SlideShare une entreprise Scribd logo
1  sur  55
Discovering
    Computers 2012
     Your Interactive Guide
      to the Digital World
Objectives Overview


    Define the term,        Describe various types
                                                                    Discuss techniques to
computer security risks,   of Internet and network
                                                                    prevent unauthorized
and briefly describe the     attacks, and identify
                                                                    computer access and
  types of cybercrime          ways to safeguard
                                                                             use
     perpetrators            against these attacks


                               Explain the ways
   Identify safeguards                                              Discuss how encryption
                           software manufacturers
 against hardware theft                                             works, and explain why
                                protect against
     and vandalism                                                       it is necessary
                               software piracy



See Page 555               Discovering Computers 2012: Chapter 11                           2
for Detailed Objectives
Objectives Overview


  Discuss the types of                                                 Identify risks and
                             Explain the options
 devices available that                                              safeguards associated
                           available for backing up
protect computers from                                                    with wireless
                             computer resources
     system failure                                                     communications


                           Recognize issues related
Discuss ways to prevent
                           to information accuracy,                      Discuss issues
health-related disorders
                              intellectual property                 surrounding information
  and injuries due to
                           rights, codes of conduct,                        privacy
     computer use
                             and green computing



See Page 555               Discovering Computers 2012: Chapter 11                            3
for Detailed Objectives
Computer Security Risks

• A computer security risk is any event or action that could
  cause a loss of or damage to computer hardware,
  software, data, information, or processing capability
• A cybercrime is an online or Internet-based illegal act

         Hackers                Crackers                   Script Kiddies             Corporate Spies




                    Unethical
                                       Cyberextortionists                   Cyberterrorists
                   Employees


Pages 556 - 557                    Discovering Computers 2012: Chapter 11                               4
Computer Security Risks




Pages 556 – 557   Discovering Computers 2012: Chapter 11   5
Figure 11-1
Internet and Network Attacks

• Information transmitted over networks has a higher
  degree of security risk than information kept on an
  organization’s premises
• An online security service is a Web site that evaluates
  your computer to check for Internet and e-mail
  vulnerabilities




Page 558              Discovering Computers 2012: Chapter 11   6
Figure 11-2
Internet and Network Attacks

    Computer
                      Worm                       Trojan Horse        Rootkit
      Virus
• Affects a       • Copies itself             • A malicious       • Program that
  computer          repeatedly,                 program that        hides in a
  negatively by     using up                    hides within        computer
  altering the      resources                   or looks like       and allows
  way the           and possibly                a legitimate        someone
  computer          shutting                    program             from a
  works             down the                                        remote
                    computer or                                     location to
                    network                                         take full
                                                                    control


Page 558                 Discovering Computers 2012: Chapter 11                7
Internet and Network Attacks

• An infected computer has one or more of the
  following symptoms:
        Operating system    Available memory                                         Screen displays
                                                              Files become
        runs much slower       is less than                                         unusual message
                                                                corrupted
           than usual           expected                                                or image


                                                                                       Unknown
        Music or unusual                                   Programs or files
                            Existing programs                                       programs or files
         sound plays                                         do not work
                            and files disappear                                       mysteriously
          randomly                                             properly
                                                                                        appear


                                                                          Operating system
                  System properties         Operating system
                                                                            shuts down
                       change               does not start up
                                                                           unexpectedly

Pages 558 - 559                       Discovering Computers 2012: Chapter 11                            8
Internet and Network Attacks




Page 559      Discovering Computers 2012: Chapter 11   9
Figure 11-3
Internet and Network Attacks




Page 561      Discovering Computers 2012: Chapter 11   10
Figure 11-6
Internet and Network Attacks

    • Users can take several
      precautions to protect
      their home and work
      computers and mobile
      devices from these
      malicious infections




Page 560 – 561        Discovering Computers 2012: Chapter 11   11
Figure 11-7
Internet and Network Attacks

• A botnet is a group of compromised computers connected to a
  network
       – A compromised computer is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to
  Internet services
       – Distributed DoS (DDoS)
• A back door is a program or set of instructions in a program that
  allow users to bypass security controls
• Spoofing is a technique intruders use to make their network or
  Internet transmission appear legitimate


Pages 562 - 563                   Discovering Computers 2012: Chapter 11   12
Internet and Network Attacks

• A firewall is hardware and/or software that
  protects a network’s resources from intrusion




Pages 563 - 564   Discovering Computers 2012: Chapter 11   13
Figure 11-8
Internet and Network Attacks

 Intrusion detection software
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior
    patterns or system breaches
 Honeypot
  • Vulnerable computer that is set up to entice an intruder to
    break into it
Page 564                Discovering Computers 2012: Chapter 11    14
Unauthorized Access and Use




  Unauthorized access is                                 Unauthorized use is the
 the use of a computer or                                use of a computer or its
     network without                                     data for unapproved or
        permission                                       possibly illegal activities




Page 564               Discovering Computers 2012: Chapter 11                      15
Unauthorized Access and Use

    • Organizations take
      several measures to
      help prevent
      unauthorized access
      and use
           – Acceptable use policy
           – Disable file and printer
             sharing
           – Firewalls
           – Intrusion detection
             software

Page 565                      Discovering Computers 2012: Chapter 11   16
Figure 11-10
Unauthorized Access and Use

• Access controls define who can access a
  computer, when they can access it, and what
  actions they can take
      – Two-phase processes called identification and
        authentication
      – User name
      – Password
      – Passphrase
      – CAPTCHA
Pages 565 – 567         Discovering Computers 2012: Chapter 11   17
Figure 11-11
Unauthorized Access and Use

    • A possessed object is any                     • A biometric device
      item that you must carry to                     authenticates a person’s
      gain access to a computer                       identity by translating a
      or computer facility                            personal characteristic into
           – Often are used in                        a digital code that is
             combination with a personal              compared with a digital
             identification number (PIN)              code in a computer




Page 568                        Discovering Computers 2012: Chapter 11               18
Figure 11-14
Unauthorized Access and Use

• Digital forensics is the discovery, collection, and
  analysis of evidence found on computers and
  networks
• Many areas use digital forensics
               Law                 Criminal                         Military
           enforcement           prosecutors                      intelligence


                                                 Information
                     Insurance
                                                   security
                      agencies
                                                 departments
Page 569                 Discovering Computers 2012: Chapter 11                  19
Hardware Theft and Vandalism



                                       Hardware vandalism
Hardware theft is the
                                       is the act of defacing
   act of stealing
                                            or destroying
computer equipment
                                       computer equipment



Page 570        Discovering Computers 2012: Chapter 11      20
Hardware Theft and Vandalism

• To help reduce the of chances of theft, companies
  and schools use a variety of security measures
                                                                        Cables to lock
   Physical access controls        Alarm systems
                                                                         equipment




                    Real time location            Passwords, possessed
                          system                 objects, and biometrics




Page 570                                 Discovering Computers 2012: Chapter 11          21
Figure 11-15
Software Theft

• Software theft occurs when someone:


           Steals software                                Intentionally
               media                                    erases programs




                                                            Illegally
           Illegally copies a                           registers and/or
                program                                    activates a
                                                            program
Page 571                 Discovering Computers 2012: Chapter 11            22
Software Theft

• A single-user license agreement typically contains the
  following conditions:
Permitted to
  • Install the software on one computer
  • Make one copy of the software
  • Remove the software from your computer before giving it away or selling it

Not permitted to
  •   Install the software on a network
  •   Give copies to friends or colleagues while continuing to use the software
  •   Export the software
  •   Rent or lease the software
Page 571                        Discovering Computers 2012: Chapter 11            23
Software Theft

    • Copying, loaning,
      borrowing, renting, or
      distributing software
      can be a violation of
      copyright law
    • Some software requires
      product activation to
      function fully



Pages 571 – 572       Discovering Computers 2012: Chapter 11   24
Figure 11-16
Information Theft

• Information theft occurs when someone steals
  personal or confidential information
• Encryption is a process of converting readable
  data into unreadable characters to prevent
  unauthorized access




Pages 572 - 573   Discovering Computers 2012: Chapter 11   25
Figure 11-17
Information Theft




Page 573       Discovering Computers 2012: Chapter 11   26
Figure 11-18
Information Theft

• A digital signature is an encrypted code that a
  person, Web site, or organization attaches to an
  electronic message to verify the identity of the
  sender
      – Often used to ensure that an impostor is not
        participating in an Internet transaction
• Web browsers and Web sites use encryption
  techniques

Page 574                Discovering Computers 2012: Chapter 11   27
Information Theft

• Popular security techniques include

                    Digital                   Transport Layer
                  Certificates                 Security (TLS)



                  Secure HTTP                               VPN


Pages 574 - 575           Discovering Computers 2012: Chapter 11   28
Information Theft




Pages 574 - 575         Discovering Computers 2012: Chapter 11   29
Figures 11-19 – 11-20
System Failure

• A system failure is the prolonged malfunction of a
  computer
• A variety of factors can lead to system failure,
  including:
      – Aging hardware
      – Natural disasters
      – Electrical power problems
           • Noise, undervoltages, and overvoltages
      – Errors in computer programs
Page 575                    Discovering Computers 2012: Chapter 11   30
System Failure

• Two ways to protect from system failures caused
  by electrical power variations include surge
  protectors and uninterruptable power supplies
  (UPS)




Page 576                Discovering Computers 2012: Chapter 11   31
Figures 11-21 – 11-22
Backing Up – The Ultimate Safeguard

• A backup is a duplicate of a file, program, or disk
  that can be used if the original is lost, damaged,
  or destroyed
      – To back up a file means to make a copy of it
• Offsite backups are stored in a location separate
  from the computer site
                                                          Cloud
                                                         Storage

Page 577                Discovering Computers 2012: Chapter 11     32
Backing Up – The Ultimate Safeguard

    • Two categories of                             • Three-generation
      backups:                                        backup policy
           – Full backup
                                                                     Grandparent
           – Selective backup


                                                                         Parent




                                                                         Child


Page 577                        Discovering Computers 2012: Chapter 11             33
Wireless Security

• Wireless access poses additional security risks
       – About 80 percent of wireless networks have no security
         protection
• War driving allows individuals to detect wireless
  networks while driving a vehicle through the area




Page 578                    Discovering Computers 2012: Chapter 11   34
Figure 11-23
Wireless Security

• In additional to using firewalls, some safeguards
  improve security of wireless networks:
           A wireless access
                                           Change the default
            point should not
                                                 SSID
           broadcast an SSID


            Configure a WAP
               so that only                 Use WPA or WPA2
           certain devices can              security standards
                 access it
Page 578              Discovering Computers 2012: Chapter 11     35
Health Concerns of Computer Use

    • The widespread use of
      computers has led to
      health concerns
           – Repetitive strain injury
             (RSI)
               • Tendonitis
               • Carpal tunnel syndrome
                 (CTS)
           – Computer vision
             syndrome (CVS)


Page 579                        Discovering Computers 2012: Chapter 11   36
Figure 11-24
Health Concerns of Computer Use




Page 580       Discovering Computers 2012: Chapter 11   37
Figure 11-25
Health Concerns of Computer Use

    • Ergonomics is an
      applied science devoted
      to incorporating
      comfort, efficiency, and
      safety into the design of
      items in the workplace




Page 580                Discovering Computers 2012: Chapter 11   38
Figure 11-26
Health Concerns of Computer Use

• Computer addiction occurs when the computer
  consumes someone’s entire social life
• Symptoms of users include:
              Craves            Overjoyed                            Unable to stop
             computer           when at the                            computer
               time              computer                               activity

           Irritable when          Neglects                           Problems at
              not at the          family and                            work or
              computer              friends                              school
Page 581                    Discovering Computers 2012: Chapter 11                    39
Ethics and Society

    • Computer ethics are
      the moral guidelines
      that govern the use of
      computers and
      information systems
    • Information accuracy is
      a concern
           – Not all information on
             the Web is correct


Pages 581 – 582              Discovering Computers 2012: Chapter 11   40
Figure 11-28
Ethics and Society


 Intellectual property rights are the rights to
 which creators are entitled for their work

  • A copyright protects any tangible form of expression

 An IT code of conduct is a written guideline
 that helps determine whether a specific
 computer action is ethical or unethical

Page 582               Discovering Computers 2012: Chapter 11   41
Ethics and Society




Page 583       Discovering Computers 2012: Chapter 11   42
Figure 11-29
Ethics and Society

• Green computing involves reducing the electricity
  and environmental waste while using a computer




Pages 583 – 584   Discovering Computers 2012: Chapter 11   43
Figure 11-30
Ethics and Society

• Information privacy refers to the right of
  individuals and companies to deny or restrict the
  collection and use of information about them
• Huge databases store data online
• It is important to safeguard your information




Page 584           Discovering Computers 2012: Chapter 11   44
Ethics and Society




Page 584       Discovering Computers 2012: Chapter 11   45
Figure 11-31
Ethics and Society

    • When you fill out a
      form, the merchant that
      receives the form
      usually enters it into a
      database
    • Many companies today
      allow people to specify
      whether they want
      their personal
      information distributed
Page 585               Discovering Computers 2012: Chapter 11   46
Figure 11-32
Ethics and Society

• A cookie is a small text file that a Web server stores on
  your computer
• Web sites use cookies for a variety of reasons:
                                                                   Assist with
        Allow for             Store users’
                                                                     online
     personalization           passwords
                                                                    shopping

                  Track how
                                                   Target
                  often users
                                               advertisements
                   visit a site
Pages 585 – 586           Discovering Computers 2012: Chapter 11                 47
Ethics and Society




Page 586       Discovering Computers 2012: Chapter 11   48
Figure 11-33
Ethics and Society

    • Spam is an unsolicited
      e-mail message or
      newsgroup posting
    • E-mail filtering blocks
      e-mail messages from
      designated sources
    • Anti-spam programs
      attempt to remove
      spam before it reaches
      your inbox

Page 587               Discovering Computers 2012: Chapter 11   49
Figure 11-34
Ethics and Society

                                      • Phishing is a scam in
                                        which a perpetrator sends
                                        an official looking e-mail
                                        message that attempts to
                                        obtain your personal and
                                        financial information
                                      • Pharming is a scam
                                        where a perpetrator
                                        attempts to obtain your
                                        personal and financial
                                        information via spoofing


Pages 587 - 588   Discovering Computers 2012: Chapter 11             50
Figure 11-35
Ethics and Society

• The concern about privacy has led to the
  enactment of federal and state laws regarding the
  storage and disclosure of personal data
      – See Figure 11-36 on page 589 for a listing of major U.S.
        government laws concerning privacy
• The 1970 Fair Credit Reporting Act limits the
  rights of others viewing a credit report to only
  those with a legitimate business need

Page 588                 Discovering Computers 2012: Chapter 11   51
Ethics and Society


 Social engineering is defined as gaining
 unauthorized access or obtaining confidential
 information by taking advantage of trust and naivety

 Employee monitoring involves the use of computers
 to observe, record, and review an employee’s use of
 a computer


Page 590           Discovering Computers 2012: Chapter 11   52
Ethics and Society

    • Content filtering is the
      process of restricting
      access to certain material
      on the Web
    • Many businesses use
      content filtering
    • Internet Content Rating
      Association (ICRA)
    • Web filtering software
      restricts access to
      specified Web sites

Pages 590 – 591          Discovering Computers 2012: Chapter 11   53
Figure 11-37
Summary


           Potential computer risks and               Wireless security risks and
                    safeguards                               safeguards




                                                      Ethical issues surrounding
                                                        information accuracy,
            Computer-related health                  intellectual property rights,
             issues and preventions                    codes of conduct, green
                                                     computing, and information
                                                                 privacy
Page 591                       Discovering Computers 2012: Chapter 11                54
Discovering
    Computers 2012
     Your Interactive Guide
      to the Digital World
    Chapter 11 Complete

Contenu connexe

Tendances

Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Anna Stirling
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Anna Stirling
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Anna Stirling
 
Intro to computers ch 1
Intro to computers ch 1Intro to computers ch 1
Intro to computers ch 1Vanita
 
Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Anna Stirling
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersJan Fisher
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Anna Stirling
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internetxtin101
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unithaider ali
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 inputhaider ali
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 outputhaider ali
 
Chapter 10 Communications and Networks
Chapter 10 Communications and NetworksChapter 10 Communications and Networks
Chapter 10 Communications and Networksxtin101
 
DTCC Chapter 2 The Internet and the WWW
DTCC Chapter 2 The Internet and the WWWDTCC Chapter 2 The Internet and the WWW
DTCC Chapter 2 The Internet and the WWWJan Fisher
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application softwarehaider ali
 
Chapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile DevicesChapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile Devicesxtin101
 

Tendances (20)

Discovering Computers: Chapter 07
Discovering Computers: Chapter 07Discovering Computers: Chapter 07
Discovering Computers: Chapter 07
 
Discovering Computers: Chapter 08
Discovering Computers: Chapter 08Discovering Computers: Chapter 08
Discovering Computers: Chapter 08
 
Discovering Computers: Chapter 09
Discovering Computers: Chapter 09Discovering Computers: Chapter 09
Discovering Computers: Chapter 09
 
Intro to computers ch 1
Intro to computers ch 1Intro to computers ch 1
Intro to computers ch 1
 
Discovering Computers: Chapter 13
Discovering Computers: Chapter 13Discovering Computers: Chapter 13
Discovering Computers: Chapter 13
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
DTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to ComputersDTCC Chapter 1 - Introduction to Computers
DTCC Chapter 1 - Introduction to Computers
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
DC18_M01.pptx
DC18_M01.pptxDC18_M01.pptx
DC18_M01.pptx
 
Lecture 2.pptx
Lecture 2.pptxLecture 2.pptx
Lecture 2.pptx
 
Dc16 ch02
Dc16 ch02Dc16 ch02
Dc16 ch02
 
Chapter 02 The Internet
Chapter 02 The InternetChapter 02 The Internet
Chapter 02 The Internet
 
Chapter 4 the components of the system unit
Chapter 4   the components of the system unitChapter 4   the components of the system unit
Chapter 4 the components of the system unit
 
Chapter 5 input
Chapter 5   inputChapter 5   input
Chapter 5 input
 
Lecture 3.pptx
Lecture 3.pptxLecture 3.pptx
Lecture 3.pptx
 
Chapter 6 output
Chapter 6   outputChapter 6   output
Chapter 6 output
 
Chapter 10 Communications and Networks
Chapter 10 Communications and NetworksChapter 10 Communications and Networks
Chapter 10 Communications and Networks
 
DTCC Chapter 2 The Internet and the WWW
DTCC Chapter 2 The Internet and the WWWDTCC Chapter 2 The Internet and the WWW
DTCC Chapter 2 The Internet and the WWW
 
Chapter 3 application software
Chapter 3   application softwareChapter 3   application software
Chapter 3 application software
 
Chapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile DevicesChapter 3 Computers and Mobile Devices
Chapter 3 Computers and Mobile Devices
 

Similaire à Discovering Computers: Chapter 11

CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptxssuser666f98
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxssuser666f98
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedBule Hora University
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 

Similaire à Discovering Computers: Chapter 11 (20)

CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptx
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptx
 
Chapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganisedChapter1 intro network_security_sunorganised
Chapter1 intro network_security_sunorganised
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
It ppt new
It ppt newIt ppt new
It ppt new
 
BYOD and Your Business
BYOD and Your BusinessBYOD and Your Business
BYOD and Your Business
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 

Plus de Anna Stirling

Technology Training in the California Community College System
Technology Training in the California Community College SystemTechnology Training in the California Community College System
Technology Training in the California Community College SystemAnna Stirling
 
New Perspectives: Access.09
New Perspectives: Access.09New Perspectives: Access.09
New Perspectives: Access.09Anna Stirling
 
New Perspectives: Access.08
New Perspectives: Access.08New Perspectives: Access.08
New Perspectives: Access.08Anna Stirling
 
New Perspectives: Access.07
New Perspectives: Access.07New Perspectives: Access.07
New Perspectives: Access.07Anna Stirling
 
New Perspectives: Access.06
New Perspectives: Access.06New Perspectives: Access.06
New Perspectives: Access.06Anna Stirling
 
New Perspectives: Access.05
New Perspectives: Access.05New Perspectives: Access.05
New Perspectives: Access.05Anna Stirling
 
New Perspectives: Access.04
New Perspectives: Access.04New Perspectives: Access.04
New Perspectives: Access.04Anna Stirling
 
New Perspectives: Access.03
New Perspectives: Access.03New Perspectives: Access.03
New Perspectives: Access.03Anna Stirling
 
New Perspectives: Access.02
New Perspectives: Access.02New Perspectives: Access.02
New Perspectives: Access.02Anna Stirling
 
New Perspectives: Access.01
New Perspectives: Access.01New Perspectives: Access.01
New Perspectives: Access.01Anna Stirling
 
Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Anna Stirling
 

Plus de Anna Stirling (11)

Technology Training in the California Community College System
Technology Training in the California Community College SystemTechnology Training in the California Community College System
Technology Training in the California Community College System
 
New Perspectives: Access.09
New Perspectives: Access.09New Perspectives: Access.09
New Perspectives: Access.09
 
New Perspectives: Access.08
New Perspectives: Access.08New Perspectives: Access.08
New Perspectives: Access.08
 
New Perspectives: Access.07
New Perspectives: Access.07New Perspectives: Access.07
New Perspectives: Access.07
 
New Perspectives: Access.06
New Perspectives: Access.06New Perspectives: Access.06
New Perspectives: Access.06
 
New Perspectives: Access.05
New Perspectives: Access.05New Perspectives: Access.05
New Perspectives: Access.05
 
New Perspectives: Access.04
New Perspectives: Access.04New Perspectives: Access.04
New Perspectives: Access.04
 
New Perspectives: Access.03
New Perspectives: Access.03New Perspectives: Access.03
New Perspectives: Access.03
 
New Perspectives: Access.02
New Perspectives: Access.02New Perspectives: Access.02
New Perspectives: Access.02
 
New Perspectives: Access.01
New Perspectives: Access.01New Perspectives: Access.01
New Perspectives: Access.01
 
Discovering Computers: Chapter 15
Discovering Computers: Chapter 15Discovering Computers: Chapter 15
Discovering Computers: Chapter 15
 

Dernier

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 

Dernier (20)

Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 

Discovering Computers: Chapter 11

  • 1. Discovering Computers 2012 Your Interactive Guide to the Digital World
  • 2. Objectives Overview Define the term, Describe various types Discuss techniques to computer security risks, of Internet and network prevent unauthorized and briefly describe the attacks, and identify computer access and types of cybercrime ways to safeguard use perpetrators against these attacks Explain the ways Identify safeguards Discuss how encryption software manufacturers against hardware theft works, and explain why protect against and vandalism it is necessary software piracy See Page 555 Discovering Computers 2012: Chapter 11 2 for Detailed Objectives
  • 3. Objectives Overview Discuss the types of Identify risks and Explain the options devices available that safeguards associated available for backing up protect computers from with wireless computer resources system failure communications Recognize issues related Discuss ways to prevent to information accuracy, Discuss issues health-related disorders intellectual property surrounding information and injuries due to rights, codes of conduct, privacy computer use and green computing See Page 555 Discovering Computers 2012: Chapter 11 3 for Detailed Objectives
  • 4. Computer Security Risks • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability • A cybercrime is an online or Internet-based illegal act Hackers Crackers Script Kiddies Corporate Spies Unethical Cyberextortionists Cyberterrorists Employees Pages 556 - 557 Discovering Computers 2012: Chapter 11 4
  • 5. Computer Security Risks Pages 556 – 557 Discovering Computers 2012: Chapter 11 5 Figure 11-1
  • 6. Internet and Network Attacks • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises • An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities Page 558 Discovering Computers 2012: Chapter 11 6 Figure 11-2
  • 7. Internet and Network Attacks Computer Worm Trojan Horse Rootkit Virus • Affects a • Copies itself • A malicious • Program that computer repeatedly, program that hides in a negatively by using up hides within computer altering the resources or looks like and allows way the and possibly a legitimate someone computer shutting program from a works down the remote computer or location to network take full control Page 558 Discovering Computers 2012: Chapter 11 7
  • 8. Internet and Network Attacks • An infected computer has one or more of the following symptoms: Operating system Available memory Screen displays Files become runs much slower is less than unusual message corrupted than usual expected or image Unknown Music or unusual Programs or files Existing programs programs or files sound plays do not work and files disappear mysteriously randomly properly appear Operating system System properties Operating system shuts down change does not start up unexpectedly Pages 558 - 559 Discovering Computers 2012: Chapter 11 8
  • 9. Internet and Network Attacks Page 559 Discovering Computers 2012: Chapter 11 9 Figure 11-3
  • 10. Internet and Network Attacks Page 561 Discovering Computers 2012: Chapter 11 10 Figure 11-6
  • 11. Internet and Network Attacks • Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Page 560 – 561 Discovering Computers 2012: Chapter 11 11 Figure 11-7
  • 12. Internet and Network Attacks • A botnet is a group of compromised computers connected to a network – A compromised computer is known as a zombie • A denial of service attack (DoS attack) disrupts computer access to Internet services – Distributed DoS (DDoS) • A back door is a program or set of instructions in a program that allow users to bypass security controls • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate Pages 562 - 563 Discovering Computers 2012: Chapter 11 12
  • 13. Internet and Network Attacks • A firewall is hardware and/or software that protects a network’s resources from intrusion Pages 563 - 564 Discovering Computers 2012: Chapter 11 13 Figure 11-8
  • 14. Internet and Network Attacks Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or system breaches Honeypot • Vulnerable computer that is set up to entice an intruder to break into it Page 564 Discovering Computers 2012: Chapter 11 14
  • 15. Unauthorized Access and Use Unauthorized access is Unauthorized use is the the use of a computer or use of a computer or its network without data for unapproved or permission possibly illegal activities Page 564 Discovering Computers 2012: Chapter 11 15
  • 16. Unauthorized Access and Use • Organizations take several measures to help prevent unauthorized access and use – Acceptable use policy – Disable file and printer sharing – Firewalls – Intrusion detection software Page 565 Discovering Computers 2012: Chapter 11 16 Figure 11-10
  • 17. Unauthorized Access and Use • Access controls define who can access a computer, when they can access it, and what actions they can take – Two-phase processes called identification and authentication – User name – Password – Passphrase – CAPTCHA Pages 565 – 567 Discovering Computers 2012: Chapter 11 17 Figure 11-11
  • 18. Unauthorized Access and Use • A possessed object is any • A biometric device item that you must carry to authenticates a person’s gain access to a computer identity by translating a or computer facility personal characteristic into – Often are used in a digital code that is combination with a personal compared with a digital identification number (PIN) code in a computer Page 568 Discovering Computers 2012: Chapter 11 18 Figure 11-14
  • 19. Unauthorized Access and Use • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks • Many areas use digital forensics Law Criminal Military enforcement prosecutors intelligence Information Insurance security agencies departments Page 569 Discovering Computers 2012: Chapter 11 19
  • 20. Hardware Theft and Vandalism Hardware vandalism Hardware theft is the is the act of defacing act of stealing or destroying computer equipment computer equipment Page 570 Discovering Computers 2012: Chapter 11 20
  • 21. Hardware Theft and Vandalism • To help reduce the of chances of theft, companies and schools use a variety of security measures Cables to lock Physical access controls Alarm systems equipment Real time location Passwords, possessed system objects, and biometrics Page 570 Discovering Computers 2012: Chapter 11 21 Figure 11-15
  • 22. Software Theft • Software theft occurs when someone: Steals software Intentionally media erases programs Illegally Illegally copies a registers and/or program activates a program Page 571 Discovering Computers 2012: Chapter 11 22
  • 23. Software Theft • A single-user license agreement typically contains the following conditions: Permitted to • Install the software on one computer • Make one copy of the software • Remove the software from your computer before giving it away or selling it Not permitted to • Install the software on a network • Give copies to friends or colleagues while continuing to use the software • Export the software • Rent or lease the software Page 571 Discovering Computers 2012: Chapter 11 23
  • 24. Software Theft • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law • Some software requires product activation to function fully Pages 571 – 572 Discovering Computers 2012: Chapter 11 24 Figure 11-16
  • 25. Information Theft • Information theft occurs when someone steals personal or confidential information • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access Pages 572 - 573 Discovering Computers 2012: Chapter 11 25 Figure 11-17
  • 26. Information Theft Page 573 Discovering Computers 2012: Chapter 11 26 Figure 11-18
  • 27. Information Theft • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender – Often used to ensure that an impostor is not participating in an Internet transaction • Web browsers and Web sites use encryption techniques Page 574 Discovering Computers 2012: Chapter 11 27
  • 28. Information Theft • Popular security techniques include Digital Transport Layer Certificates Security (TLS) Secure HTTP VPN Pages 574 - 575 Discovering Computers 2012: Chapter 11 28
  • 29. Information Theft Pages 574 - 575 Discovering Computers 2012: Chapter 11 29 Figures 11-19 – 11-20
  • 30. System Failure • A system failure is the prolonged malfunction of a computer • A variety of factors can lead to system failure, including: – Aging hardware – Natural disasters – Electrical power problems • Noise, undervoltages, and overvoltages – Errors in computer programs Page 575 Discovering Computers 2012: Chapter 11 30
  • 31. System Failure • Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS) Page 576 Discovering Computers 2012: Chapter 11 31 Figures 11-21 – 11-22
  • 32. Backing Up – The Ultimate Safeguard • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it • Offsite backups are stored in a location separate from the computer site Cloud Storage Page 577 Discovering Computers 2012: Chapter 11 32
  • 33. Backing Up – The Ultimate Safeguard • Two categories of • Three-generation backups: backup policy – Full backup Grandparent – Selective backup Parent Child Page 577 Discovering Computers 2012: Chapter 11 33
  • 34. Wireless Security • Wireless access poses additional security risks – About 80 percent of wireless networks have no security protection • War driving allows individuals to detect wireless networks while driving a vehicle through the area Page 578 Discovering Computers 2012: Chapter 11 34 Figure 11-23
  • 35. Wireless Security • In additional to using firewalls, some safeguards improve security of wireless networks: A wireless access Change the default point should not SSID broadcast an SSID Configure a WAP so that only Use WPA or WPA2 certain devices can security standards access it Page 578 Discovering Computers 2012: Chapter 11 35
  • 36. Health Concerns of Computer Use • The widespread use of computers has led to health concerns – Repetitive strain injury (RSI) • Tendonitis • Carpal tunnel syndrome (CTS) – Computer vision syndrome (CVS) Page 579 Discovering Computers 2012: Chapter 11 36 Figure 11-24
  • 37. Health Concerns of Computer Use Page 580 Discovering Computers 2012: Chapter 11 37 Figure 11-25
  • 38. Health Concerns of Computer Use • Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Page 580 Discovering Computers 2012: Chapter 11 38 Figure 11-26
  • 39. Health Concerns of Computer Use • Computer addiction occurs when the computer consumes someone’s entire social life • Symptoms of users include: Craves Overjoyed Unable to stop computer when at the computer time computer activity Irritable when Neglects Problems at not at the family and work or computer friends school Page 581 Discovering Computers 2012: Chapter 11 39
  • 40. Ethics and Society • Computer ethics are the moral guidelines that govern the use of computers and information systems • Information accuracy is a concern – Not all information on the Web is correct Pages 581 – 582 Discovering Computers 2012: Chapter 11 40 Figure 11-28
  • 41. Ethics and Society Intellectual property rights are the rights to which creators are entitled for their work • A copyright protects any tangible form of expression An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Page 582 Discovering Computers 2012: Chapter 11 41
  • 42. Ethics and Society Page 583 Discovering Computers 2012: Chapter 11 42 Figure 11-29
  • 43. Ethics and Society • Green computing involves reducing the electricity and environmental waste while using a computer Pages 583 – 584 Discovering Computers 2012: Chapter 11 43 Figure 11-30
  • 44. Ethics and Society • Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them • Huge databases store data online • It is important to safeguard your information Page 584 Discovering Computers 2012: Chapter 11 44
  • 45. Ethics and Society Page 584 Discovering Computers 2012: Chapter 11 45 Figure 11-31
  • 46. Ethics and Society • When you fill out a form, the merchant that receives the form usually enters it into a database • Many companies today allow people to specify whether they want their personal information distributed Page 585 Discovering Computers 2012: Chapter 11 46 Figure 11-32
  • 47. Ethics and Society • A cookie is a small text file that a Web server stores on your computer • Web sites use cookies for a variety of reasons: Assist with Allow for Store users’ online personalization passwords shopping Track how Target often users advertisements visit a site Pages 585 – 586 Discovering Computers 2012: Chapter 11 47
  • 48. Ethics and Society Page 586 Discovering Computers 2012: Chapter 11 48 Figure 11-33
  • 49. Ethics and Society • Spam is an unsolicited e-mail message or newsgroup posting • E-mail filtering blocks e-mail messages from designated sources • Anti-spam programs attempt to remove spam before it reaches your inbox Page 587 Discovering Computers 2012: Chapter 11 49 Figure 11-34
  • 50. Ethics and Society • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information • Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing Pages 587 - 588 Discovering Computers 2012: Chapter 11 50 Figure 11-35
  • 51. Ethics and Society • The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data – See Figure 11-36 on page 589 for a listing of major U.S. government laws concerning privacy • The 1970 Fair Credit Reporting Act limits the rights of others viewing a credit report to only those with a legitimate business need Page 588 Discovering Computers 2012: Chapter 11 51
  • 52. Ethics and Society Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers to observe, record, and review an employee’s use of a computer Page 590 Discovering Computers 2012: Chapter 11 52
  • 53. Ethics and Society • Content filtering is the process of restricting access to certain material on the Web • Many businesses use content filtering • Internet Content Rating Association (ICRA) • Web filtering software restricts access to specified Web sites Pages 590 – 591 Discovering Computers 2012: Chapter 11 53 Figure 11-37
  • 54. Summary Potential computer risks and Wireless security risks and safeguards safeguards Ethical issues surrounding information accuracy, Computer-related health intellectual property rights, issues and preventions codes of conduct, green computing, and information privacy Page 591 Discovering Computers 2012: Chapter 11 54
  • 55. Discovering Computers 2012 Your Interactive Guide to the Digital World Chapter 11 Complete