0% found this document useful (0 votes)
14 views

Computer Science Module 6

Uploaded by

hkaylee1629
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

Computer Science Module 6

Uploaded by

hkaylee1629
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SECURITY AND SAFETY

Module 6
• One of the more dangerous risks of using a computer is that
someone will steal our important information.
• Individuals who launch attacks against other users and their
computers are attackers. These attackers may work individually, but
more often they belong to organized gangs who meet in hidden
online “dark web” forums to trade information, buy and sell stolen
data and attacker tools, and even coordinate their attacks.
6.1
o Script kiddies are individuals who want to attack computers
DISCUSS but lack the knowledge of computers and networks needed to
COMPUTER do so.
SAFETY AND o Hacktivists are attackers who are strongly motivated by
principles or beliefs. Attacks by hacktivists can involve breaking
HEALTH into a website and changing the contents on the site as a means
RISKS of making a political statement.
o Cyberterrorists attack a nation’s computer networks, like the
electrical power grid, to cause disruption and panic among
citizens.
o Another serious security threat to companies can come from its
own employees, contractors, and business partners, called
insiders.
6. 1
D ISCU SS C OM P UTE R SAF ETY AND HEALT H R ISKS

• For most computer users the greatest risk comes from attackers who want to steal their
information for their own financial gain.
• Attackers try to steal and then use your credit card numbers, online financial account
information, or Social Security numbers.
• The risks you face online when using the Internet or email are found:
o Online banking
o E-commerce shopping
o Fake websites
o Social media sites
• Many organizations collect and store your personal
information for legitimate means. But some
organizations might secretly share your confidential
information without your consent.
• Some tips for protecting your personal information
that is gathered by legitimate organizations include:
o Give only necessary information when completing
6. 1 an online form or a warranty or rebate card.
D I S C US S CO MP U T ER
o Review the information that online sites such as
SA FE T Y AN D H E ALT H Google, Facebook, Microsoft, and others have
R I SK S stored about you.
o Request to be removed from mailing lists.
o Create another email account to use when a
merchant or website requires an address.
o Do not use your social media account login
information to log in to another site (when that
option is available).
Environnmental Health Risks: When computers and other digital
devices are discarded, they often end up in landfills, creating significant
amounts of electronic waste (e-waste). These devices contain toxic
metals like lead and mercury, which can leach into the soil and water,
posing a risk of environmental contamination.

Physical Health Risks: Technology overuse, such as frequent


smartphone and computer use, can lead to repetitive strain injury (RSI),
causing symptoms like pain and stiffness in the upper body. Poor posture
and lack of ergonomic arrangements further contribute to health issues
like eyestrain.
6. 1
D ISCU SS CO MP UTER
SAF ETY AN D HEA LTH
RISKS
Behavioral Health Risks: Technology addiction is common, leading to
anxiety when away from devices. Excessive use can also contribute to a
sedentary lifestyle and psychological issues like anxiety, depression, and
poor social skills.

Social Health Risks: Technology also affects social health through


cyberbullying and cyberstalking. Unlike in-person bullying, cyberbullying
can persist indefinitely, be widely visible, and have long-term
consequences. Cyberstalking involves using technology to harass or
obsess over someone, posing a serious threat to personal safety.
6. 1
D ISCU SS CO MP UTER SAFETY A ND
HEA LTH RISKS

• Common cybersecurity attacks are categorized into malware-based attacks and social
engineering tactics.
• Malware Attacks: Malware refers to software that infiltrates systems without user
consent to perform harmful actions.
o Viruses: Malicious code that reproduces by inserting itself into files.
o Worms: Programs that replicate via networks, exploiting system vulnerabilities.
o Trojans: Programs disguised as harmless software, which also perform malicious tasks.
o Ransomware: Blocks access to systems or encrypts files, demanding payment for
restoration.
• Social Engineering Attacks: These attacks deceive users into compromising their own
security.
o Phishing: Emails or websites pretending to be legitimate to steal information.
o Hoaxes: False warnings prompting users to alter system settings or call attackers for
help.
o Spam: Unwanted emails that can distribute malware via attachments.
• Attackers use psychological manipulation, exploiting principles like authority, urgency, and
trust to trick victims into actions that compromise their security.
6.2
US E PROTECTIVE MEASU RES TO
SAFEGUARD COMPUTERS AND DATA

Electrical Explanation
Protecting Computers from Electrical Problems
Change
Although the electrical power that comes into your home, school, or
Blackout Total loss in
place of work is generally constant in its “force” (voltage), there may
be occasional increases or decreases that can impact sensitive power
electrical devices, particularly computers. Brownout Drop in voltage
A surge protector can defend computer equipment from spikes,
lasting minutes
surges, and noise. A surge protector lies between the computer and or hours
the electrical outlet, and absorbs any electrical change so that it does
not reach the computer equipment Spike Very short
duration of
voltage increase
Theft

To prevent laptops from being stolen you can use a cable lock. Most Surge Short duration
portable devices (as well as many expensive computer monitors) of voltage
have a special security slot built into the case. A cable lock can be increase
inserted into the security slot and rotated so that the cable lock is
secured to the device. The cable can then be connected to an Noise Unwanted high
immovable object. frequence
energy
Protecting your privacy
Privacy is defined as the state or condition of being free
from public attention to the degree that you determine.
That is, privacy is freedom from attention, observation, or
interference, based on your decision. Privacy is the right to
6.2 be left alone to the level that you choose.

USE • To protect important information, consider the


following privacy best practices:
PROTECTIVE • Do not provide personal information either over the
phone or through an email message.
MEASURES TO • Keep personal information in a secure location in a

SAFEGUARD home or apartment.


• Be cautious about what information is posted on

COMPUTERS social-networking sites and who can view your


information. Show “limited friends” a reduced version
of a profile, such as casual acquaintances or business
AND DATA associates.
• Give cautious consideration before giving permission
to a website or app request to collect data.
• Use common sense. Websites that request more
personal information than would normally be
expected, such as a username and password to
another account, should be avoided.
6. 2
U SE P ROTECTIVE M EASU RES TO SA FEGUA RD
C OM PU TERS A ND DATA

Discuss Measures to Prevent Identity Theft and Protect Financial Information


Identity theft involves using someone’s personal information, such as their name, Social Security number, or
credit card number, to commit financial fraud.

Ways to protect your Financial Information


• Shred financial documents and paperwork that contains personal information before discarding it.
• Do not carry a Social Security number in a wallet or write it on a check.
• Do not provide personal information either over the phone or through an email message.
• Keep personal information in a secure location in a home or apartment.
1. ____ are attackers who want to attack computers but lack the
knowledge needed to do so.
a. Script kiddies
b. Hacktivists
c. Cyberterrorists
d. Nation state actors
2. Each of the following is a factor that causes repetitive strain
injury (RSI) except ____ .
a. repetitive activity
b. improper technique
QUEST IONS c. lack of restful sleep
d. uninterrupted intensity
3. (True or False) A worm is a malicious program that uses a
computer network to replicate.
4. A _____ is a very short duration of a voltage increase that can
be absorbed by a surge protector.
a. spike
b. surge
c. blackout
d. brownout
5. (True or False) Wi-Fi Protected Access 2 (WPA2) Personal
encrypts wireless data transmissions and limits who can access the
Wi-Fi network.
6. When creating a strong password _____ is the most important
element.
a. length
b. complexity
c. repetitiveness
d. ability to memorize
7. _______ is the process of “scrambling” information in such a
way that it cannot be read unless the user possesses the “key.”
a. Decryption
QUEST IONS b. Encryption
c. Digital signing
d. Certification
8. (True or False) You have the right to see your credit
information.
9. Which of the following is not a web browser setting for
managing cookies?
a. Have all cookies automatically expire after 45 days.
b. Accept or deny cookies.
c. Delete all cookies when the web browser is closed.
d. Make exceptions for specific websites.
ANSWER SHEE T

1) b. Hacktivists
2) c. lack of restful sleep
3) True
4) a. spike
5) True
6) a. length
7) b. Encryption
8) True
9) a. Have all cookies automatically expire after 45 days

You might also like