SlideShare une entreprise Scribd logo
1  sur  33
Chapter 12 Computer Security and Risks
Topics “ Computers are power, and direct contact with power can bring out the best or worst in a person.” Former computer criminal turned corporate programmer ,[object Object],[object Object],[object Object],[object Object]
On-line Outlaws: Computer Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Computer Crime Dossier ,[object Object],[object Object]
The Computer Crime Dossier ,[object Object],[object Object],[object Object]
Theft by Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Piracy and  Intellectual Property Laws ,[object Object],[object Object]
Software Piracy and  Intellectual Property Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Sabotage ,[object Object],[object Object],[object Object],Sabotage of software can include: These are referred to as a virus.
Software Sabotage How software sabotage works:
Software Sabotage ,[object Object],[object Object],[object Object]
Hacking and  Electronic Trespassing ,[object Object],[object Object],[object Object],[object Object]
Hacking and  Electronic Trespassing ,[object Object],[object Object],Cliff  Stoll discovered an international computer espionage ring because of a .75 cent accounting error.
Computer Security:  Reducing Risks ,[object Object],[object Object],[object Object]
Computer Security:  Reducing Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],A variety of security techniques are used to protect computer systems
Physical Access Restrictions ,[object Object],[object Object],[object Object],[object Object]
Physical Access Restrictions ,[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewalls, Encryption, and Audits ,[object Object],[object Object],[object Object],[object Object]
Firewalls ,[object Object]
Encryption ,[object Object],[object Object],[object Object]
Encryption
Audit-Control Software ,[object Object],[object Object]
Backups and Other Precautions ,[object Object],[object Object]
Human Security Controls: Laws, Management, and Ethics ,[object Object],[object Object]
Security, Privacy, Freedom, & Ethics:  The Delicate Balance ,[object Object],[object Object],[object Object],“ In this age of advanced technology, thick walls and locked doors cannot guard our privacy or safeguard our personal freedom.” Lyndon B. Johnson
Rules of Thumb: Safe Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security and Reliability ,[object Object],[object Object],[object Object],[object Object]
Bugs and Breakdowns ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bugs and Breakdowns ,[object Object],[object Object]
Computers at War ,[object Object],[object Object]
Warfare in the Digital Domain ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

Contenu connexe

Tendances

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
Arber Hoxhallari
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
ciso_insights
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
paramalways
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
Hemant Nagwekar
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
Louie Medinaceli
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
Ram Dutt Shukla
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
Ardit Meti
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
malik1972
 

Tendances (20)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Computer security and
Computer security andComputer security and
Computer security and
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
E secuity
E secuityE secuity
E secuity
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 

En vedette

Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
Rolf Häsänen
 
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
BayCHI
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 
VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08
internationalvr
 
VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06
internationalvr
 
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
internationalvr
 
Invitation Autumn
Invitation AutumnInvitation Autumn
Invitation Autumn
guestbf0dbb
 
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
internationalvr
 
VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008
internationalvr
 

En vedette (20)

A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiA Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
 
Ch04
Ch04Ch04
Ch04
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & Safety
 
Information security management
Information security managementInformation security management
Information security management
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error Prevention
 
Proyectosolidario.pptx
Proyectosolidario.pptxProyectosolidario.pptx
Proyectosolidario.pptx
 
eXtension: Managing Online Content Providers
 eXtension: Managing Online  Content Providers eXtension: Managing Online  Content Providers
eXtension: Managing Online Content Providers
 
Digital Technology for Museum
Digital Technology for MuseumDigital Technology for Museum
Digital Technology for Museum
 
VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08
 
VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06
 
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
 
Invitation Autumn
Invitation AutumnInvitation Autumn
Invitation Autumn
 
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
 
MyOpenArchive
MyOpenArchiveMyOpenArchive
MyOpenArchive
 
Presentación hangover taxi
Presentación hangover taxiPresentación hangover taxi
Presentación hangover taxi
 
VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008
 
eCMO 2010 The e behind branding
eCMO 2010 The e behind brandingeCMO 2010 The e behind branding
eCMO 2010 The e behind branding
 

Similaire à Beekman5 std ppt_12

Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
Karan Bhandari
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
MISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
MISY
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Similaire à Beekman5 std ppt_12 (20)

Data security
Data securityData security
Data security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
computer security
computer securitycomputer security
computer security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Internet security
Internet securityInternet security
Internet security
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 

Plus de Department of Education - Philippines

Plus de Department of Education - Philippines (20)

Ppt quiz
Ppt quizPpt quiz
Ppt quiz
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Beekman5 std ppt_16
Beekman5 std ppt_16Beekman5 std ppt_16
Beekman5 std ppt_16
 
Beekman5 std ppt_15
Beekman5 std ppt_15Beekman5 std ppt_15
Beekman5 std ppt_15
 
Beekman5 std ppt_14
Beekman5 std ppt_14Beekman5 std ppt_14
Beekman5 std ppt_14
 
Beekman5 std ppt_13
Beekman5 std ppt_13Beekman5 std ppt_13
Beekman5 std ppt_13
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Beekman5 std ppt_10
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
Beekman5 std ppt_09
 
Beekman5 std ppt_08
Beekman5 std ppt_08Beekman5 std ppt_08
Beekman5 std ppt_08
 
Beekman5 std ppt_07
Beekman5 std ppt_07Beekman5 std ppt_07
Beekman5 std ppt_07
 
Beekman5 std ppt_06
Beekman5 std ppt_06Beekman5 std ppt_06
Beekman5 std ppt_06
 
Beekman5 std ppt_05
Beekman5 std ppt_05Beekman5 std ppt_05
Beekman5 std ppt_05
 
Beekman5 std ppt_04
Beekman5 std ppt_04Beekman5 std ppt_04
Beekman5 std ppt_04
 
Beekman5 std ppt_03
Beekman5 std ppt_03Beekman5 std ppt_03
Beekman5 std ppt_03
 
Beekman5 std ppt_02
Beekman5 std ppt_02Beekman5 std ppt_02
Beekman5 std ppt_02
 
Beekman5 std ppt_01
Beekman5 std ppt_01Beekman5 std ppt_01
Beekman5 std ppt_01
 
Dep ed past-form
Dep ed past-formDep ed past-form
Dep ed past-form
 
Dep ed form-18e-giv-gvi-by-jonathanparanada
Dep ed form-18e-giv-gvi-by-jonathanparanadaDep ed form-18e-giv-gvi-by-jonathanparanada
Dep ed form-18e-giv-gvi-by-jonathanparanada
 
Dep ed form-18e-gi-giii-by-jonathanparanada
Dep ed form-18e-gi-giii-by-jonathanparanadaDep ed form-18e-gi-giii-by-jonathanparanada
Dep ed form-18e-gi-giii-by-jonathanparanada
 

Beekman5 std ppt_12