Computer Security and Safety, Ethics, and Privacy
Computer Security and Safety, Ethics, and Privacy
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
INTERNET AND NETWORK ATTACKS
Users can take several
precautions to protect
their home and work
computers and mobile
devices from these
malicious infections
INTERNET AND NETWORK ATTACKS
A botnet is a group of compromised computers connected to a
network
A compromised computer is known as a zombie
A denial of service attack (DoS attack) disrupts computer access
to Internet services
Distributed DoS (DDoS)
A back door is a program or set of instructions in a program that
allow users to bypass security controls
Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimate
INTERNET AND NETWORK ATTACKS
A firewall is hardware and/or software that protects a network’s
resources from intrusion
INTERNET AND NETWORK ATTACKS
Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
UNAUTHORIZED ACCESS AND USE
Information
Insurance
security
agencies
departments
HARDWARE THEFT AND VANDALISM
Hardware vandalism
Hardware theft is the
is the act of defacing or
act of stealing computer
destroying computer
equipment
equipment
HARDWARE THEFT AND VANDALISM
To help reduce the of chances of theft, companies and schools use a
variety of security measures
Passwords, possessed
Real time location system
objects, and biometrics
SOFTWARE THEFT
Software theft occurs when someone:
Illegally registers
Illegally copies a
and/or activates a
program
program
SOFTWARE THEFT
A single-user
license agreement typically contains the
following conditions:
Permitted to
• Install the software on one computer
• Make one copy of the software
• Remove the software from your computer before giving it away or selling it
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
SOFTWARE THEFT
Copying, loaning,
borrowing, renting, or
distributing software can
be a violation of
copyright law
Some software requires
product activation to
function fully
INFORMATION THEFT
Information theft occurs when someone steals personal or
confidential information
Encryption is a process of converting readable data into unreadable
characters to prevent unauthorized access
INFORMATION THEFT
INFORMATION THEFT
A digital signature is an encrypted code that a person, Web site, or
organization attaches to an electronic message to verify the identity
of the sender
Often used to ensure that an impostor is not participating in an Internet
transaction
Web browsers and Web sites use encryption techniques
INFORMATION THEFT
Popular security techniques include
Parent
Child
WIRELESS SECURITY
Wireless access poses additional security risks
About 80 percent of wireless networks have no security
protection
Wardriving allows individuals to detect wireless networks
while driving a vehicle through the area
WIRELESS SECURITY
In additional to using firewalls, some safeguards improve security
of wireless networks:
A wireless access
Change the default
point should not
SSID
broadcast an SSID
Configure a WAP
so that only certain Use WPA or WPA2
devices can access security standards
it
HEALTH CONCERNS OF COMPUTER USE
Thewidespread use of
computers has led to
health concerns
Repetitive strain injury
(RSI)
Tendonitis
Carpal tunnel syndrome
(CTS)
Computer vision
syndrome (CVS)
HEALTH CONCERNS OF COMPUTER USE
HEALTH CONCERNS OF COMPUTER USE
Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
HEALTH CONCERNS OF COMPUTER USE
Computer addiction occurs when the computer consumes
someone’s entire social life
Symptoms of users include:
Unable to stop
Craves Overjoyed when
computer
computer time at the computer
activity
Irritable when
Neglects family Problems at
not at the
and friends work or school
computer
ETHICS AND SOCIETY
Computer ethics are the
moral guidelines that
govern the use of
computers and
information systems
Information accuracy is
a concern
Notall information on the
Web is correct
ETHICS AND SOCIETY
Green computing involves reducing the electricity and
environmental waste while using a computer
ETHICS AND SOCIETY
Information privacy refers to the right of individuals and
companies to deny or restrict the collection and use of information
about them
Huge databases store data online