SlideShare ist ein Scribd-Unternehmen logo
1 von 75
Downloaden Sie, um offline zu lesen
Why ?
At the end of this chapter, student should be
able to :
● defining ;
○ computer ethics, computer security risks
● list areas of computer ethics.
● identify types of security risks.
● identify different ways to overcome security risks
● identify types of Intellectual Property
● describe the importance of Intellectual Property
why peoples, especially students who enrolled SC015 need to acquire
the knowledge of - Computer Ethics & Security ?
Ethics and Society
Ethics,
standards determine whether an action is good
or bad
Computer Ethics,
moral guidelines that govern the use of
computers and information systems.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
Ethics and Society cont'
Seven (7) frequently discussed areas of
computer ethics are :-
1. unauthorized use of computers & networks.
2. software theft (piracy).
3. information accuracy.
4. intellectual property rights.
5. codes of conduct.
6. information privacy, and
7. green computing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
Ethics and Society cont'
Seven (7) frequently discussed areas of
computer ethics are :-
1. unauthorized use of computers & networks.
2. software theft (piracy).
3. information accuracy.
4. intellectual property rights.
5. codes of conduct.
6. information privacy, and
7. green computing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
We discuss about
these list later, :)
Computer Security Risks
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
Computer Security Risks
any event or action that could cause a loss or damage to
computer
Computer Crime
any illegal act involving a computer.
Cybercrime
online or Internet-based illegal acts.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
*Perpetrators of cybercrime fall into seven (7)
basic categories :-
hacker, cracker, script kiddie, corporate spy, unethical
employee, cyberextortionist and cyberterrorist.
perpetrators - someone who has committed a crime
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
#1. Hacker
● a computer *enthusiast.
● accessing computer or network illegally.
● the intention of their security breaches is to
improve security.
● advanced computer & network skills.
enthusiast - person who is highly interested in a particular
activity or subject.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
#2. Cracker
● illegally accessing computer with intention to,
● destroy data, stealing information and
attempting several malicious act.
● advanced computer & network skills.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
#3. Script Kiddie
● same intention with cracker BUT,
● lack technical skills knowledge.
● depends on prewritten hacking and cracking
programs to break into computers.
enthusiast - person who is highly interested in a particular
activity or subject.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
#4. Corporate Spy
● excellent computer & networking skills.
● hired to break & steals *proprietary data &
informations in a computers, OR
● to help identify security risks in own
companies.
proprietary - relating to an owner or ownership.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 556
#5. Unethical Employee
● exploiting a security weakness.
● seeking financial gains from selling
confidential information.
● unsatisfied employees may want to revenge.
proprietary - relating to an owner or ownership.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 557
#6. Cyberextortionist
● uses e-mail for extortion.
● threatening (if they are not paid with money)
actions such as :-
○ exposing confidential information
○ exploit security flaw
○ launch an attack (compromising the
organization's network)
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 557
#7. Cyberterrorist
● uses Internet or network to,
● destroy or damage computers for,
● political reasons
● targetting :-
○ nation's air traffic control system
○ electricity-generating companies
○ telecommunications infrastructures.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 557
The more common computer security risks
include :-
Internet and Networks Attacks, Unauthorized Access and
Use, Hardware/Software/Information Theft and System
Failure
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 557
The more common computer security risks
include :-
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 557
The more common computer security risks
include :-
Internet and Networks Attacks, Unauthorized Access and
Use, Hardware/Software/Information Theft and System
Failure
after completing this section you will be
able to
Describe various types of Internet and network attacks
(computer viruses, worms, Trojan horses, rootkits, botnets,
denial of service attacks, back doors, spoofing), and
Identify ways to safeguard (safety/security measures)
against these attacks, including using firewalls, intrusion
detection software and honeypots.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 555
Common
Internet/Network Attacks
Common Computer Security Risks #1
Internet and Networks Attacks
Chapter 11 - Manage Computing Securely. Safely and Ethically page 558
Internet and networks attacks that *jeopardize security
includes :-
jeopardize - put (someone or something) into a
situation in which there is a danger of loss, harm, or
failure
● rootkits;
● botnets;
● denial of service
attacks;
● spoofing
● computer viruses,
● worms,
● Trojan horses
Common Computer Security Risks #1
Internet and Networks Attacks
Computer Viruses, Worms, Trojan Horses, and
Rootkits
Chapter 11 - Manage Computing Securely. Safely and Ethically page 558
● Every unprotected computer is susceptible to the first
type of computer security risk
● Computer viruses, worms, Trojan horses, and rootkits
are classified as malware (short for malicious software).
● Malware - program that act without user's knowledge
and deliberately alter the computer's operation.
Common Computer Security Risks #1
Internet and Networks Attacks
Computer Viruses, Worms, Trojan Horses, and
Rootkits
Chapter 11 - Manage Computing Securely. Safely and Ethically page 558
● Virus or computer virus is a program
(computer program)
● create to infects a computer, and
gives negatives effects (damaging
files, system software, and
operating system)
● altering the operation of a computer
without user's knowledge or
permission.
Common Computer Security Risks #1
Internet and Networks Attacks
Computer Viruses, Worms, Trojan Horses, and
Rootkits
Chapter 11 - Manage Computing Securely. Safely and Ethically page 558
● Worm is also a program (computer
program)
● create to copy itself in a computer,
and gives negatives effects (using
up resources and possibly
shutting down a computer or
network)
● repeatedly copies and resides in
memory of a computer, or even in
the network.
Common Computer Security Risks #1
Internet and Networks Attacks
Computer Viruses, Worms, Trojan Horses, and
Rootkits
Chapter 11 - Manage Computing Securely. Safely and Ethically page 558
● Trojan horse is also a program
(computer program)
● looks like a legitimate program,
and gives negatives effects when
being triggered (damaging files,
system software, and operating
system)
● does not replicate such as worms.
Who ? who creates - Computer Viruses, Worms,
Trojan horse ?
Why ? why they creates these malicious program ?
What ? What is the similarities of Computer Viruses, Worms and
Trojan horse ?
and what about Rootkits ?
How ?
.. how does a viruses, or a worm infected computer ?
img src : http://www.microsoft.com/security/pc-security/conficker.
aspx
What ? What are the symptoms if a computer has been compromised
by a virus, worm, trojan horse
How ?
.. to secure (safeguards) computer from all threats
(Computer Virus, Worm, Trojan horse and rootkits - and
all of their siblings ? (spyware, back door)
Common Computer Security Risks #1
Internet and Networks Attacks
Computer Viruses, Worms, Trojan Horses, and
Rootkits
What ?
What are the symptoms if a computer has been compromised
by a virus, worm, trojan horse
● operating system (OS) run much slower than usual
● available memory is less than expected
● files becomes corrupted
● screen displays unusual message or image
● musics or unusual sounds play
randomly
● existing programs and files
disappear
● system properties change
● OS does not start-up
● OS shuts down unexpectedly
How
to safeguards a
computer from viruses ?
Chapter 11 - Manage Computing Securely. Safely and Ethically page 560
● by using any antivirus program, user can safeguards a
computer system from viruses and other malware.
● Antivirus program - a program that protects
computer against viruses by identifying and removing
any computer viruses found in memory, on storage
media or on incoming files.
● Popular antivirus program ;
○ Kaspersky Anti-Virus
○ avast! antivirus
○ CA Anti-Virus
○ McAfee VirusScan
○ AVG Anti-Virus
Chapter 11 - Manage Computing Securely. Safely and Ethically page 560
Safeguards against Computer Viruses and other
Malware
Common Computer Security Risks #1
Internet and Networks Attacks
Chapter 11 - Manage Computing Securely. Safely and Ethically page 562
Internet and networks attacks that jeopardize security
includes :-
jeopardize - put (someone or something) into a
situation in which there is a danger of loss, harm, or
failure
● rootkits;
● botnets;
● denial of service
attacks;
● spoofing
● computer viruses,
● worms,
● Trojan horses
Common Computer Security Risks #1
Internet and Networks Attacks
Botnets; Denial of Services (DoS) Attacks; and Spoofing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 562
● group of compromised computers
in a network.
● compromised computers also
known as zombies - a computer that
being controlled remotely by an
outsider.
● used as a part of network to attack
other networks, usually for *nefarious
purposes.
nefarious - wicked or criminal: "the nefarious activities of the
organized-crime syndicates".
.
Common Computer Security Risks #1
Internet and Networks Attacks
Botnets; Denial of Services (DoS) Attacks; and Spoofing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 562
● an assault to an Internet services
(example of Internet services : web
e-mails).
● purpose to disrupt computer
access to an Internet services
● variant of DoS is distributed DoS or
DDoS (using zombies).
Common Computer Security Risks #1
Internet and Networks Attacks
Botnets; Denial of Services (DoS) Attacks; and Spoofing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 563
● technique that make their network
or Internet transmission appear
legitimate to a victim computer or
network.
● spoofing variants includes ;
○ e-mail spoofing
○ IP-spoofing
Common Computer Security Risks #1
Internet and Networks Attacks
Chapter 11 - Manage Computing Securely. Safely and Ethically page 562
Internet and networks attacks that *jeopardize security
includes :-
jeopardize - put (someone or something) into a
situation in which there is a danger of loss, harm, or
failure
● rootkits;
● botnets;
● denial of service
attacks;
● spoofing
● computer viruses,
● worms,
● Trojan horses
Chapter 11 - Manage Computing Securely. Safely and Ethically page 560
How
to safeguards a
computer from ..
Botnets, DoS, DDoS, Spoofing - and all of their
siblings ? (rootkit, back doors)
Chapter 11 - Manage Computing Securely. Safely and Ethically page 563
Safeguards against Botnets, DoS/DDoS Attacks, Back
Doors and Spoofing
some of the latest antivirus programs include provisions to
protect a computer from DoS/DDoS attacks.
user also can ;
● use firewall solutions,
● install an *intrusion detection software, and
● setup *honeypots
Firewall ;
● is a hardware and/or software
● protect a network’s resources from intrusion by users on
another network (i.e Internet)
● should be implemented in all networked computer.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 563
Safeguards against Botnets, DoS/DDoS Attacks, Back
Doors and Spoofing
Personal Firewall ;
● is a utility program (firewall software)
● detects and protects personal computer and its data
from unauthorized intrusions.
● constantly monitor transmissions and inform user of any
attempted intrusion.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 563
Safeguards against Botnets, DoS/DDoS Attacks, Back
Doors and Spoofing
Stand-Alone Personal Firewall
Software
● Norton Personal Firewall
● CA Personal Firewall
● McAfee Internet Security
● Webroot Desktop Firewall
● ZoneAlam Pro
● *Windows Firewall
* included with the installation of
Windows-based operating system
example concept, the uses of Firewall ;
Chapter 11 - Manage Computing Securely. Safely and Ethically page 563
Safeguards against Botnets, DoS/DDoS Attacks, Back
Doors and Spoofing
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 564
The more common computer security risks
include :-
Internet and Networks Attacks, Unauthorized Access and
Use, Hardware/Software/Information Theft and System
Failure
Chapter 11 - Manage Computing Securely. Safely and Ethically page 564
Common Computer Security Risks #2
Unauthorized Access
and Use
● Unauthorized access - the use of a computer
without permission.
● Unauthorized use - the use of computer or
its data for unapproved or possibly illegal
act.
○ illegal act includes;
■ sending personal e-mail messages.
■ accessing to a bank computer and perform
unauthorized transfer,
■ etc
Chapter 11 - Manage Computing Securely. Safely and Ethically page 565
How
to safeguards a computer from ..
Unauthorized Access and Use
Chapter 11 - Manage Computing Securely. Safely and Ethically page 565
Safeguards against Unauthorized Access and Use
● organizations should use access control to minimize the
chance of a perpetrator intentionally accessing
confidential information on a computer.
● Access control - a security measure that defines who
can access computer, what actions they can take while
accessing the computer.
● Two-phases process in implementing access-control is ;
○ identification ,
■ process to verifies the validity of a user.
○ authentication
■ process to verifies the individual is the person he or she claims to
be.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 566
Safeguards against Unauthorized Access and Use
● Identification and Authentication Methods
○ user name
○ password
● User name or user ID (identification), is a unique
combination of characters (alphanumeric) that identifies
one specific user.
● Password, private combination of characters
associated with the user name that allow access to
certain computer resources.
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
The more common computer security risks
include :-
Internet and Networks Attacks, Unauthorized Access and
Use, Hardware/Software/Information Theft and System
Failure
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
Common Computer Security Risks #3
Hardware/Software/Information
Theft
● hardware theft - act of stealing computer equipment.
● software theft's variants act includes;
■ steals software media
■ intentionally erases programs
■ illegally copies a programs, OR/AND
■ illegally registers and/or activates program
● information theft - act of stealing personal or confidential
info.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
How
to safeguards a computer
from ..
Hardware, Software, Information
Theft
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
Safeguards against Hardware Theft
● using physical access controls such as ;
○ locked doors and windows
● installing alarm systems for additional security.
● attach physical security devices such as cables that lock
○ equipment to desk.
○ mobile computer to a stationary object.
● to protect software media from
being stolen owners should keep ..
○ original software boxes and media in
secure location (i.e media cabinets with
lock).
● to protect from software piracy,
software manufacturers should ..
○ issue users license agreement,
■ the right to use the software
● (single user license/end-user license
agreement)
Chapter 11 - Manage Computing Securely. Safely and Ethically page 571
Safeguards against Software Theft
● to protect information on the Internet and
networks, organizations and individuals use
a variety of encryption techniques.
○ encryption - converting readable data (plaintext) into
unreadable characters (ciphertext), preventing
unauthorized access.
○ decryption - converting unreadable data (ciphertext)
to its original state/data (plaintext)
○ the study of encryption and decryption process (to
promote a secure communication) is often known as
a cryptography.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 573
Safeguards against Information Theft
Computer Security Risks cont'
Chapter 11 - Manage Computing Securely. Safely and Ethically page 575
The more common computer security risks
include :-
Internet and Networks Attacks, Unauthorized Access and
Use, Hardware/Software/Information Theft and System
Failure
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
Common Computer Security Risks #4
System Failure
● System failure is a prolonged malfunction of a
computer.
● It can cause loss of ;
○ hardware, software, data and information.
● Cause ;
○ aging hardware
○ natural disasters (fires, flood, hurricanes,
earthquake)
○ random events (*electrical power problems)
○ error in computer program
* the most common cause of system failure
Chapter 11 - Manage Computing Securely. Safely and Ethically page 570
How
to safeguards a computer
from ..
System Failure ?
● to protect against electrical power
variations, use
■ surge protector (also called surge-
protector)
● uses special electrical components to ;
○ stabilize current flow, and keep out
overvoltage from reaching
computer/electronic equipment.
■ uninterruptable power supply (UPS)
● a device that contains surge protection
circuit and a batteries - that provide
temporary power during loss of power.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 571
Safeguards against System Failure
Chapter 11 - Manage Computing Securely. Safely and Ethically page 577
How
to safeguards a computer from ..
ALL OF THE ABOVE ?
Common Security Risk ;
#1 Internet & Network Attacks
#2 Unauthorized Access & Use
#3 Theft (Hardware/Software/Information)
#4 System Failure
● to protect against all computer security
risk, computer user should ;
■ back-up (duplicates files,program or
disk) so it can be used (restore) if
the original is lost, damage or
destroyed.
● to back-up is to make a copy of files,
program or disk
○ manually back-up - copy data to any
available storage media.
○ back-up program/software
Chapter 11 - Manage Computing Securely. Safely and Ethically page 577
Ultimate Safeguards -
Back-up
Ultimate Safeguards -
Human Aspects : Awareness
previous CS015 Computer Security Risk slideshow
● expose employees or staff to computer
security through continuously security training,
courses.
● make a systematic routine check to update
(security patches, virus definition,other
malicious code) a computer system - early
preventing a threat/risks.
● proper handling of computer and information
Objectives check !
● defining ;
○ computer ethics, computer security risks
● list areas of computer ethics.
● identify types of security risks.
● identify different ways to overcome security risks
● identify types of Intellectual Property
● describe the importance of Intellectual Property
Ethics and Society cont'
Seven (7) frequently discussed areas of
computer ethics are :-
1. unauthorized use of computers & networks.
2. software theft (piracy).
3. information accuracy.
4. intellectual property rights.
5. codes of conduct.
6. information privacy, and
7. green computing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
OK let’s discuss,
:)
Ethics and Society
Ethics,
standards determine whether an action is good
or bad
Computer Ethics,
moral guidelines that govern the use of
computers and information systems.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
Ethics and Society cont'
Seven (7) frequently discussed areas of
computer ethics are :-
1. unauthorized use of computers & networks.
2. software theft (piracy).
3. information accuracy.
4. intellectual property rights.
5. codes of conduct.
6. information privacy, and
7. green computing.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
Ethics and Society cont'
Information Accuracy
Terminologies and their meaning ;
● Intellectual Property (IP) - unique and original works (i.e ideas,
inventions,art,writing,product,logos)
○ Intellectual property rights - rights to which creator are
entitled for their work.
■ Copyright - exclusive rights given to author/artist for their
materials.
● copyright infringement is piracy
○ infringement is a violation (an act that disregard an
agreement of a right)
● Code of Conduct - written guideline that help determine whether a
specific computer action is ethical or unethical.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 582
Ethics and Society cont'
Importance of Intellectual Property
The importance of Intellectual Property ;
● to protect the original creation from individuals.
● to preserve features and process that make thing work ( inventor
will therefore benefits - get a profit , from their work)
previous CS015 Computer Security Risk slideshow
Ethics and Society cont'
Type of Intellectual Property
http://www.myipo.gov.my/home
A patent is an exclusive right granted for an
invention, which is a product or a process that
provides a new way of doing something, or
offers a new technical solution to a problem.
A trade mark is a sign which distinguishes the
goods and services of one trader from those of
another. A mark includes words, logos,
pictures, names, letters, numbers or a
combination of these.
A copyright exclusive rights given to
author/artist for their materials (literary works;
musical works; artistic works; films; sound
recordings; broadcasts; and derivative works)
http://www.myipo.gov.my/home
Ethics and Society cont'
Code of Conduct
Code of Conduct - written guideline that help determine whether a specific computer action is ethical
or unethical.
The sample of IT Code of Conduct ;
Chapter 11 - Manage Computing Securely. Safely and Ethically page 583
Ethics and Society cont'
Information Privacy
Terminologies and their meaning ;
● Information Privacy - right of individuals and companies to deny
or restrict the collection and use of information about them.
○ Risk relating to privacy of information ;
■ Spam
■ Phishing
■ Pharming
■ Spyware and Adware
Chapter 11 - Manage Computing Securely. Safely and Ethically page 582
Ethics and Society cont'
Information Privacy : Risk#1 Spam
Spam (also known as Internet junk mail)
● Spam - unsolicited e-mail message or newsgroup posting sent to
many recipients or newsgroup at once.
○ *unsolicited - not asked for, given or done voluntarily : “unsolicited junk mail”
● content of spam ranges from
○ selling product or service
○ promoting business opportunity
○ advertising offensive material
Safeguard your privacy from Spam !
1. use e-mail filtering - a service that block e-mail messages from
designated sources
2. purchase and use anti-spam program - help to remove spam before it
reaches your inbox
Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
Ethics and Society cont'
Information Privacy : Risk#1 Spam
example (spam e-mail message)
Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
Ethics and Society cont'
Information Privacy : Risk#2 Phishing
Phishing (also known as Scam)
● Phishing - a scam in which perpetrator sends and official looking
e-mail message that attempt to obtain individuals personal
and financial information.
● method of operations ;
○ an e-mail asking to reply a personal information, or
○ an e-mail with a link that direct individuals to a phony (fake)
Web to collect the information.
Safeguard your privacy from Phishing !
1. if an e-mail looks legitimate, it is recommend to visit the official site
directly (never click the link provided in the e-mail)
2. use phishing filter (available in some Web browsers) - a program that
warns or block user from potentially fraudulent (fake) or suspicious
sites.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
Ethics and Society cont'
Information Privacy : Risk#3 Pharming
Pharming (also known as Scam, similar to Phishing)
● Pharming - a scam in where perpetrator attempts to get individuals
personal and financial information via spoofing process
● method of operations ;
○ user type in a Web address in the Web browser, user will
redirected to a phony Web sites that looks legitimate.
○ the phony (fake) Web sites is use to collect the victim
information.
Safeguard your privacy from Pharming !
1. if an e-mail looks legitimate, it is recommend to visit the official site directly (never
click the link provided in the e-mail)
2. use phishing filter (available in some Web browsers) - a program that warns or
block users from potentially fraudulent (fake) or suspicious sites.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 588
Ethics and Society cont'
Information Privacy : Risk#4 Spyware & Adware
Spyware
● a program placed on a computer without the user’s knowledge.
● the program secretly collect information about the user.
● method of operations ;
○ collect information regarding user’s Web browsing habits by
hiding spyware in adware - a program display an online
advertisement in a banner or pop-up windows on Web page, e-
mail messages, or other Internet services.
Safeguard your privacy from Spyware & Adware !
1. use spyware and adware remover - a program that helps to detect and
remove/delete spyware and adware.
2. some operating systems and Web browsers include spyware removers.
Chapter 11 - Manage Computing Securely. Safely and Ethically page 588
Chapter 11 - Manage Computing Securely. Safely and Ethically page 584
Ethics and Society cont'
Green Computing
● involves reducing the electricity and
environmental waste while using a computer
Conclusion
This chapter identified some potential computer security
risks and the safeguards (security measure) that
organizations and individuals can implement to minimize
the risks.

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Computer security risks
Computer security risksComputer security risks
Computer security risksAasim Mushtaq
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security PresentationPraphullaShrestha1
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyrightAdyns
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationRitik Kumar
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and SecurityNoushad Hasan
 
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012Ceremit srl
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best PracticesEvolve IP
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS sohail awan
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylifessuser98b1f71
 

Was ist angesagt? (20)

Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
Computer ethics & copyright
Computer ethics & copyrightComputer ethics & copyright
Computer ethics & copyright
 
Computer security and
Computer security andComputer security and
Computer security and
 
System Security-Chapter 1
System Security-Chapter 1System Security-Chapter 1
System Security-Chapter 1
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware
MalwareMalware
Malware
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012
Ingegneria Sociale Seminario Sulla Tutela Dei Dati Strategici Aziendali 28112012
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Cyber Hygiene in Dailylife
Cyber Hygiene in DailylifeCyber Hygiene in Dailylife
Cyber Hygiene in Dailylife
 

Andere mochten auch

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and RisksMiguel Rebollo
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal IssuesKak Yong
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer SecurityDamian T. Gordon
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsJagan Nath
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer securityArzath Areeff
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
 

Andere mochten auch (20)

Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Computer Security and Risks
Computer Security and RisksComputer Security and Risks
Computer Security and Risks
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
Computer Ethics and Legal Issues
Computer Ethics and Legal IssuesComputer Ethics and Legal Issues
Computer Ethics and Legal Issues
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
3.4 Type of Website
3.4 Type of Website3.4 Type of Website
3.4 Type of Website
 
Operating Systems: Computer Security
Operating Systems: Computer SecurityOperating Systems: Computer Security
Operating Systems: Computer Security
 
3.1 Network Basic
3.1 Network Basic3.1 Network Basic
3.1 Network Basic
 
3.2.1 The Internet
3.2.1 The Internet3.2.1 The Internet
3.2.1 The Internet
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Basic concepts in computer security
Basic concepts in computer securityBasic concepts in computer security
Basic concepts in computer security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Introduction to ethics 1
Introduction to ethics 1Introduction to ethics 1
Introduction to ethics 1
 

Ähnlich wie Chapter 4 Computer Science :: Computer Ethics and Security

Network security
Network securityNetwork security
Network securitymena kaheel
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptxKhristine Botin
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securitypinkutinku26
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?Faith Zeller
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network SecurityAnjan Mahanta
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security BasicsMohan Jadhav
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of securitySejahtera Affif
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfTakshila Learning
 
Presentation (6) (1).pptx
Presentation (6) (1).pptxPresentation (6) (1).pptx
Presentation (6) (1).pptxMohdHassan92
 

Ähnlich wie Chapter 4 Computer Science :: Computer Ethics and Security (20)

Network security
Network securityNetwork security
Network security
 
Computer Safety and Ethics.pptx
Computer Safety and Ethics.pptxComputer Safety and Ethics.pptx
Computer Safety and Ethics.pptx
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
cyber crime, Cyber Security, Introduction, Umakant Bhaskar Gohatre
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 
Computer securety
Computer securetyComputer securety
Computer securety
 
13.02 Network Security
13.02   Network Security13.02   Network Security
13.02 Network Security
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Cscu module 01 foundations of security
Cscu module 01 foundations of securityCscu module 01 foundations of security
Cscu module 01 foundations of security
 
Cyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdfCyber Safety Class 4 Computers Worksheet.pdf
Cyber Safety Class 4 Computers Worksheet.pdf
 
Presentation (6) (1).pptx
Presentation (6) (1).pptxPresentation (6) (1).pptx
Presentation (6) (1).pptx
 

Mehr von Fizaril Amzari Omar

Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Fizaril Amzari Omar
 
Chapter 5 Multimedia SC025 2017/2018
Chapter 5 Multimedia SC025 2017/2018Chapter 5 Multimedia SC025 2017/2018
Chapter 5 Multimedia SC025 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (k)
PDT DC015 Chapter 2 Computer System 2017/2018 (k)PDT DC015 Chapter 2 Computer System 2017/2018 (k)
PDT DC015 Chapter 2 Computer System 2017/2018 (k)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (j)
PDT DC015 Chapter 2 Computer System 2017/2018 (j)PDT DC015 Chapter 2 Computer System 2017/2018 (j)
PDT DC015 Chapter 2 Computer System 2017/2018 (j)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (i)
PDT DC015 Chapter 2 Computer System 2017/2018 (i)PDT DC015 Chapter 2 Computer System 2017/2018 (i)
PDT DC015 Chapter 2 Computer System 2017/2018 (i)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (g)
PDT DC015 Chapter 2 Computer System 2017/2018 (g)PDT DC015 Chapter 2 Computer System 2017/2018 (g)
PDT DC015 Chapter 2 Computer System 2017/2018 (g)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (f)
PDT DC015 Chapter 2 Computer System 2017/2018 (f)PDT DC015 Chapter 2 Computer System 2017/2018 (f)
PDT DC015 Chapter 2 Computer System 2017/2018 (f)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 Computer System 2017/2018 (d)
PDT DC015 Chapter 2 Computer System 2017/2018 (d)PDT DC015 Chapter 2 Computer System 2017/2018 (d)
PDT DC015 Chapter 2 Computer System 2017/2018 (d)Fizaril Amzari Omar
 
PDT DC015 Chapter 2 System Concept 2017/2018 (a)
PDT DC015 Chapter 2 System Concept 2017/2018 (a)PDT DC015 Chapter 2 System Concept 2017/2018 (a)
PDT DC015 Chapter 2 System Concept 2017/2018 (a)Fizaril Amzari Omar
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 3 Internet Technology (V) 2017/2018
PST SC015 Chapter 3 Internet Technology (V)  2017/2018PST SC015 Chapter 3 Internet Technology (V)  2017/2018
PST SC015 Chapter 3 Internet Technology (V) 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
PST SC015 Chapter 3 Internet Technology (IV)  2017/2018PST SC015 Chapter 3 Internet Technology (IV)  2017/2018
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018Fizaril Amzari Omar
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018Fizaril Amzari Omar
 

Mehr von Fizaril Amzari Omar (20)

Chapter 7 Information System
Chapter 7 Information SystemChapter 7 Information System
Chapter 7 Information System
 
Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018Chapter 6 Database SC025 2017/2018
Chapter 6 Database SC025 2017/2018
 
Chapter 5 Multimedia SC025 2017/2018
Chapter 5 Multimedia SC025 2017/2018Chapter 5 Multimedia SC025 2017/2018
Chapter 5 Multimedia SC025 2017/2018
 
PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018PST SC015 Chapter 2 Computer System 2017/2018
PST SC015 Chapter 2 Computer System 2017/2018
 
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)PDT DC015 Chapter 2 Computer System 2017/2018 (m)
PDT DC015 Chapter 2 Computer System 2017/2018 (m)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (k)
PDT DC015 Chapter 2 Computer System 2017/2018 (k)PDT DC015 Chapter 2 Computer System 2017/2018 (k)
PDT DC015 Chapter 2 Computer System 2017/2018 (k)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (j)
PDT DC015 Chapter 2 Computer System 2017/2018 (j)PDT DC015 Chapter 2 Computer System 2017/2018 (j)
PDT DC015 Chapter 2 Computer System 2017/2018 (j)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (i)
PDT DC015 Chapter 2 Computer System 2017/2018 (i)PDT DC015 Chapter 2 Computer System 2017/2018 (i)
PDT DC015 Chapter 2 Computer System 2017/2018 (i)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (g)
PDT DC015 Chapter 2 Computer System 2017/2018 (g)PDT DC015 Chapter 2 Computer System 2017/2018 (g)
PDT DC015 Chapter 2 Computer System 2017/2018 (g)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (f)
PDT DC015 Chapter 2 Computer System 2017/2018 (f)PDT DC015 Chapter 2 Computer System 2017/2018 (f)
PDT DC015 Chapter 2 Computer System 2017/2018 (f)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)PDT DC015 Chapter 2 Computer System 2017/2018 (e)
PDT DC015 Chapter 2 Computer System 2017/2018 (e)
 
PDT DC015 Chapter 2 Computer System 2017/2018 (d)
PDT DC015 Chapter 2 Computer System 2017/2018 (d)PDT DC015 Chapter 2 Computer System 2017/2018 (d)
PDT DC015 Chapter 2 Computer System 2017/2018 (d)
 
PDT DC015 Chapter 2 System Concept 2017/2018 (a)
PDT DC015 Chapter 2 System Concept 2017/2018 (a)PDT DC015 Chapter 2 System Concept 2017/2018 (a)
PDT DC015 Chapter 2 System Concept 2017/2018 (a)
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
PST SC015 Chapter 3 Internet Technology (V) 2017/2018
PST SC015 Chapter 3 Internet Technology (V)  2017/2018PST SC015 Chapter 3 Internet Technology (V)  2017/2018
PST SC015 Chapter 3 Internet Technology (V) 2017/2018
 
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
PST SC015 Chapter 3 Internet Technology (IV)  2017/2018PST SC015 Chapter 3 Internet Technology (IV)  2017/2018
PST SC015 Chapter 3 Internet Technology (IV) 2017/2018
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
PST SC015 Chapter 3 Internet Technology (II)  2017/2018PST SC015 Chapter 3 Internet Technology (II)  2017/2018
PST SC015 Chapter 3 Internet Technology (II) 2017/2018
 
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
PST SC015 Chapter 3 Internet Technology (I)  2017/2018PST SC015 Chapter 3 Internet Technology (I)  2017/2018
PST SC015 Chapter 3 Internet Technology (I) 2017/2018
 
PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018PST SC015 Chapter 2 Computer System (IV) 2017/2018
PST SC015 Chapter 2 Computer System (IV) 2017/2018
 

Kürzlich hochgeladen

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 

Kürzlich hochgeladen (20)

Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 

Chapter 4 Computer Science :: Computer Ethics and Security

  • 1.
  • 2.
  • 3. Why ? At the end of this chapter, student should be able to : ● defining ; ○ computer ethics, computer security risks ● list areas of computer ethics. ● identify types of security risks. ● identify different ways to overcome security risks ● identify types of Intellectual Property ● describe the importance of Intellectual Property why peoples, especially students who enrolled SC015 need to acquire the knowledge of - Computer Ethics & Security ?
  • 4. Ethics and Society Ethics, standards determine whether an action is good or bad Computer Ethics, moral guidelines that govern the use of computers and information systems. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
  • 5. Ethics and Society cont' Seven (7) frequently discussed areas of computer ethics are :- 1. unauthorized use of computers & networks. 2. software theft (piracy). 3. information accuracy. 4. intellectual property rights. 5. codes of conduct. 6. information privacy, and 7. green computing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
  • 6. Ethics and Society cont' Seven (7) frequently discussed areas of computer ethics are :- 1. unauthorized use of computers & networks. 2. software theft (piracy). 3. information accuracy. 4. intellectual property rights. 5. codes of conduct. 6. information privacy, and 7. green computing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581 We discuss about these list later, :)
  • 7. Computer Security Risks Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 Computer Security Risks any event or action that could cause a loss or damage to computer Computer Crime any illegal act involving a computer. Cybercrime online or Internet-based illegal acts.
  • 8. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 *Perpetrators of cybercrime fall into seven (7) basic categories :- hacker, cracker, script kiddie, corporate spy, unethical employee, cyberextortionist and cyberterrorist. perpetrators - someone who has committed a crime
  • 9. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 #1. Hacker ● a computer *enthusiast. ● accessing computer or network illegally. ● the intention of their security breaches is to improve security. ● advanced computer & network skills. enthusiast - person who is highly interested in a particular activity or subject.
  • 10. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 #2. Cracker ● illegally accessing computer with intention to, ● destroy data, stealing information and attempting several malicious act. ● advanced computer & network skills.
  • 11. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 #3. Script Kiddie ● same intention with cracker BUT, ● lack technical skills knowledge. ● depends on prewritten hacking and cracking programs to break into computers. enthusiast - person who is highly interested in a particular activity or subject.
  • 12. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 #4. Corporate Spy ● excellent computer & networking skills. ● hired to break & steals *proprietary data & informations in a computers, OR ● to help identify security risks in own companies. proprietary - relating to an owner or ownership.
  • 13. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 556 #5. Unethical Employee ● exploiting a security weakness. ● seeking financial gains from selling confidential information. ● unsatisfied employees may want to revenge. proprietary - relating to an owner or ownership.
  • 14. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 557 #6. Cyberextortionist ● uses e-mail for extortion. ● threatening (if they are not paid with money) actions such as :- ○ exposing confidential information ○ exploit security flaw ○ launch an attack (compromising the organization's network)
  • 15. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 557 #7. Cyberterrorist ● uses Internet or network to, ● destroy or damage computers for, ● political reasons ● targetting :- ○ nation's air traffic control system ○ electricity-generating companies ○ telecommunications infrastructures.
  • 16. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 557 The more common computer security risks include :- Internet and Networks Attacks, Unauthorized Access and Use, Hardware/Software/Information Theft and System Failure
  • 17. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 557 The more common computer security risks include :-
  • 18. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 557 The more common computer security risks include :- Internet and Networks Attacks, Unauthorized Access and Use, Hardware/Software/Information Theft and System Failure
  • 19. after completing this section you will be able to Describe various types of Internet and network attacks (computer viruses, worms, Trojan horses, rootkits, botnets, denial of service attacks, back doors, spoofing), and Identify ways to safeguard (safety/security measures) against these attacks, including using firewalls, intrusion detection software and honeypots. Chapter 11 - Manage Computing Securely. Safely and Ethically page 555 Common Internet/Network Attacks
  • 20. Common Computer Security Risks #1 Internet and Networks Attacks Chapter 11 - Manage Computing Securely. Safely and Ethically page 558 Internet and networks attacks that *jeopardize security includes :- jeopardize - put (someone or something) into a situation in which there is a danger of loss, harm, or failure ● rootkits; ● botnets; ● denial of service attacks; ● spoofing ● computer viruses, ● worms, ● Trojan horses
  • 21. Common Computer Security Risks #1 Internet and Networks Attacks Computer Viruses, Worms, Trojan Horses, and Rootkits Chapter 11 - Manage Computing Securely. Safely and Ethically page 558 ● Every unprotected computer is susceptible to the first type of computer security risk ● Computer viruses, worms, Trojan horses, and rootkits are classified as malware (short for malicious software). ● Malware - program that act without user's knowledge and deliberately alter the computer's operation.
  • 22. Common Computer Security Risks #1 Internet and Networks Attacks Computer Viruses, Worms, Trojan Horses, and Rootkits Chapter 11 - Manage Computing Securely. Safely and Ethically page 558 ● Virus or computer virus is a program (computer program) ● create to infects a computer, and gives negatives effects (damaging files, system software, and operating system) ● altering the operation of a computer without user's knowledge or permission.
  • 23. Common Computer Security Risks #1 Internet and Networks Attacks Computer Viruses, Worms, Trojan Horses, and Rootkits Chapter 11 - Manage Computing Securely. Safely and Ethically page 558 ● Worm is also a program (computer program) ● create to copy itself in a computer, and gives negatives effects (using up resources and possibly shutting down a computer or network) ● repeatedly copies and resides in memory of a computer, or even in the network.
  • 24. Common Computer Security Risks #1 Internet and Networks Attacks Computer Viruses, Worms, Trojan Horses, and Rootkits Chapter 11 - Manage Computing Securely. Safely and Ethically page 558 ● Trojan horse is also a program (computer program) ● looks like a legitimate program, and gives negatives effects when being triggered (damaging files, system software, and operating system) ● does not replicate such as worms.
  • 25. Who ? who creates - Computer Viruses, Worms, Trojan horse ? Why ? why they creates these malicious program ? What ? What is the similarities of Computer Viruses, Worms and Trojan horse ? and what about Rootkits ? How ? .. how does a viruses, or a worm infected computer ?
  • 26. img src : http://www.microsoft.com/security/pc-security/conficker. aspx
  • 27. What ? What are the symptoms if a computer has been compromised by a virus, worm, trojan horse How ? .. to secure (safeguards) computer from all threats (Computer Virus, Worm, Trojan horse and rootkits - and all of their siblings ? (spyware, back door) Common Computer Security Risks #1 Internet and Networks Attacks Computer Viruses, Worms, Trojan Horses, and Rootkits
  • 28. What ? What are the symptoms if a computer has been compromised by a virus, worm, trojan horse ● operating system (OS) run much slower than usual ● available memory is less than expected ● files becomes corrupted ● screen displays unusual message or image ● musics or unusual sounds play randomly ● existing programs and files disappear ● system properties change ● OS does not start-up ● OS shuts down unexpectedly
  • 29. How to safeguards a computer from viruses ? Chapter 11 - Manage Computing Securely. Safely and Ethically page 560
  • 30. ● by using any antivirus program, user can safeguards a computer system from viruses and other malware. ● Antivirus program - a program that protects computer against viruses by identifying and removing any computer viruses found in memory, on storage media or on incoming files. ● Popular antivirus program ; ○ Kaspersky Anti-Virus ○ avast! antivirus ○ CA Anti-Virus ○ McAfee VirusScan ○ AVG Anti-Virus Chapter 11 - Manage Computing Securely. Safely and Ethically page 560 Safeguards against Computer Viruses and other Malware
  • 31. Common Computer Security Risks #1 Internet and Networks Attacks Chapter 11 - Manage Computing Securely. Safely and Ethically page 562 Internet and networks attacks that jeopardize security includes :- jeopardize - put (someone or something) into a situation in which there is a danger of loss, harm, or failure ● rootkits; ● botnets; ● denial of service attacks; ● spoofing ● computer viruses, ● worms, ● Trojan horses
  • 32. Common Computer Security Risks #1 Internet and Networks Attacks Botnets; Denial of Services (DoS) Attacks; and Spoofing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 562 ● group of compromised computers in a network. ● compromised computers also known as zombies - a computer that being controlled remotely by an outsider. ● used as a part of network to attack other networks, usually for *nefarious purposes. nefarious - wicked or criminal: "the nefarious activities of the organized-crime syndicates". .
  • 33. Common Computer Security Risks #1 Internet and Networks Attacks Botnets; Denial of Services (DoS) Attacks; and Spoofing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 562 ● an assault to an Internet services (example of Internet services : web e-mails). ● purpose to disrupt computer access to an Internet services ● variant of DoS is distributed DoS or DDoS (using zombies).
  • 34. Common Computer Security Risks #1 Internet and Networks Attacks Botnets; Denial of Services (DoS) Attacks; and Spoofing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 563 ● technique that make their network or Internet transmission appear legitimate to a victim computer or network. ● spoofing variants includes ; ○ e-mail spoofing ○ IP-spoofing
  • 35. Common Computer Security Risks #1 Internet and Networks Attacks Chapter 11 - Manage Computing Securely. Safely and Ethically page 562 Internet and networks attacks that *jeopardize security includes :- jeopardize - put (someone or something) into a situation in which there is a danger of loss, harm, or failure ● rootkits; ● botnets; ● denial of service attacks; ● spoofing ● computer viruses, ● worms, ● Trojan horses
  • 36. Chapter 11 - Manage Computing Securely. Safely and Ethically page 560 How to safeguards a computer from .. Botnets, DoS, DDoS, Spoofing - and all of their siblings ? (rootkit, back doors)
  • 37. Chapter 11 - Manage Computing Securely. Safely and Ethically page 563 Safeguards against Botnets, DoS/DDoS Attacks, Back Doors and Spoofing some of the latest antivirus programs include provisions to protect a computer from DoS/DDoS attacks. user also can ; ● use firewall solutions, ● install an *intrusion detection software, and ● setup *honeypots
  • 38. Firewall ; ● is a hardware and/or software ● protect a network’s resources from intrusion by users on another network (i.e Internet) ● should be implemented in all networked computer. Chapter 11 - Manage Computing Securely. Safely and Ethically page 563 Safeguards against Botnets, DoS/DDoS Attacks, Back Doors and Spoofing
  • 39. Personal Firewall ; ● is a utility program (firewall software) ● detects and protects personal computer and its data from unauthorized intrusions. ● constantly monitor transmissions and inform user of any attempted intrusion. Chapter 11 - Manage Computing Securely. Safely and Ethically page 563 Safeguards against Botnets, DoS/DDoS Attacks, Back Doors and Spoofing Stand-Alone Personal Firewall Software ● Norton Personal Firewall ● CA Personal Firewall ● McAfee Internet Security ● Webroot Desktop Firewall ● ZoneAlam Pro ● *Windows Firewall * included with the installation of Windows-based operating system
  • 40. example concept, the uses of Firewall ; Chapter 11 - Manage Computing Securely. Safely and Ethically page 563 Safeguards against Botnets, DoS/DDoS Attacks, Back Doors and Spoofing
  • 41. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 564 The more common computer security risks include :- Internet and Networks Attacks, Unauthorized Access and Use, Hardware/Software/Information Theft and System Failure
  • 42. Chapter 11 - Manage Computing Securely. Safely and Ethically page 564 Common Computer Security Risks #2 Unauthorized Access and Use ● Unauthorized access - the use of a computer without permission. ● Unauthorized use - the use of computer or its data for unapproved or possibly illegal act. ○ illegal act includes; ■ sending personal e-mail messages. ■ accessing to a bank computer and perform unauthorized transfer, ■ etc
  • 43. Chapter 11 - Manage Computing Securely. Safely and Ethically page 565 How to safeguards a computer from .. Unauthorized Access and Use
  • 44. Chapter 11 - Manage Computing Securely. Safely and Ethically page 565 Safeguards against Unauthorized Access and Use ● organizations should use access control to minimize the chance of a perpetrator intentionally accessing confidential information on a computer. ● Access control - a security measure that defines who can access computer, what actions they can take while accessing the computer. ● Two-phases process in implementing access-control is ; ○ identification , ■ process to verifies the validity of a user. ○ authentication ■ process to verifies the individual is the person he or she claims to be.
  • 45. Chapter 11 - Manage Computing Securely. Safely and Ethically page 566 Safeguards against Unauthorized Access and Use ● Identification and Authentication Methods ○ user name ○ password ● User name or user ID (identification), is a unique combination of characters (alphanumeric) that identifies one specific user. ● Password, private combination of characters associated with the user name that allow access to certain computer resources.
  • 46. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 The more common computer security risks include :- Internet and Networks Attacks, Unauthorized Access and Use, Hardware/Software/Information Theft and System Failure
  • 47. Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 Common Computer Security Risks #3 Hardware/Software/Information Theft ● hardware theft - act of stealing computer equipment. ● software theft's variants act includes; ■ steals software media ■ intentionally erases programs ■ illegally copies a programs, OR/AND ■ illegally registers and/or activates program ● information theft - act of stealing personal or confidential info.
  • 48. Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 How to safeguards a computer from .. Hardware, Software, Information Theft
  • 49. Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 Safeguards against Hardware Theft ● using physical access controls such as ; ○ locked doors and windows ● installing alarm systems for additional security. ● attach physical security devices such as cables that lock ○ equipment to desk. ○ mobile computer to a stationary object.
  • 50. ● to protect software media from being stolen owners should keep .. ○ original software boxes and media in secure location (i.e media cabinets with lock). ● to protect from software piracy, software manufacturers should .. ○ issue users license agreement, ■ the right to use the software ● (single user license/end-user license agreement) Chapter 11 - Manage Computing Securely. Safely and Ethically page 571 Safeguards against Software Theft
  • 51. ● to protect information on the Internet and networks, organizations and individuals use a variety of encryption techniques. ○ encryption - converting readable data (plaintext) into unreadable characters (ciphertext), preventing unauthorized access. ○ decryption - converting unreadable data (ciphertext) to its original state/data (plaintext) ○ the study of encryption and decryption process (to promote a secure communication) is often known as a cryptography. Chapter 11 - Manage Computing Securely. Safely and Ethically page 573 Safeguards against Information Theft
  • 52. Computer Security Risks cont' Chapter 11 - Manage Computing Securely. Safely and Ethically page 575 The more common computer security risks include :- Internet and Networks Attacks, Unauthorized Access and Use, Hardware/Software/Information Theft and System Failure
  • 53. Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 Common Computer Security Risks #4 System Failure ● System failure is a prolonged malfunction of a computer. ● It can cause loss of ; ○ hardware, software, data and information. ● Cause ; ○ aging hardware ○ natural disasters (fires, flood, hurricanes, earthquake) ○ random events (*electrical power problems) ○ error in computer program * the most common cause of system failure
  • 54. Chapter 11 - Manage Computing Securely. Safely and Ethically page 570 How to safeguards a computer from .. System Failure ?
  • 55. ● to protect against electrical power variations, use ■ surge protector (also called surge- protector) ● uses special electrical components to ; ○ stabilize current flow, and keep out overvoltage from reaching computer/electronic equipment. ■ uninterruptable power supply (UPS) ● a device that contains surge protection circuit and a batteries - that provide temporary power during loss of power. Chapter 11 - Manage Computing Securely. Safely and Ethically page 571 Safeguards against System Failure
  • 56. Chapter 11 - Manage Computing Securely. Safely and Ethically page 577 How to safeguards a computer from .. ALL OF THE ABOVE ? Common Security Risk ; #1 Internet & Network Attacks #2 Unauthorized Access & Use #3 Theft (Hardware/Software/Information) #4 System Failure
  • 57. ● to protect against all computer security risk, computer user should ; ■ back-up (duplicates files,program or disk) so it can be used (restore) if the original is lost, damage or destroyed. ● to back-up is to make a copy of files, program or disk ○ manually back-up - copy data to any available storage media. ○ back-up program/software Chapter 11 - Manage Computing Securely. Safely and Ethically page 577 Ultimate Safeguards - Back-up
  • 58. Ultimate Safeguards - Human Aspects : Awareness previous CS015 Computer Security Risk slideshow ● expose employees or staff to computer security through continuously security training, courses. ● make a systematic routine check to update (security patches, virus definition,other malicious code) a computer system - early preventing a threat/risks. ● proper handling of computer and information
  • 59. Objectives check ! ● defining ; ○ computer ethics, computer security risks ● list areas of computer ethics. ● identify types of security risks. ● identify different ways to overcome security risks ● identify types of Intellectual Property ● describe the importance of Intellectual Property
  • 60. Ethics and Society cont' Seven (7) frequently discussed areas of computer ethics are :- 1. unauthorized use of computers & networks. 2. software theft (piracy). 3. information accuracy. 4. intellectual property rights. 5. codes of conduct. 6. information privacy, and 7. green computing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581 OK let’s discuss, :)
  • 61. Ethics and Society Ethics, standards determine whether an action is good or bad Computer Ethics, moral guidelines that govern the use of computers and information systems. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
  • 62. Ethics and Society cont' Seven (7) frequently discussed areas of computer ethics are :- 1. unauthorized use of computers & networks. 2. software theft (piracy). 3. information accuracy. 4. intellectual property rights. 5. codes of conduct. 6. information privacy, and 7. green computing. Chapter 11 - Manage Computing Securely. Safely and Ethically page 581
  • 63. Ethics and Society cont' Information Accuracy Terminologies and their meaning ; ● Intellectual Property (IP) - unique and original works (i.e ideas, inventions,art,writing,product,logos) ○ Intellectual property rights - rights to which creator are entitled for their work. ■ Copyright - exclusive rights given to author/artist for their materials. ● copyright infringement is piracy ○ infringement is a violation (an act that disregard an agreement of a right) ● Code of Conduct - written guideline that help determine whether a specific computer action is ethical or unethical. Chapter 11 - Manage Computing Securely. Safely and Ethically page 582
  • 64. Ethics and Society cont' Importance of Intellectual Property The importance of Intellectual Property ; ● to protect the original creation from individuals. ● to preserve features and process that make thing work ( inventor will therefore benefits - get a profit , from their work) previous CS015 Computer Security Risk slideshow
  • 65. Ethics and Society cont' Type of Intellectual Property http://www.myipo.gov.my/home A patent is an exclusive right granted for an invention, which is a product or a process that provides a new way of doing something, or offers a new technical solution to a problem. A trade mark is a sign which distinguishes the goods and services of one trader from those of another. A mark includes words, logos, pictures, names, letters, numbers or a combination of these. A copyright exclusive rights given to author/artist for their materials (literary works; musical works; artistic works; films; sound recordings; broadcasts; and derivative works)
  • 67. Ethics and Society cont' Code of Conduct Code of Conduct - written guideline that help determine whether a specific computer action is ethical or unethical. The sample of IT Code of Conduct ; Chapter 11 - Manage Computing Securely. Safely and Ethically page 583
  • 68. Ethics and Society cont' Information Privacy Terminologies and their meaning ; ● Information Privacy - right of individuals and companies to deny or restrict the collection and use of information about them. ○ Risk relating to privacy of information ; ■ Spam ■ Phishing ■ Pharming ■ Spyware and Adware Chapter 11 - Manage Computing Securely. Safely and Ethically page 582
  • 69. Ethics and Society cont' Information Privacy : Risk#1 Spam Spam (also known as Internet junk mail) ● Spam - unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroup at once. ○ *unsolicited - not asked for, given or done voluntarily : “unsolicited junk mail” ● content of spam ranges from ○ selling product or service ○ promoting business opportunity ○ advertising offensive material Safeguard your privacy from Spam ! 1. use e-mail filtering - a service that block e-mail messages from designated sources 2. purchase and use anti-spam program - help to remove spam before it reaches your inbox Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
  • 70. Ethics and Society cont' Information Privacy : Risk#1 Spam example (spam e-mail message) Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
  • 71. Ethics and Society cont' Information Privacy : Risk#2 Phishing Phishing (also known as Scam) ● Phishing - a scam in which perpetrator sends and official looking e-mail message that attempt to obtain individuals personal and financial information. ● method of operations ; ○ an e-mail asking to reply a personal information, or ○ an e-mail with a link that direct individuals to a phony (fake) Web to collect the information. Safeguard your privacy from Phishing ! 1. if an e-mail looks legitimate, it is recommend to visit the official site directly (never click the link provided in the e-mail) 2. use phishing filter (available in some Web browsers) - a program that warns or block user from potentially fraudulent (fake) or suspicious sites. Chapter 11 - Manage Computing Securely. Safely and Ethically page 587
  • 72. Ethics and Society cont' Information Privacy : Risk#3 Pharming Pharming (also known as Scam, similar to Phishing) ● Pharming - a scam in where perpetrator attempts to get individuals personal and financial information via spoofing process ● method of operations ; ○ user type in a Web address in the Web browser, user will redirected to a phony Web sites that looks legitimate. ○ the phony (fake) Web sites is use to collect the victim information. Safeguard your privacy from Pharming ! 1. if an e-mail looks legitimate, it is recommend to visit the official site directly (never click the link provided in the e-mail) 2. use phishing filter (available in some Web browsers) - a program that warns or block users from potentially fraudulent (fake) or suspicious sites. Chapter 11 - Manage Computing Securely. Safely and Ethically page 588
  • 73. Ethics and Society cont' Information Privacy : Risk#4 Spyware & Adware Spyware ● a program placed on a computer without the user’s knowledge. ● the program secretly collect information about the user. ● method of operations ; ○ collect information regarding user’s Web browsing habits by hiding spyware in adware - a program display an online advertisement in a banner or pop-up windows on Web page, e- mail messages, or other Internet services. Safeguard your privacy from Spyware & Adware ! 1. use spyware and adware remover - a program that helps to detect and remove/delete spyware and adware. 2. some operating systems and Web browsers include spyware removers. Chapter 11 - Manage Computing Securely. Safely and Ethically page 588
  • 74. Chapter 11 - Manage Computing Securely. Safely and Ethically page 584 Ethics and Society cont' Green Computing ● involves reducing the electricity and environmental waste while using a computer
  • 75. Conclusion This chapter identified some potential computer security risks and the safeguards (security measure) that organizations and individuals can implement to minimize the risks.