SlideShare a Scribd company logo
1 of 39
Computer
Security
Part 2 of 2
Small book by Shelly
Cashman that came
with text.
Top 10 Hackers Who Got Caught
Gerald Martin hacked
into the system of a
company that
competed with his. –
NY Times
Anonymous “A Leaderless Hacker Group”
Figure 10-1, pg. 382
Internet and Network Attacks
Virus Worm Trojan Rootkit
Infects, negatively
altering the way
computer works
Copies itself
repeatedly, using
up resources
Needs certain
condition to trigger,
does not replicate
Allows person to
take over your
computer from
remote location.
Figure 10-2 from pg. 385
Trojan
Programs, 3.
90%
Viruses, 7.00
%
Network
Worms, 89.1
0%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Portable
Media, 1.3
0%
Internet, 2.
30%
Email, 93.4
0%
Main Virus Threat
Safeguards against
computer viruses and
other malware
Figure 10-5 from pg. 388 of your book
Safeguards
Hardware Theft and Vandalism
Software Theft
• End-User License Agreement (EULA)
Information Theft (Encryption)
Information Theft (Digital Signature)
System Failure
Uninterruptible Power Supply (UPS)
Backing Up – The Ultimate Safeguard
Wireless Security
Wireless Access Point (WAP)
802.11i network
Health Concerns: Repetitive Strain Injury
Health Concerns: Computer Vision Syndrome
Computer Addiction
helpguide.org
Ethics and Society:
Information Accuracy
• National Press
Photographers Association
Ethics and Society: Intellectual Property Rights
Ethics and
Society: Green
Computing
Information Privacy: Electronic Profiles
Information
Privacy:
Cookies
Look in your book, pg.
404, at figure 10-22 about
“How Cookies Work”
Information Privacy: Spyware and Adware
Information
Privacy:
Spam
Information Privacy: Phishing
Information
Privacy:
Social
Engineering
Privacy Laws: Employee Monitoring
Privacy Laws: Content Filtering
• Complete both worksheets by Monday
beginning of class.
• Complete take home test by Monday
beginning of class.
Assignment

More Related Content

What's hot

Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Bcis Csm Chapter Three
Bcis Csm Chapter ThreeBcis Csm Chapter Three
Bcis Csm Chapter Threebackdoor
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkataamiyadutta
 
Computer security overview
Computer security overviewComputer security overview
Computer security overviewCAS
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomwareOsirium Limited
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETnetmonastery
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats mohamad Hamizi
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagarNitish Nagar
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptxAbiniyavk
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer securityPrajktaGN
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSumit Tambe
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 

What's hot (20)

Worm
WormWorm
Worm
 
Is Your Data Secure?
Is Your Data Secure?Is Your Data Secure?
Is Your Data Secure?
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 
Need for security
Need for securityNeed for security
Need for security
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Bcis Csm Chapter Three
Bcis Csm Chapter ThreeBcis Csm Chapter Three
Bcis Csm Chapter Three
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet KolkataSecurity Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
Security Holes and Vulnerabilities in Corporate Network_Pre Null Meet Kolkata
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Preventing lateral spread of ransomware
Preventing lateral spread of ransomwarePreventing lateral spread of ransomware
Preventing lateral spread of ransomware
 
Computer virus
Computer virusComputer virus
Computer virus
 
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNETWHY WE FAIL TO DETECT HACKERS ON THE INTERNET
WHY WE FAIL TO DETECT HACKERS ON THE INTERNET
 
1 understanding cyber threats
1   understanding cyber threats 1   understanding cyber threats
1 understanding cyber threats
 
Trojan horse nitish nagar
Trojan horse nitish nagarTrojan horse nitish nagar
Trojan horse nitish nagar
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Basic practices for information & computer security
Basic practices for information & computer securityBasic practices for information & computer security
Basic practices for information & computer security
 
Anatomy of a cyber-attack
Anatomy of a cyber-attackAnatomy of a cyber-attack
Anatomy of a cyber-attack
 
Sirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicroSirt roundtable malicious-emailtrendmicro
Sirt roundtable malicious-emailtrendmicro
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 

Viewers also liked

Curriculum vitae final copy
Curriculum vitae final   copyCurriculum vitae final   copy
Curriculum vitae final copyPartha Sinha Ray
 
Fourth Quarter and Full Year 2013 Global ISG Outsourcing Index
Fourth Quarter and Full Year 2013 Global ISG Outsourcing IndexFourth Quarter and Full Year 2013 Global ISG Outsourcing Index
Fourth Quarter and Full Year 2013 Global ISG Outsourcing IndexInformation Services Group (ISG)
 
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...SMART Infrastructure Business and Policy Dialogue Event: A private sector per...
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...SMART Infrastructure Facility
 
Celebridades del siglo xx
Celebridades del siglo xxCelebridades del siglo xx
Celebridades del siglo xxCarlos Colomer
 
תיק כחול שחור
תיק כחול שחורתיק כחול שחור
תיק כחול שחורCrochetSchool
 
HAN Physician Assistant e-portfolio Scorion
HAN Physician Assistant e-portfolio ScorionHAN Physician Assistant e-portfolio Scorion
HAN Physician Assistant e-portfolio Scorionparantion
 
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...SMART Infrastructure Facility
 
SMART International Symposium for Next Generation Infrastructure: Estimating ...
SMART International Symposium for Next Generation Infrastructure: Estimating ...SMART International Symposium for Next Generation Infrastructure: Estimating ...
SMART International Symposium for Next Generation Infrastructure: Estimating ...SMART Infrastructure Facility
 
דפי נחיתה סגורים גלובוס
דפי נחיתה סגורים גלובוסדפי נחיתה סגורים גלובוס
דפי נחיתה סגורים גלובוסיהודה שלגר
 
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์Thiffy Thipparat
 
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...parantion
 

Viewers also liked (19)

Curriculum vitae final copy
Curriculum vitae final   copyCurriculum vitae final   copy
Curriculum vitae final copy
 
SMART Energy Demand Forum
SMART Energy Demand ForumSMART Energy Demand Forum
SMART Energy Demand Forum
 
El Paso Country Club
El Paso Country ClubEl Paso Country Club
El Paso Country Club
 
Fourth Quarter and Full Year 2013 Global ISG Outsourcing Index
Fourth Quarter and Full Year 2013 Global ISG Outsourcing IndexFourth Quarter and Full Year 2013 Global ISG Outsourcing Index
Fourth Quarter and Full Year 2013 Global ISG Outsourcing Index
 
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...SMART Infrastructure Business and Policy Dialogue Event: A private sector per...
SMART Infrastructure Business and Policy Dialogue Event: A private sector per...
 
Celebridades del siglo xx
Celebridades del siglo xxCelebridades del siglo xx
Celebridades del siglo xx
 
Enabling Enterprise Agility
Enabling Enterprise AgilityEnabling Enterprise Agility
Enabling Enterprise Agility
 
תיק כחול שחור
תיק כחול שחורתיק כחול שחור
תיק כחול שחור
 
HAN Physician Assistant e-portfolio Scorion
HAN Physician Assistant e-portfolio ScorionHAN Physician Assistant e-portfolio Scorion
HAN Physician Assistant e-portfolio Scorion
 
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...
SMART Seminar Series: Public Infrastructure Investment in the 2000s: Lessons ...
 
SMART International Symposium for Next Generation Infrastructure: Estimating ...
SMART International Symposium for Next Generation Infrastructure: Estimating ...SMART International Symposium for Next Generation Infrastructure: Estimating ...
SMART International Symposium for Next Generation Infrastructure: Estimating ...
 
Closed landing pages
Closed landing pagesClosed landing pages
Closed landing pages
 
Barcelona, Catalunya
Barcelona, CatalunyaBarcelona, Catalunya
Barcelona, Catalunya
 
Lesson plan ppt
Lesson plan pptLesson plan ppt
Lesson plan ppt
 
AQA mobile controlled assessment fusion table and web database
AQA mobile controlled assessment fusion table and web databaseAQA mobile controlled assessment fusion table and web database
AQA mobile controlled assessment fusion table and web database
 
The Future of Effective Governance
The Future of Effective GovernanceThe Future of Effective Governance
The Future of Effective Governance
 
דפי נחיתה סגורים גלובוס
דפי נחיתה סגורים גלובוסדפי נחיתה סגורים גלובוס
דפי נחיתה סגורים גלובוס
 
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์
ข่าวไอที นส.ธิพรัตน์ เนื่องภิรมย์
 
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...
Bezoekers boeien en binden: Big-Data op uw website. Parantion op Cascadis Con...
 

Similar to Computer Security Part 2 Summary

What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfinfo309708
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computerlmadison10
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdfanjanaarts2014
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-systemSouman Guha
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptxAdrianVANTOPINA
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.pptSeniorGaming
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptvisik2
 

Similar to Computer Security Part 2 Summary (20)

Malware
MalwareMalware
Malware
 
Cyber crime & security
Cyber crime & security Cyber crime & security
Cyber crime & security
 
What are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdfWhat are the biggest threats to a network in terms of security and w.pdf
What are the biggest threats to a network in terms of security and w.pdf
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
What’s in your computer
What’s in your computerWhat’s in your computer
What’s in your computer
 
Presentation
PresentationPresentation
Presentation
 
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
1)The viruse which is the most dangerous threat.In DTI survey,72 of.pdf
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Computer securety
Computer securetyComputer securety
Computer securety
 
External threats-to-information-system
External threats-to-information-systemExternal threats-to-information-system
External threats-to-information-system
 
Computer security
Computer securityComputer security
Computer security
 
Digital Security Risk.pptx
Digital Security Risk.pptxDigital Security Risk.pptx
Digital Security Risk.pptx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Cyber-Security.ppt
Cyber-Security.pptCyber-Security.ppt
Cyber-Security.ppt
 
Cybercrime(this)
Cybercrime(this)Cybercrime(this)
Cybercrime(this)
 
Beekman5 std ppt_12
Beekman5 std ppt_12Beekman5 std ppt_12
Beekman5 std ppt_12
 
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.pptCyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
 

More from Carolyn Brockman

Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to TechnologyCarolyn Brockman
 
Tlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockmanTlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockmanCarolyn Brockman
 
Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2Carolyn Brockman
 
Edu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockmanEdu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockmanCarolyn Brockman
 
Tth tentative class schedule sp14
Tth tentative class schedule sp14Tth tentative class schedule sp14
Tth tentative class schedule sp14Carolyn Brockman
 
Mw tentative class schedule sp14
Mw tentative class schedule sp14Mw tentative class schedule sp14
Mw tentative class schedule sp14Carolyn Brockman
 
Tlc 023 105 syllabus sp14 brockman
Tlc 023 105 syllabus sp14   brockmanTlc 023 105 syllabus sp14   brockman
Tlc 023 105 syllabus sp14 brockmanCarolyn Brockman
 
Tlc 023 102 syllabus sp14 brockman
Tlc 023 102 syllabus sp14   brockmanTlc 023 102 syllabus sp14   brockman
Tlc 023 102 syllabus sp14 brockmanCarolyn Brockman
 
06 listening and note taking
06 listening and note taking 06 listening and note taking
06 listening and note taking Carolyn Brockman
 

More from Carolyn Brockman (11)

Introduction to Technology
Introduction to TechnologyIntroduction to Technology
Introduction to Technology
 
Tlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockmanTlc 023 syllabus su14 brockman
Tlc 023 syllabus su14 brockman
 
Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2Edu 225 102 syllabus spring 2014 brockman v2
Edu 225 102 syllabus spring 2014 brockman v2
 
Edu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockmanEdu 225 102 syllabus spring 2014 brockman
Edu 225 102 syllabus spring 2014 brockman
 
Tth tentative class schedule sp14
Tth tentative class schedule sp14Tth tentative class schedule sp14
Tth tentative class schedule sp14
 
Mw tentative class schedule sp14
Mw tentative class schedule sp14Mw tentative class schedule sp14
Mw tentative class schedule sp14
 
Tlc 023 105 syllabus sp14 brockman
Tlc 023 105 syllabus sp14   brockmanTlc 023 105 syllabus sp14   brockman
Tlc 023 105 syllabus sp14 brockman
 
Tlc 023 102 syllabus sp14 brockman
Tlc 023 102 syllabus sp14   brockmanTlc 023 102 syllabus sp14   brockman
Tlc 023 102 syllabus sp14 brockman
 
06 listening and note taking
06 listening and note taking 06 listening and note taking
06 listening and note taking
 
Blog vs podcast
Blog vs podcastBlog vs podcast
Blog vs podcast
 
Memory games can help
Memory games can helpMemory games can help
Memory games can help
 

Recently uploaded

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 

Computer Security Part 2 Summary

Editor's Notes

  1. “Computer Security Risk” is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.Cybercrime is one of FBI’s Top 3 priorities.Hacker, originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.Cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced and network skills.Script kiddie same intent as a cracker but does not have the technical skills and knowledge. Script kiddies use prewritten hacking and cracking programs to break into computers.
  2. Unethical employees break into their employers’ computers for a variety of reasons. Some simply want to exploits a security weakness. Others seek financial gains from selling confidential information. Disgruntled employees may want revenge.Cyber extortionists is someone who uses e-mail as a vehicle for extortion. These perpetrators send an organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization’s network – if they are not paid a sum of money.Cyberterroists-some
  3. Cyberterroists-someone who uses the Internet or network to destroy or damage computers for political reasons. The cyberterrorist might target the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructure. Cyberterrorism usually requires a team of highly skilled individuals, millions of dollars, and several years of planning.Anonymous: Leaderless Hacker Group
  4. Computer viruses, worms, Trojan Horses and Rootkits virus- potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system. worm; program that copies itself repeatedly, for example in memory or on a network, using up resources and possibly shutting down the computer or network Trojan horse a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the Trojan horse. Unlike a virus or a worm, A Trojan horse does not replicate itself to other computers. rootkit- a program that hides in a computer an allows someone from a remote location to take full control of the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computerMalwarePayloadoperating system runs much slower than usualAvailable memory is less than expectedFiles become corruptedScreen displays unusual message or imageUnknown programs or files mysteriously appearMusic or unusual sound plays randomlyExisting programs and files disappearPrograms or files do not work properlySystem properties changeOperating system does not start upOperating system shuts down unexpectedly
  5. More than 300,000 computer Web sites can infect your computer.Open an infected fileRuns an infected programBoots the computer with an infected removable media inserted in a drive or plugged into a portConnects an unprotected computer to a networkWhen a certain condition or event occurs such as computer’s clock changing to a specific date.A common way computer an become infected is through email.
  6. Interesting Information, according to Securelist.com, a virus review for 2002, http://www.securelist.com/en/analysis/151436695/Virus_Review_2002 Two graphs stood out.Malicious Program Types Trojan Programs 3.9%, Viruses 7.0%, and Network Worms 89.1%AndMain Virus Threat Sources Portable Media 1.30%, Internet 2.30%, Email 96.40%
  7. Anti virus programVirus signatureVirus definitionTips for preventing viruses and other malware. trusted sourceantivirus programsVirus signatureVirus definition- known specific code of virus codeQuarantine- a separate area of a hard disk that holds the infected file until the infection can be removed.Refer to TIPS for PREVENTING VIRUSES AND OTHER MALWARE
  8. Botnets- a group of compromised computers connected to a network such as the Internet that are used as part of a network that attacks other networks, usually for nefarious purposes. A compromised computers, known as a zombie, is one whose owner is unaware the computer is being controlled remotely by an outsider. Cybercriminals use botnets to send spam via e-mail, spread viruses and other malware, or commit a denial of service attack.Denial of Service Attacks- disrupt computer access to an internet services such as the Web or emailBack Doors bypass security controlsSpoofing appear legitimate to a victim or a network
  9. Safeguards against Botnets, DoS Attacks, Back Doors and SpoofingFirewallsIntrusion Detection software
  10. Safeguards against unauthorized access and useIdentifying and authenticating usersUser names and passwordsPossessed objects- any object you must carry to gain access to a computer or computer facility, badges, cards, smart cards, and keysBiometric devicesDigital Forensics
  11. Safeguards Against Hardware Theft and Vandalism
  12. Safeguards Against Software TheftLockup copies of your CDs
  13. Safeguards against Information TheftEncryptionDigital signature
  14. Safeguards against system failureAmount of protection to power strip is “proportional to cost” the more expensive the more protection.Be sure to have protection for your modem, telephone lines, DSL lines, Internet cable lines and network lines.
  15. Backing upBack upRestore
  16. Wireless Access Point (WAP) should be configured so that tit does not broadcast a network name. configured so that certain devices can access it.
  17. Wi-Fi Protected Access (WPA)- security standard that improves on older security standards by authenticating network users and providing more advanced encryptions techniques.
  18. 802.11i network, sometimes called WPA2, the most recent network security standard, conforms to the governments security standards and uses more sophisticated encryption techniques than WPA.Way beyond me!
  19. Computers and Health RisksRSI is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. Tendonitis (long term) and carpal tunnel syndrome (short term). Largest job related injury and illness problem in the US today
  20. www.tehvisiontherapycenter.com/computereyestrainPoint out that even though the idea of computer vision is being stressed, the person’s monitor is too low, need to have monitor set higher.
  21. Cybersex Addiction – compulsive use of Internet pornography, adult chat rooms, or adult fantasy role-play sites impacting negatively on real-life intimate relationships. Cyber-Relationship Addiction – addiction to social networking, chat rooms, and messaging to the point where virtual, online friends become more important than real-life relationships with family and friends. Net Compulsions – such as compulsive online gaming, gambling, stock trading, or compulsive use of online auction sites such as eBay, often resulting in financial and job-related problems.  Information Overload – compulsive web surfing or database searching, leading to lower work productivity and less social interaction with family and friends. Computer Addiction – obsessive playing of off-line computer games, such as Solitaire or Minesweeper, or obsessive computer programming.
  22. Computer Ethics are the moral guidelines that govern the use of computers and information systems.Information accuracyNational press photographers association- group that completely opposes any manipulation of an image, ‘legal precedence so far have not been established”
  23. Intellectual property rights http://content.gcflearnfree.org/topics/204/infographic_copyright.png
  24. Green computingReducing the electricity and paper waste while using a computerhttp://www.solidworks.com/sustainability/docs/LCA_graphic_for_web.jpg
  25. Information piracy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. When you fill out a form and that company sells the information to another company.
  26. Cookies, Websites store information about youMainly the sites store your interests and what you like to search about, then send you coupons, emails, etc. of related items
  27. Spyware secretly collects information about user.Adware displays ads in banner on webpages, email, Internet services
  28. Phishing is the same as the prank caller or
  29. Will manipulate person somehow to get what they need
  30. Using computer to monitor employee workHot topic over workplace email policy, OTC’s email policy is that OTC owns ALL OTC email.Controversial topic is whether videos are ok to take all the time??? Webcams??? They are everywhere? Checkout Earthcam.com just for fun