Discovering Computers 2011: Living in a Digital World         19
Figure 11‐14                                                 Chapter 11
Unauthorized Access and Use
Unauthorized Access and Use

• Digital forensics is the discovery, collection, and 
      y                                p
  analysis of evidence found on computers and 
  networks
• Many areas use digital forensics
  Many areas use digital forensics
               Law                        Criminal                            Military 
                                                                                     y
           enforcement                  prosecutors                         intelligence



                                                         Information 
                     Insurance 
                                                           security 
                       g
                      agencies
                                                         departments
                                                         d    t      t
Page 569                 Discovering Computers 2011: Living in a Digital World             20
                                            Chapter 11
Hardware Theft and Vandalism
Hardware Theft and Vandalism



                                             Hardware vandalism
Hardware theft is the 
Hardware theft is the
                                             is the act of defacing 
   act of stealing 
                                                  or destroying
                                                  or destroying 
      t       i
computer equipment  t
                                             computer equipment



Page 570      Discovering Computers 2011: Living in a Digital World    21
                                 Chapter 11
Hardware Theft and Vandalism
Hardware Theft and Vandalism

• To help reduce the of chances of theft, companies 
                          y           y
  and schools use a variety of security measures
                                                                                 Cables to lock 
   Physical access controls                Alarm systems
                                                                                  equipment




                          Real time location             Passwords, possessed 
                                system                  objects, and biometrics


           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click RTLS
           below Chapter 11

Page 570                                 Discovering Computers 2011: Living in a Digital World     22
Figure 11‐15                                                Chapter 11
Software Theft
Software Theft

• Software theft occurs when someone:


           Steals software                                    Intentionally 
                                                                          y
               media                                        erases programs




                                                                 Illegally 
                                                                 Ill ll
           Illegally copies a                                registers and/or 
                program                                         activates a 
                                                                 program
Page 571             Discovering Computers 2011: Living in a Digital World       23
                                        Chapter 11
Software Theft
Software Theft

• A single‐user license agreement typically contains the 
  following conditions:
Permitted to
  • Install the software on one computer
    Install the software on one computer
  • Make one copy of the software
  • Remove the software from your computer before giving it away or selling it

Not permitted to
  •   Install the software on a network
  •   Give copies to friends or colleagues while continuing to use the software
  •   Export the software
  •   Rent or lease the software
      R        l      h    f
Page 571                    Discovering Computers 2011: Living in a Digital World    24
                                               Chapter 11
Software Theft
Software Theft

    • Copying, loaning, 
      borrowing, renting, or 
      distributing software 
      can be a violation of 
      copyright law
    • Some software requires 
      product activation to 
      function fully
           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Business Software
           Alliance below Chapter 11

Pages 571 – 572                           Discovering Computers 2011: Living in a Digital World    25
Figure 11‐16                                                 Chapter 11
Information Theft
Information Theft

• Information theft occurs when someone steals 
  p
  personal or confidential information
• Encryption is a process of converting readable 
  data into unreadable characters to prevent 
  data into unreadable characters to prevent
  unauthorized access




Pages 572 ‐ 573   Discovering Computers 2011: Living in a Digital World    26
Figure 11‐17                         Chapter 11
Information Theft
Information Theft




Page 573       Discovering Computers 2011: Living in a Digital World    27
Figure 11‐18                      Chapter 11
Information Theft
Information Theft

• A digital signature is an encrypted code that a 
  p
  person, Web site, or organization attaches to an 
                          g
  electronic message to verify the identity of the 
  sender
      – Often used to ensure that an impostor is not 
        participating in an Internet transaction
        participating in an Internet transaction
• Web browsers and Web sites use encryption 
  techniques

Page 574             Discovering Computers 2011: Living in a Digital World    28
                                        Chapter 11
Information Theft
Information Theft

• Popular security techniques include

                                               Digital                                   Transport Layer 
                                             Certificates                                 Security (TLS)



                                             Secure HTTP                                              VPN
           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Digital Certificates
           below Chapter 11

Pages 574 ‐ 575                              Discovering Computers 2011: Living in a Digital World          29
                                                                Chapter 11
Information Theft
Information Theft




Pages 574 ‐ 575         Discovering Computers 2011: Living in a Digital World    30
Figures 11‐19 – 11‐20                      Chapter 11
System Failure
System Failure

• A system failure is the prolonged malfunction of a 
       p
  computer
• A variety of factors can lead to system failure, 
  including:
      – Aging hardware
      – Natural disasters
      – Electrical power problems
                   p     p
           • Noise, undervoltages, and overvoltages
      – Errors in computer programs
        Errors in computer programs
Page 575                 Discovering Computers 2011: Living in a Digital World    31
                                            Chapter 11
System Failure
System Failure

• Two ways to protect from system failures caused 
   y            p                           g
  by electrical power variations include surge 
  protectors and uninterruptable power supplies
  (UPS)




           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Surge Protectors
           below Chapter 11

Page 576                                 Discovering Computers 2011: Living in a Digital World    32
Figures 11‐21 – 11‐22                                       Chapter 11
Backing Up  The Ultimate Safeguard
Backing Up – The Ultimate Safeguard

• A backup is a duplicate of a file, program, or disk 
                             g                  g
  that can be used if the original is lost, damaged, 
  or destroyed
      – To back up a file means to make a copy of it
        To back up a file means to make a copy of it
• Offsite backups are stored in a location separate 
  from the computer site
                                                                 Cloud 
                                                                Storage

Page 577              Discovering Computers 2011: Living in a Digital World    33
                                         Chapter 11
Backing Up  The Ultimate Safeguard
Backing Up – The Ultimate Safeguard

    • Two categories of                               • Three‐generation 
      backups:                                          backup policy
           – Full backup
                                                                        Grandparent
           – Selective backup


                                                                             Parent




                                                                              Child


Page 577                  Discovering Computers 2011: Living in a Digital World       34
                                             Chapter 11
Wireless Security
Wireless Security

• Wireless access poses additional security risks
       – About 80 percent of wireless networks have no security 
         protection
• War driving allows individuals to detect wireless 
  networks while driving a vehicle through the area




           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click War Driving
           below Chapter 11

Page 578                                 Discovering Computers 2011: Living in a Digital World    35
Figure 11‐23                                                Chapter 11
Wireless Security
Wireless Security

• In additional to using firewalls, some safeguards 
     p             y
  improve security of wireless networks:
           A wireless access 
                                                 Change the default 
                                                 Change the default
            point should not 
                                                       SSID
           broadcast an SSID


            Configure a WAP 
               so that only                       Use WPA or WPA2 
           certain devices can                    security standards
                 access it
                 access it
Page 578            Discovering Computers 2011: Living in a Digital World    36
                                       Chapter 11
Health Concerns of Computer Use
Health Concerns of Computer Use

    • The widespread use of 
      computers has led to 
      health concerns
           – Repetitive strain injury 
             (RSI)
               • Tendonitis
               • Carpal tunnel syndrome
                 Carpal tunnel syndrome 
                 (CTS)
           – Computer vision 
                 p
             syndrome (CVS)


Page 579                    Discovering Computers 2011: Living in a Digital World    37
Figure 11‐24                                   Chapter 11
Health Concerns of Computer Use
Health Concerns of Computer Use




Page 580       Discovering Computers 2011: Living in a Digital World    38
Figure 11‐25                      Chapter 11
Health Concerns of Computer Use
Health Concerns of Computer Use

    • Ergonomics is an 
      applied science devoted 
      to incorporating 
      comfort, efficiency, and 
      safety into the design of 
      items in the workplace




Page 580             Discovering Computers 2011: Living in a Digital World    39
Figure 11‐26                            Chapter 11
Health Concerns of Computer Use
Health Concerns of Computer Use

• Computer addiction occurs when the computer 
  consumes someone’s entire social life
• Symptoms of users include:
              Craves             Overjoy when                             Unable to stop 
             computer               at the                                  computer 
               time
               ti                 computer
                                         t                                   activity
                                                                               ti it

           Irritable when 
           I it bl h                  Neglects 
                                      N l t                                  Problems at 
                                                                             P bl       t
              not at the             family and                                work or 
              computer                 friends                                 school
Page 581                 Discovering Computers 2011: Living in a Digital World              40
                                            Chapter 11
Ethics and Society
Ethics and Society

    • Computer ethics are 
      the moral guidelines 
      that govern the use of 
      computers and 
      information systems
    • Information accuracy is 
      a concern
           – Not all information on 
             the Web is correct


Pages 581 – 582            Discovering Computers 2011: Living in a Digital World    41
Figure 11‐28                                  Chapter 11
Ethics and Society
Ethics and Society

 Intellectual property rights are the rights to which creators 
 are entitled for their work
 are entitled for their work

  • A copyright protects any tangible form of expression
        py g p             y    g               p

 An IT code of conduct is a written guideline that helps 
 determine whether a specific computer action is ethical or
 determine whether a specific computer action is ethical or 
 unethical

           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Digital Rights
           Management
           below Chapter 11
Page 582                                 Discovering Computers 2011: Living in a Digital World    42
                                                            Chapter 11
Ethics and Society
Ethics and Society




Page 583       Discovering Computers 2011: Living in a Digital World    43
Figure 11‐29                      Chapter 11
Ethics and Society
Ethics and Society

• Green computing involves reducing the electricity 
                                    g       p
  and environmental waste while using a computer




Pages 583 – 584   Discovering Computers 2011: Living in a Digital World    44
Figure 11‐30                         Chapter 11
Ethics and Society
Ethics and Society

• Information privacy refers to the right of 
                        p            y
  individuals and companies to deny or restrict the 
  collection and use of information about them
• Huge databases store data online
  Huge databases store data online
• It is important to safeguard your information




Page 584        Discovering Computers 2011: Living in a Digital World    45
                                   Chapter 11
Ethics and Society
Ethics and Society




Page 584       Discovering Computers 2011: Living in a Digital World    46
Figure 11‐31                      Chapter 11
Ethics and Society
Ethics and Society

    • When you fill out a 
      form, the merchant that 
      receives the form 
      usually enters it into a 
      database
    • Many companies today 
      allow people to specify 
      whether they want 
      their personal 
      information distributed
Page 585            Discovering Computers 2011: Living in a Digital World    47
Figure 11‐32                           Chapter 11
Ethics and Society
Ethics and Society

• A cookie is a small text file that a Web server stores on 
  your computer
• Web sites use cookies for a variety of reasons:

                                                                                                  Assist with 
                                                                                                            h
                          Allow for                             Store users’ 
                                                                                                    online 
                       personalization                           passwords
                                                                                                   shopping

                                            Track how 
                                            Track how
                                                                                    Target 
           Click to view Web Link,          often users 
           click Chapter 11, Click Web                                          advertisements
           Link from left navigation,
           then click Cookies
                                             visit a site
           below Chapter 11

Pages 585 – 586                          Discovering Computers 2011: Living in a Digital World                   48
                                                            Chapter 11
Ethics and Society
Ethics and Society




Page 586       Discovering Computers 2011: Living in a Digital World    49
Figure 11‐33                      Chapter 11
Ethics and Society
Ethics and Society

    • S
      Spam iis an unsolicited 
                        li i d
      e‐mail message or 
      newsgroup posting
      newsgroup posting
    • E‐mail filtering blocks
      e‐mail messages from 
      e mail messages from
      designated sources
    • Anti spam programs
      Anti‐spam programs
      attempt to  remove 
      spam before it reaches 
      spam before it reaches
      your inbox

Page 587             Discovering Computers 2011: Living in a Digital World    50
Figure 11‐34                            Chapter 11
Ethics and Society
Ethics and Society

                                              • Phi hi i
                                                Phishing is a scam in 
                                                                    i
                                                which a perpetrator sends 
                                                an official looking e mail 
                                                an official looking e‐mail
                                                message that attempts to 
                                                obtain your personal and 
                                                financial information
                                              • Pharming is a scam 
                                                where a perpetrator 
                                                  h
                                                attempts to obtain your 
                                                personal and financial 
                                                personal and financial
                                                information via spoofing


Pages 587 ‐ 588   Discovering Computers 2011: Living in a Digital World       51
Figure 11‐35                         Chapter 11
Ethics and Society
Ethics and Society

• The concern about privacy has led to the 
                                        g     g
  enactment of federal and state laws regarding the 
  storage and disclosure of personal data
      – See Figure 11‐36 on page 589 for a listing of major U S
        See Figure 11‐36 on page 589 for a listing of major U.S. 
        government laws concerning privacy
• Th 1970 F i C di R
  The 1970 Fair Credit Reporting Act li i h
                               i A limits the 
  rights of others viewing a credit report to only 
  those with a legitimate business need

Page 588              Discovering Computers 2011: Living in a Digital World    52
                                         Chapter 11
Ethics and Society
Ethics and Society

 Social engineering is defined as gaining 
 unauthorized access or obtaining confidential  
 unauthorized access or obtaining confidential
 information by taking advantage of trust and naivety

 Employee monitoring involves the use of computers 
 to observe record and review an employee’s use of
 to observe, record, and review an employee s use of 
 a computer

           Click to view Web Link,
           click Chapter 11, Click Web
           Link from left navigation,
           then click Social Engineering
           below Chapter 11

Page 590                                   Discovering Computers 2011: Living in a Digital World    53
                                                              Chapter 11
Ethics and Society
Ethics and Society

    • C
      Content filtering i h
                fil i is the 
      process of restricting 
      access to certain material 
      access to certain material
      on the Web
    • Many businesses use 
           y
      content filtering
    • Internet Content Rating 
      Association (ICRA)
    • Web filtering software
      restricts access to 
      specified Web sites

Pages 590 – 591       Discovering Computers 2011: Living in a Digital World    54
Figure 11‐37                             Chapter 11
Summary


           Potential computer risks and 
           Potential computer risks and                     Wireless security risks and 
                                                            Wireless security risks and
                  the safeguards                                   safeguards




                                                           Ethi l i               di
                                                           Ethical issues surrounding 
                                                             information accuracy, 
            Computer‐related health 
                 p                                        intellectual property rights, 
                                                                       p p y g
             issues and preventions                         codes of conduct, green 
                                                          computing, and information 
                                                                      privacy
Page 591                    Discovering Computers 2011: Living in a Digital World          55
                                               Chapter 11
Discovering
    Computers 2011
    Living in a Digital World


    Chapter 11 Complete

Weitere ähnliche Inhalte

Was ist angesagt?

Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Anna Stirling
 
Discovering Computers: Chapter 02
Discovering Computers: Chapter 02Discovering Computers: Chapter 02
Discovering Computers: Chapter 02Anna Stirling
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System UnitSamudin Kassan
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Anna Stirling
 
Discovering Computers: Chapter 10
Discovering Computers: Chapter 10Discovering Computers: Chapter 10
Discovering Computers: Chapter 10Anna Stirling
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Cyber Security Infotech
 
Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Anna Stirling
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Anna Stirling
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Chapter 01 Digital Literacy
Chapter 01 Digital LiteracyChapter 01 Digital Literacy
Chapter 01 Digital Literacyxtin101
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer softwareVishal Patyal
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Anna Stirling
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Securityxtin101
 

Was ist angesagt? (20)

Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13
 
Discovering Computers: Chapter 02
Discovering Computers: Chapter 02Discovering Computers: Chapter 02
Discovering Computers: Chapter 02
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer software
Computer softwareComputer software
Computer software
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
The Components of The System Unit
The Components of The System UnitThe Components of The System Unit
The Components of The System Unit
 
Discovering Computers: Chapter 12
Discovering Computers: Chapter 12Discovering Computers: Chapter 12
Discovering Computers: Chapter 12
 
Discovering Computers: Chapter 10
Discovering Computers: Chapter 10Discovering Computers: Chapter 10
Discovering Computers: Chapter 10
 
Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)Introduction to cyber security by cyber security infotech(csi)
Introduction to cyber security by cyber security infotech(csi)
 
Discovering Computers: Chapter 03
Discovering Computers: Chapter 03Discovering Computers: Chapter 03
Discovering Computers: Chapter 03
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
The internet
The internetThe internet
The internet
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Chapter 01 Digital Literacy
Chapter 01 Digital LiteracyChapter 01 Digital Literacy
Chapter 01 Digital Literacy
 
Lesson 5 computer software
Lesson 5 computer softwareLesson 5 computer software
Lesson 5 computer software
 
Discovering Computers: Chapter 05
Discovering Computers: Chapter 05Discovering Computers: Chapter 05
Discovering Computers: Chapter 05
 
Virus & Antivirus
Virus & AntivirusVirus & Antivirus
Virus & Antivirus
 
Chapter 05 Digital Safety and Security
Chapter 05 Digital Safety and SecurityChapter 05 Digital Safety and Security
Chapter 05 Digital Safety and Security
 

Andere mochten auch

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationHajarul Cikyen
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityFizaril Amzari Omar
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Fizaril Amzari Omar
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacyrealpeterz
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethicsgeneveve_
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 

Andere mochten auch (20)

Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
cyber_security
cyber_securitycyber_security
cyber_security
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Privacy , Security and Ethics Presentation
Privacy , Security and Ethics PresentationPrivacy , Security and Ethics Presentation
Privacy , Security and Ethics Presentation
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Chapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and SecurityChapter 4 Computer Science :: Computer Ethics and Security
Chapter 4 Computer Science :: Computer Ethics and Security
 
Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security Chapter 4 Computer Ethics and Security
Chapter 4 Computer Ethics and Security
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
CSC 134
CSC 134CSC 134
CSC 134
 
Storage
StorageStorage
Storage
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 
Output
OutputOutput
Output
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 

Ähnlich wie Computer Security and Safety, Ethics & Privacy

CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
cyber security seminar session-3.pptx
cyber security seminar session-3.pptxcyber security seminar session-3.pptx
cyber security seminar session-3.pptxVijay Rathod
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defenseChristiaan Beek
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management ProcessBill Ross
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptxKnownId
 
Information security questions
Information security questions Information security questions
Information security questions gamemaker762
 
Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network SecurityHarish Chaudhary
 
Cyber Security
Cyber SecurityCyber Security
Cyber Securityfrcarlson
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 

Ähnlich wie Computer Security and Safety, Ethics & Privacy (20)

CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
cyber security seminar session-3.pptx
cyber security seminar session-3.pptxcyber security seminar session-3.pptx
cyber security seminar session-3.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
ABP 23.pptx
ABP 23.pptxABP 23.pptx
ABP 23.pptx
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Offensive malware usage and defense
Offensive malware usage and defenseOffensive malware usage and defense
Offensive malware usage and defense
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Information security questions
Information security questions Information security questions
Information security questions
 
Computer security
Computer securityComputer security
Computer security
 
01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security01_Metasploit - The Elixir of Network Security
01_Metasploit - The Elixir of Network Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 

Mehr von Samudin Kassan

Information System Development
Information System DevelopmentInformation System Development
Information System DevelopmentSamudin Kassan
 
Programming Languages and Program Develompent
Programming Languages and Program DevelompentProgramming Languages and Program Develompent
Programming Languages and Program DevelompentSamudin Kassan
 
Operating Systems and Utility Programs
Operating Systems and Utility ProgramsOperating Systems and Utility Programs
Operating Systems and Utility ProgramsSamudin Kassan
 
Communications and Networks
Communications and NetworksCommunications and Networks
Communications and NetworksSamudin Kassan
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to ComputersSamudin Kassan
 

Mehr von Samudin Kassan (9)

Information System Development
Information System DevelopmentInformation System Development
Information System Development
 
Enterprise Computing
Enterprise ComputingEnterprise Computing
Enterprise Computing
 
Programming Languages and Program Develompent
Programming Languages and Program DevelompentProgramming Languages and Program Develompent
Programming Languages and Program Develompent
 
Database Management
Database ManagementDatabase Management
Database Management
 
Input
InputInput
Input
 
Operating Systems and Utility Programs
Operating Systems and Utility ProgramsOperating Systems and Utility Programs
Operating Systems and Utility Programs
 
Communications and Networks
Communications and NetworksCommunications and Networks
Communications and Networks
 
Introduction to Computers
Introduction to ComputersIntroduction to Computers
Introduction to Computers
 
Applicaton Software
Applicaton SoftwareApplicaton Software
Applicaton Software
 

Kürzlich hochgeladen

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Kürzlich hochgeladen (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Computer Security and Safety, Ethics & Privacy

  • 1. Discovering Computers 2011 Living in a Digital World
  • 2. Objectives Overview Objectives Overview Define the term,  Describe various types  Discuss techniques to Discuss techniques to  computer security risks,  i ik of Internet and network  fI d k prevent unauthorized  and briefly describe the  attacks, and identify  computer access and  types of cybercrime  ways to safeguard  use perpetrators against these attacks Explain the ways  Identify safeguards  Discuss how encryption  software manufacturers  against hardware theft  works, and explain why  p g protect against  and vandalism and vandalism it is necessary it is necessary software piracy See Page 555  Discovering Computers 2011: Living in a Digital World  2 for Detailed Objectives Chapter 11
  • 3. Objectives Overview Objectives Overview Discuss the types of  Discuss the types of Identify risks and  Identify risks and Explain the options  devices available that  safeguards associated  available for backing up  protect computers from  with wireless  computer resources system failure system failure communications Recogni e issues related Recognize issues related  Discuss ways to prevent  to information accuracy,  Discuss issues  health‐related disorders  intellectual property  surrounding information  j and injuries due to  rights, codes of conduct,  rights codes of conduct privacy computer use and green computing See Page 555 Discovering Computers 2011: Living in a Digital World  3 for Detailed Objectives Chapter 11
  • 4. Computer Security Risks Computer Security Risks • A computer security risk is any event or action that could  cause a loss of or damage to computer hardware,  software, data, information, or processing capability • A cybercrime is an online or Internet‐based illegal act Hackers Crackers Script Kiddies Script Kiddies Corporate Spies Corporate Spies Unethical  Cyberextortionists Cyberterrorists Employees Pages 556 ‐ 557 Discovering Computers 2011: Living in a Digital World  4 Chapter 11
  • 5. Computer Security Risks Computer Security Risks Pages 556 – 557 Discovering Computers 2011: Living in a Digital World  5 Figure 11‐1 Chapter 11
  • 6. Internet and Network Attacks Internet and Network Attacks • Information transmitted over networks has a higher  degree of security risk than information kept on an  organization’s premises • An online security service is a Web site that evaluates  your computer to check for Internet and e‐mail  vulnerabilities Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11 Page 558  Discovering Computers 2011: Living in a Digital World  6 Figure 11‐2 Chapter 11
  • 7. Internet and Network Attacks Internet and Network Attacks Computer  Worm Trojan Horse Rootkit Virus • Affects a  • Copies itself  • A malicious  • Program that  computer  repeatedly,  program that  hides in a  negatively by  ti l b using up  i hides within  hid ithi computer  t altering the  resources  or looks like  and allows  way the  and possibly  a legitimate  someone  computer  shutting  program from a  works down the  remote  p computer or  location to  network take full  control Page 558 Discovering Computers 2011: Living in a Digital World  7 Chapter 11
  • 8. Video: Attack of the Mobile Viruses Video: Attack of the Mobile Viruses CLICK TO START CLICK TO START Discovering Computers 2011: Living in a Digital World  8 Chapter 11
  • 9. Internet and Network Attacks Internet and Network Attacks • An infected computer has one or more of the  g y p following symptoms: Operating system  Available memory  Screen displays  Files become  runs much slower  is less than  unusual message  corrupted than usual expected or image Unknown  M i l Music or unusual  P fil Programs or files  Existing programs  programs or files  sound plays  do not work  and files disappear mysteriously  randomly properly appear Operating system  System properties  Operating system  shuts down  change does not start up does not start up unexpectedly Pages 558 ‐ 559 Discovering Computers 2011: Living in a Digital World  9 Chapter 11
  • 10. Internet and Network Attacks Internet and Network Attacks Page 559 Discovering Computers 2011: Living in a Digital World  10 Figure 11‐3 Chapter 11
  • 11. Internet and Network Attacks Internet and Network Attacks Page 561  Discovering Computers 2011: Living in a Digital World  11 Figure 11‐6 Chapter 11
  • 12. Internet and Network Attacks Internet and Network Attacks • Users can take several  precautions to protect  their home and work  computers and mobile  devices from these  malicious infections Page 560 – 561 Discovering Computers 2011: Living in a Digital World  12 Figure 11‐7 Chapter 11
  • 13. Internet and Network Attacks Internet and Network Attacks • A botnet is a group of compromised computers connected to a  network – A compromised computer is known as a zombie A compromised computer is known as a zombie • A denial of service attack (DoS attack) disrupts computer access to  Internet services Internet services – Distributed DoS (DDoS) • A back door is a program or set of instructions in a program that  p g p g allow users to bypass security controls • Spoofing is a technique intruders use to make their network or  Internet transmission appear legitimate Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click DoS Attacks below Chapter 11 Pages 562 ‐ 563 Discovering Computers 2011: Living in a Digital World  13 Chapter 11
  • 14. Internet and Network Attacks Internet and Network Attacks • A firewall is hardware and/or software that  p protects a network’s resources from intrusion Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Firewalls below Chapter 11 Pages 563 ‐ 564 Discovering Computers 2011: Living in a Digital World  14 Figure 11‐8 Chapter 11
  • 15. Internet and Network Attacks Internet and Network Attacks Intrusion detection software •A l Analyzes all network traffic ll t k t ffi • Assesses system vulnerabilities • Identifies any unauthorized intrusions d ifi h i di i • Notifies network administrators of suspicious behavior  tt t b h patterns or system breaches Honeypot yp • Vulnerable computer that is set up to entice an intruder to  break into it break into it Page 564 Discovering Computers 2011: Living in a Digital World  15 Chapter 11
  • 16. Unauthorized Access and Use Unauthorized Access and Use Unauthorized access is  Unauthorized access is Unauthorized use is the  Unauthorized use is the the use of a computer or  use of a computer or its  network without  data for unapproved or  permission possibly illegal activities Page 564 Discovering Computers 2011: Living in a Digital World  16 Chapter 11
  • 17. Unauthorized Access and Use Unauthorized Access and Use • O Organizations take  i i k several measures to  help prevent  help prevent unauthorized access  and use and use – Acceptable use policy – Disable file and printer Disable file and printer  sharing – Firewalls – Intrusion detection  software Page 565  Discovering Computers 2011: Living in a Digital World  17 Figure 11‐10 Chapter 11
  • 18. Unauthorized Access and Use Unauthorized Access and Use • Access controls define who can access a  p y computer, when they can access it, and what  actions they can take – Two‐phase processes called identification and Two‐phase processes called identification and  authentication –UUser name – Password – Passphrase – CAPTCHA Pages 565 – 567 Discovering Computers 2011: Living in a Digital World  18 Figure 11‐11 Chapter 11
  • 19. Unauthorized Access and Use Unauthorized Access and Use • A possessed object is any  • A biometric device item that you must carry to  authenticates a person’s  gain access to a computer  gain access to a computer identity by translating a  identity by translating a or computer facility personal characteristic into  – Often are used in  g a digital code that is  combination with a personal  compared with a digital  identification number (PIN) code in a computer Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Biometric Devices below Chapter 11 Page 568 Discovering Computers 2011: Living in a Digital World  19 Figure 11‐14 Chapter 11
  • 20. Unauthorized Access and Use Unauthorized Access and Use • Digital forensics is the discovery, collection, and  y p analysis of evidence found on computers and  networks • Many areas use digital forensics Many areas use digital forensics Law  Criminal  Military  y enforcement prosecutors intelligence Information  Insurance  security  g agencies departments d t t Page 569 Discovering Computers 2011: Living in a Digital World  20 Chapter 11
  • 21. Hardware Theft and Vandalism Hardware Theft and Vandalism Hardware vandalism Hardware theft is the  Hardware theft is the is the act of defacing  act of stealing  or destroying or destroying  t i computer equipment t computer equipment Page 570 Discovering Computers 2011: Living in a Digital World  21 Chapter 11
  • 22. Hardware Theft and Vandalism Hardware Theft and Vandalism • To help reduce the of chances of theft, companies  y y and schools use a variety of security measures Cables to lock  Physical access controls Alarm systems equipment Real time location  Passwords, possessed  system objects, and biometrics Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click RTLS below Chapter 11 Page 570 Discovering Computers 2011: Living in a Digital World  22 Figure 11‐15 Chapter 11
  • 23. Software Theft Software Theft • Software theft occurs when someone: Steals software  Intentionally  y media erases programs Illegally  Ill ll Illegally copies a  registers and/or  program activates a  program Page 571 Discovering Computers 2011: Living in a Digital World  23 Chapter 11
  • 24. Software Theft Software Theft • A single‐user license agreement typically contains the  following conditions: Permitted to • Install the software on one computer Install the software on one computer • Make one copy of the software • Remove the software from your computer before giving it away or selling it Not permitted to • Install the software on a network • Give copies to friends or colleagues while continuing to use the software • Export the software • Rent or lease the software R l h f Page 571 Discovering Computers 2011: Living in a Digital World  24 Chapter 11
  • 25. Software Theft Software Theft • Copying, loaning,  borrowing, renting, or  distributing software  can be a violation of  copyright law • Some software requires  product activation to  function fully Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11 Pages 571 – 572 Discovering Computers 2011: Living in a Digital World  25 Figure 11‐16 Chapter 11
  • 26. Information Theft Information Theft • Information theft occurs when someone steals  p personal or confidential information • Encryption is a process of converting readable  data into unreadable characters to prevent  data into unreadable characters to prevent unauthorized access Pages 572 ‐ 573 Discovering Computers 2011: Living in a Digital World  26 Figure 11‐17 Chapter 11
  • 27. Information Theft Information Theft Page 573 Discovering Computers 2011: Living in a Digital World  27 Figure 11‐18 Chapter 11
  • 28. Information Theft Information Theft • A digital signature is an encrypted code that a  p person, Web site, or organization attaches to an  g electronic message to verify the identity of the  sender – Often used to ensure that an impostor is not  participating in an Internet transaction participating in an Internet transaction • Web browsers and Web sites use encryption  techniques Page 574 Discovering Computers 2011: Living in a Digital World  28 Chapter 11
  • 29. Information Theft Information Theft • Popular security techniques include Digital  Transport Layer  Certificates Security (TLS) Secure HTTP VPN Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11 Pages 574 ‐ 575 Discovering Computers 2011: Living in a Digital World  29 Chapter 11
  • 30. Information Theft Information Theft Pages 574 ‐ 575 Discovering Computers 2011: Living in a Digital World  30 Figures 11‐19 – 11‐20 Chapter 11
  • 31. System Failure System Failure • A system failure is the prolonged malfunction of a  p computer • A variety of factors can lead to system failure,  including: – Aging hardware – Natural disasters – Electrical power problems p p • Noise, undervoltages, and overvoltages – Errors in computer programs Errors in computer programs Page 575 Discovering Computers 2011: Living in a Digital World  31 Chapter 11
  • 32. System Failure System Failure • Two ways to protect from system failures caused  y p g by electrical power variations include surge  protectors and uninterruptable power supplies (UPS) Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Surge Protectors below Chapter 11 Page 576 Discovering Computers 2011: Living in a Digital World  32 Figures 11‐21 – 11‐22 Chapter 11
  • 33. Backing Up  The Ultimate Safeguard Backing Up – The Ultimate Safeguard • A backup is a duplicate of a file, program, or disk  g g that can be used if the original is lost, damaged,  or destroyed – To back up a file means to make a copy of it To back up a file means to make a copy of it • Offsite backups are stored in a location separate  from the computer site Cloud  Storage Page 577 Discovering Computers 2011: Living in a Digital World  33 Chapter 11
  • 34. Backing Up  The Ultimate Safeguard Backing Up – The Ultimate Safeguard • Two categories of  • Three‐generation  backups: backup policy – Full backup Grandparent – Selective backup Parent Child Page 577 Discovering Computers 2011: Living in a Digital World  34 Chapter 11
  • 35. Wireless Security Wireless Security • Wireless access poses additional security risks – About 80 percent of wireless networks have no security  protection • War driving allows individuals to detect wireless  networks while driving a vehicle through the area Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click War Driving below Chapter 11 Page 578 Discovering Computers 2011: Living in a Digital World  35 Figure 11‐23 Chapter 11
  • 36. Wireless Security Wireless Security • In additional to using firewalls, some safeguards  p y improve security of wireless networks: A wireless access  Change the default  Change the default point should not  SSID broadcast an SSID Configure a WAP  so that only  Use WPA or WPA2  certain devices can  security standards access it access it Page 578 Discovering Computers 2011: Living in a Digital World  36 Chapter 11
  • 37. Health Concerns of Computer Use Health Concerns of Computer Use • The widespread use of  computers has led to  health concerns – Repetitive strain injury  (RSI) • Tendonitis • Carpal tunnel syndrome Carpal tunnel syndrome  (CTS) – Computer vision  p syndrome (CVS) Page 579 Discovering Computers 2011: Living in a Digital World  37 Figure 11‐24 Chapter 11
  • 38. Health Concerns of Computer Use Health Concerns of Computer Use Page 580 Discovering Computers 2011: Living in a Digital World  38 Figure 11‐25 Chapter 11
  • 39. Health Concerns of Computer Use Health Concerns of Computer Use • Ergonomics is an  applied science devoted  to incorporating  comfort, efficiency, and  safety into the design of  items in the workplace Page 580 Discovering Computers 2011: Living in a Digital World  39 Figure 11‐26 Chapter 11
  • 40. Health Concerns of Computer Use Health Concerns of Computer Use • Computer addiction occurs when the computer  consumes someone’s entire social life • Symptoms of users include: Craves  Overjoy when  Unable to stop  computer  at the  computer  time ti computer t activity ti it Irritable when  I it bl h Neglects  N l t Problems at  P bl t not at the  family and  work or  computer friends school Page 581 Discovering Computers 2011: Living in a Digital World  40 Chapter 11
  • 41. Ethics and Society Ethics and Society • Computer ethics are  the moral guidelines  that govern the use of  computers and  information systems • Information accuracy is  a concern – Not all information on  the Web is correct Pages 581 – 582 Discovering Computers 2011: Living in a Digital World  41 Figure 11‐28 Chapter 11
  • 42. Ethics and Society Ethics and Society Intellectual property rights are the rights to which creators  are entitled for their work are entitled for their work • A copyright protects any tangible form of expression py g p y g p An IT code of conduct is a written guideline that helps  determine whether a specific computer action is ethical or determine whether a specific computer action is ethical or  unethical Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11 Page 582 Discovering Computers 2011: Living in a Digital World  42 Chapter 11
  • 43. Ethics and Society Ethics and Society Page 583 Discovering Computers 2011: Living in a Digital World  43 Figure 11‐29 Chapter 11
  • 44. Ethics and Society Ethics and Society • Green computing involves reducing the electricity  g p and environmental waste while using a computer Pages 583 – 584 Discovering Computers 2011: Living in a Digital World  44 Figure 11‐30 Chapter 11
  • 45. Ethics and Society Ethics and Society • Information privacy refers to the right of  p y individuals and companies to deny or restrict the  collection and use of information about them • Huge databases store data online Huge databases store data online • It is important to safeguard your information Page 584 Discovering Computers 2011: Living in a Digital World  45 Chapter 11
  • 46. Ethics and Society Ethics and Society Page 584 Discovering Computers 2011: Living in a Digital World  46 Figure 11‐31 Chapter 11
  • 47. Ethics and Society Ethics and Society • When you fill out a  form, the merchant that  receives the form  usually enters it into a  database • Many companies today  allow people to specify  whether they want  their personal  information distributed Page 585 Discovering Computers 2011: Living in a Digital World  47 Figure 11‐32 Chapter 11
  • 48. Ethics and Society Ethics and Society • A cookie is a small text file that a Web server stores on  your computer • Web sites use cookies for a variety of reasons: Assist with  h Allow for  Store users’  online  personalization passwords shopping Track how  Track how Target  Click to view Web Link, often users  click Chapter 11, Click Web advertisements Link from left navigation, then click Cookies visit a site below Chapter 11 Pages 585 – 586 Discovering Computers 2011: Living in a Digital World  48 Chapter 11
  • 49. Ethics and Society Ethics and Society Page 586 Discovering Computers 2011: Living in a Digital World  49 Figure 11‐33 Chapter 11
  • 50. Ethics and Society Ethics and Society • S Spam iis an unsolicited  li i d e‐mail message or  newsgroup posting newsgroup posting • E‐mail filtering blocks e‐mail messages from  e mail messages from designated sources • Anti spam programs Anti‐spam programs attempt to  remove  spam before it reaches  spam before it reaches your inbox Page 587 Discovering Computers 2011: Living in a Digital World  50 Figure 11‐34 Chapter 11
  • 51. Ethics and Society Ethics and Society • Phi hi i Phishing is a scam in  i which a perpetrator sends  an official looking e mail  an official looking e‐mail message that attempts to  obtain your personal and  financial information • Pharming is a scam  where a perpetrator  h attempts to obtain your  personal and financial  personal and financial information via spoofing Pages 587 ‐ 588 Discovering Computers 2011: Living in a Digital World  51 Figure 11‐35 Chapter 11
  • 52. Ethics and Society Ethics and Society • The concern about privacy has led to the  g g enactment of federal and state laws regarding the  storage and disclosure of personal data – See Figure 11‐36 on page 589 for a listing of major U S See Figure 11‐36 on page 589 for a listing of major U.S.  government laws concerning privacy • Th 1970 F i C di R The 1970 Fair Credit Reporting Act li i h i A limits the  rights of others viewing a credit report to only  those with a legitimate business need Page 588 Discovering Computers 2011: Living in a Digital World  52 Chapter 11
  • 53. Ethics and Society Ethics and Society Social engineering is defined as gaining  unauthorized access or obtaining confidential   unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers  to observe record and review an employee’s use of to observe, record, and review an employee s use of  a computer Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Social Engineering below Chapter 11 Page 590 Discovering Computers 2011: Living in a Digital World  53 Chapter 11
  • 54. Ethics and Society Ethics and Society • C Content filtering i h fil i is the  process of restricting  access to certain material  access to certain material on the Web • Many businesses use  y content filtering • Internet Content Rating  Association (ICRA) • Web filtering software restricts access to  specified Web sites Pages 590 – 591 Discovering Computers 2011: Living in a Digital World  54 Figure 11‐37 Chapter 11
  • 55. Summary Potential computer risks and  Potential computer risks and Wireless security risks and  Wireless security risks and the safeguards safeguards Ethi l i di Ethical issues surrounding  information accuracy,  Computer‐related health  p intellectual property rights,  p p y g issues and preventions codes of conduct, green  computing, and information  privacy Page 591 Discovering Computers 2011: Living in a Digital World  55 Chapter 11
  • 56. Discovering Computers 2011 Living in a Digital World Chapter 11 Complete