Final Cetech
Final Cetech
Google Trends
Milestone of Cloud Computing Cloud Service Layers - Example
Software as a - Gmail
Service (SaaS) - Sales force
- Google
Platform as a
- Force.com
Service (PaaS)
- Windows Azure
- Gogrid
Infrastructure as
- Amazon web services
a Service (IaaS)
- The rackspace cloud
Normal Antivirus
y
Computer Security and Safety, Ethics, and Privacy
Computer Virus
• An infected computer has one or more of the • A botnet is a group of compromised computers
following symptoms: connected to a network
- Operating system runs much slower than usual – A compromised computer is known as a zombie
- Available memory is less than expected • A denial of service attack (DoS attack) disrupts
- Files become corrupted computer access to Internet services
- Screen displays unusual message or image • A back door is a program or set of instructions in a
- Music or unusual sound plays randomly program that allow users to bypass security controls
- Existing programs and files disappear • Spoofing is a technique intruders use to make their
- Programs or files do not work properly network or Internet transmission appear legitimate
- Unknown programs or files mysteriously appear • A firewall is hardware and/or software that
- System properties change protects a network’s resources from intrusion
- Operating system does not start up
- Operating system shuts down unexpectedly
• Digital forensics is the discovery, collection, and
analysis of evidence found on computers and
networks
• Many areas use digital forensics:
- Law enforcement
- Criminal prosecutors
- Military intelligence
- Insurance agencies
- Information security departments
System Failure
• A system failure is the prolonged malfunction of a
computer
• A variety of factors can lead to system failure,
including:
– Aging hardware
– Natural disasters • Ergonomics is an applied science devoted to
– Electrical power problems incorporating comfort, efficiency, and safety into the
– Errors in computer programs design of items in the workplace
• Two ways to protect from system failures caused by
electrical power variations include surge protectors
and uninterruptable power supplies (UPS)
Summary
- Potential computer risks and the safeguards
- Wireless security risks and safeguards
- Computer-related health issues and preventions
- Ethical issues surrounding information accuracy,
intellectual property rights, green computing, and
information privacy