SlideShare une entreprise Scribd logo
1  sur  53
Chapter 11 Computer Security,  Ethics and Privacy
Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses,  botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
Computer Security Risks ,[object Object],p. 556 - 558 Fig. 11-1 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Computer Emergency Response Team Coordination Center below Chapter 11
Internet and Network Attacks ,[object Object],p. 558 Virus  is a potentially damaging  computer  program ,[object Object],Trojan horse   hides within  or looks like legitimate program until triggered Payload  (destructive  event) that is delivered Can spread and damage files Does not replicate itself on other computers Next
Internet and Network Attacks ,[object Object],p. 559 Fig. 11-2 Step 1.  Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a picture and attach the picture to an e-mail message. Step 2.  They use the Internet to send the e-mail message to thousands of users around the world. Step 3b.  Other users do not recognize the name of the sender of the e-mail message. These users do not open the  e-mail message - instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a.  Some users open the attachment and their computers become infected with the virus. Next
Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
Internet and Network Attacks ,[object Object],p. 560 Fig. 11-3 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 560 - 561 Fig. 11-4 ,[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Fig. 11-5 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Keeps file  in separate  area of hard disk Next Records  information  about program such  as file size and  creation  date Attempts  to remove  any detected  virus Uses  information  to detect if  virus tampers  with file Quarantines   infected  files that it  cannot  remove
Internet and Network Attacks ,[object Object],p. 562 Install a personal firewall program If the antivirus program flags an  e-mail attachment  as infected, delete  the attachment immediately Never start a computer with removable media inserted Never open an  e-mail attachment unless you are expecting it and  it is from a  trusted source Install an antivirus program on all of your computers Check all  downloaded  programs for  viruses, worms,  or Trojan horses Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Virus Hoaxes below Chapter 11
Internet and Network Attacks ,[object Object],p. 562 - 563 A  denial of service attack  is an assault which disrupts computer access to an Internet service  such as the Web or e-mail A  back door  is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing  is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network Next
Internet and Network Attacks ,[object Object],p. 563 Fig. 11-7 ,[object Object],Next
Internet and Network Attacks ,[object Object],p. 564 Fig. 11-8 ,[object Object],[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 564 - 565 Next Intrusion detection software analyzes network traffic, assesses  system vulnerabilities, and identifies  intrusions and suspicious behavior Access control defines who  can access computer and  what actions they can take Audit trail  records access attempts
Unauthorized Access and Use ,[object Object],p. 565 Fig. 11-9 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 566 Fig. 11-10 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  CAPTCHAs below Chapter 11
Unauthorized Access and Use ,[object Object],p. 566 - 567 Fig. 11-11 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 ,[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 - 568 Fig. 11-13 ,[object Object],[object Object],Next
Hardware Theft and Vandalism ,[object Object],p. 569 - 570 Fig. 11-14 ,[object Object],[object Object],[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  RTLS below Chapter 11
Software Theft ,[object Object],p. 570 Next Act of stealing or  illegally stealing software, copying  software or  intentionally  erasing  programs Software  piracy   is illegal duplication  of copyrighted software
Software Theft ,[object Object],p. 570 - 571 Fig. 11-15 ,[object Object],[object Object],Next
Software Theft ,[object Object],p. 571 Product activation  allows user to input product identification number online or by telephone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Business Software Alliance below Chapter 11
Information Theft ,[object Object],p. 572 Fig. 11-16 ,[object Object],[object Object],[object Object],[object Object],Next
Information Theft ,[object Object],p. 573 Fig. 11-17 Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  BitLocker below Chapter 11
Information Theft ,[object Object],Secure site   is Web site that uses encryption to secure data p. 573 Digital certificate  is notice that guarantees Web site is legitimate Many Web browsers  use encryption Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Certificates below Chapter 11
Information Theft ,[object Object],p. 573 Fig. 11-18 ,[object Object],[object Object],Next
Information Theft ,[object Object],p. 574 Fig. 11-19 ,[object Object],[object Object],Next
System Failure ,[object Object],p. 574  Caused by aging hardware,  natural disasters, or electrical  power disturbances Can cause loss of hardware,  software, or data Prolonged malfunction  of computer Undervoltage —drop  in electrical supply Next Overvoltage  or  power surge — significant increase  in electrical power Noise —unwanted  electrical signal
System Failure ,[object Object],p. 574 - 575 Figs. 11-20–11-21 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Uninterruptible Power Supply below Chapter 11
Backing Up — The Ultimate Safeguard ,[object Object],p. 576 Duplicate of file, program, or disk Full backup all files in computer Selective backup select which files  to back up Three-generation backup preserves  three copies of important files In case of system failure or corrupted files,  restore  files by copying to original location Next
Wireless Security ,[object Object],p. 577 Fig. 11-22 ,[object Object],[object Object],[object Object],[object Object],Next
Ethics and Society ,[object Object],p. 578 - 579 Information privacy Intellectual property rights —rights to which creators are entitled for their work Software theft Information accuracy Codes of conduct Unauthorized use of computers and networks Moral guidelines that govern use of computers and information systems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Rights Management below Chapter 11
Ethics and Society ,[object Object],p. 580 Fig. 11-25 ,[object Object],[object Object],Next
Information Privacy ,[object Object],p. 580 and 586 Legal for employers to use monitoring software programs Difficult to maintain today because data is stored online Employee monitoring  is using computers to observe employee computer use Right of individuals and companies to deny or restrict collection and use of information about them Next
Information Privacy ,[object Object],p. 581 Fill in only necessary information on rebate, warranty, and  registration forms Avoid shopping club  and buyers cards Install a cookie manager  to filter cookies Inform merchants that you  do not want them to distribute  your personal information Limit the amount of information  you provide to Web sites; fill  in only required information Clear your history file when  you are finished browsing Set up a free e-mail account;  use this e-mail address for  merchant forms Turn off file and print sharing  on your Internet connection Install a personal firewall Sign up for e-mail  filtering through your  Internet access provider or  use an antispam program,  such as Brightmail Do not reply to spam  for any reason Surf the Web anonymously  with a program such as  Freedom Web Secure or  through an anonymous  Web site such as  Anonymizer.com Next
Information Privacy ,[object Object],p. 581 - 582 Fig. 11-27 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 582 Set browser to accept cookies, prompt you to accept cookies, or disable cookies Some Web sites sell or trade information stored in your cookies Small text file on your computer that contains data about you User preferences Interests and browsing habits How regularly you visit Web sites Next
Information Privacy ,[object Object],p. 583 Fig. 11-28 Next
Information Privacy ,[object Object],p. 583 - 584 Fig. 11-29 ,[object Object],[object Object],[object Object],Next Click to view  Web Link, click Chapter 11, Click Web Link from left  navigation, then click  Spam below Chapter 11
Information Privacy ,[object Object],p. 584 E-mail filtering Anti-spam program Next Collects spam in central location  that you can  view any time Service that  blocks e-mail  messages from  designated  sources Sometimes  removes valid  e-mail messages Attempts to  remove spam
Information Privacy ,[object Object],p. 584 Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and  financial information Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 586 - 587 Fig. 11-31 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 587 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],Computer vision syndrome (CVS) —eye and vision problems p. 587 - 589 Repetitive strain injury (RSI) Computer addiction —when computer consumes entire social life Tendonitis—inflammation of tendon due to repeated motion Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-32 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-33 Next
Health Concerns of Computer Use ,[object Object],p. 589 Fig. 11-34  ,[object Object],keyboard height: 23” to 28” feet flat on floor adjustable height chair with 4 or 5 legs for stability adjustable seat elbows at 90° and arms and hands parallel to floor Next
Health Concerns of Computer Use ,[object Object],p. 590 Fig. 11-35 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Green Computing below Chapter 11
Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools,  business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues,  their preventions, and ways to  keep the environment healthy Chapter 11 Complete

Contenu connexe

Tendances (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
NETWORK SECURITY
NETWORK SECURITYNETWORK SECURITY
NETWORK SECURITY
 
Network security
Network security Network security
Network security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Career in cyber security
Career in  cyber securityCareer in  cyber security
Career in cyber security
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Information security
Information securityInformation security
Information security
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Chapter- I introduction
Chapter- I introductionChapter- I introduction
Chapter- I introduction
 
Web security
Web securityWeb security
Web security
 
Cyber security
Cyber security Cyber security
Cyber security
 
Web security
Web securityWeb security
Web security
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Web security
Web securityWeb security
Web security
 
Cryptography
CryptographyCryptography
Cryptography
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Similaire à Chapter11

Computer security
Computer securityComputer security
Computer securityDhani Ahmad
 
Internet security
Internet securityInternet security
Internet securityat1211
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdfPavelVtek3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Symptai Consulting Limited
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 

Similaire à Chapter11 (20)

Computer security
Computer securityComputer security
Computer security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Internet security
Internet securityInternet security
Internet security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

Plus de Izaham

Morphology 1
Morphology 1Morphology 1
Morphology 1Izaham
 
Morphology
MorphologyMorphology
MorphologyIzaham
 
Critical reading
Critical readingCritical reading
Critical readingIzaham
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting detailsIzaham
 
Internet and elt
Internet and eltInternet and elt
Internet and eltIzaham
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3Izaham
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015Izaham
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015Izaham
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2Izaham
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call caiIzaham
 
E learning design principles
E learning design principlesE learning design principles
E learning design principlesIzaham
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711Izaham
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware developmentIzaham
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)Izaham
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2Izaham
 
Flowchart
FlowchartFlowchart
FlowchartIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1Izaham
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2Izaham
 

Plus de Izaham (20)

Morphology 1
Morphology 1Morphology 1
Morphology 1
 
Morphology
MorphologyMorphology
Morphology
 
Critical reading
Critical readingCritical reading
Critical reading
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
 
Flowchart
FlowchartFlowchart
Flowchart
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
 

Dernier

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Dernier (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Chapter11

  • 1. Chapter 11 Computer Security, Ethics and Privacy
  • 2. Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
  • 3.
  • 4.
  • 5.
  • 6. Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools, business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues, their preventions, and ways to keep the environment healthy Chapter 11 Complete