0% found this document useful (0 votes)
37 views

Computer Security and Safety, Ethics, and Privacy

This document discusses many computer security risks and how to protect against them. It covers topics like viruses, hacking, unauthorized access, theft of hardware, software and data. It also discusses system failures and the importance of backups. It provides details on many security techniques and risks associated with wireless networks.

Uploaded by

googley71
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Computer Security and Safety, Ethics, and Privacy

This document discusses many computer security risks and how to protect against them. It covers topics like viruses, hacking, unauthorized access, theft of hardware, software and data. It also discusses system failures and the importance of backups. It provides details on many security techniques and risks associated with wireless networks.

Uploaded by

googley71
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 41

Computer Security and Safety,

Ethics, and Privacy


COMPUTER SECURITY RISKS
 A computer security risk is any event or action that could
cause a loss of or damage to computer hardware, software,
data, information, or processing capability
 A cybercrime is an online or Internet-based illegal act

Script Kiddies Corporate Spies


Crackers
Hackers

Unethical Employees Cyberextortionists Cyberterrorists


COMPUTER SECURITY RISKS
INTERNET AND NETWORK ATTACKS
 Information transmitted over networks has a higher degree
of security risk than information kept on an organization’s
premises
 An online security service is a Web site that evaluates
your computer to check for Internet and e-mail
vulnerabilities
INTERNET AND NETWORK ATTACKS
Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program that
computer repeatedly, program that hides in a
negatively using up hides within computer
by altering resources or looks like and allows
the way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control
INTERNET AND NETWORK ATTACKS
 An infected computer has one or more of the following symptoms:

Operating system Available memory Screen displays


Files become
runs much slower is less than unusual message or
corrupted
than usual expected image

Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear

Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
INTERNET AND NETWORK ATTACKS
 Users can take several
precautions to protect
their home and work
computers and mobile
devices from these
malicious infections
INTERNET AND NETWORK ATTACKS
 A botnet is a group of compromised computers connected to a
network
 A compromised computer is known as a zombie
 A denial of service attack (DoS attack) disrupts computer access
to Internet services
 Distributed DoS (DDoS)
 A back door is a program or set of instructions in a program that
allow users to bypass security controls
 Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimate
INTERNET AND NETWORK ATTACKS
 A firewall is hardware and/or software that protects a network’s
resources from intrusion
INTERNET AND NETWORK ATTACKS

Intrusion detection software


• Analyzes all network traffic
• Assesses system vulnerabilities
• Identifies any unauthorized intrusions
• Notifies network administrators of suspicious behavior
patterns or system breaches

Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
UNAUTHORIZED ACCESS AND USE

Unauthorized access is Unauthorized use is the


the use of a computer or use of a computer or its
network without data for unapproved or
permission possibly illegal activities
UNAUTHORIZED ACCESS AND USE
 Organizations take
several measures to help
prevent unauthorized
access and use
 Acceptable use policy
 Disable file and printer
sharing
 Firewalls
 Intrusion detection
software
UNAUTHORIZED ACCESS AND USE
 Access controls define who can access a computer, when they can
access it, and what actions they can take
 Two-phase processes called identification and authentication
 User name
 Password
 Passphrase
 CAPTCHA
UNAUTHORIZED ACCESS AND USE
 A possessed object is any  A biometric device
item that you must carry to authenticates a person’s
gain access to a computer or identity by translating a
computer facility personal characteristic into a
 Often are used in combination digital code that is compared
with a personal identification with a digital code in a
number (PIN) computer
UNAUTHORIZED ACCESS AND USE
 Digital forensics is the discovery, collection, and analysis of
evidence found on computers and networks
 Many areas use digital forensics

Law Criminal Military


enforcement prosecutors intelligence

Information
Insurance
security
agencies
departments
HARDWARE THEFT AND VANDALISM

Hardware vandalism
Hardware theft is the
is the act of defacing or
act of stealing computer
destroying computer
equipment
equipment
HARDWARE THEFT AND VANDALISM
 To help reduce the of chances of theft, companies and schools use a
variety of security measures

Physical access controls Alarm systems Cables to lock equipment

Passwords, possessed
Real time location system
objects, and biometrics
SOFTWARE THEFT
 Software theft occurs when someone:

Steals software Intentionally


media erases programs

Illegally registers
Illegally copies a
and/or activates a
program
program
SOFTWARE THEFT
 A single-user
license agreement typically contains the
following conditions:
Permitted to
• Install the software on one computer
• Make one copy of the software
• Remove the software from your computer before giving it away or selling it

Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
SOFTWARE THEFT
 Copying, loaning,
borrowing, renting, or
distributing software can
be a violation of
copyright law
 Some software requires
product activation to
function fully
INFORMATION THEFT
 Information theft occurs when someone steals personal or
confidential information
 Encryption is a process of converting readable data into unreadable
characters to prevent unauthorized access
INFORMATION THEFT
INFORMATION THEFT
 A digital signature is an encrypted code that a person, Web site, or
organization attaches to an electronic message to verify the identity
of the sender
 Often used to ensure that an impostor is not participating in an Internet
transaction
 Web browsers and Web sites use encryption techniques
INFORMATION THEFT
 Popular security techniques include

Digital Transport Layer


Certificates Security (TLS)

Secure HTTP VPN


SYSTEM FAILURE
 A system failure is the prolonged malfunction of a computer
 A variety of factors can lead to system failure, including:
 Aging hardware
 Natural disasters
 Electrical power problems
 Noise, undervoltages, and overvoltages
 Errors in computer programs
SYSTEM FAILURE
 Two ways to protect from system failures caused by electrical
power variations include surge protectors and uninterruptable
power supplies (UPS)
BACKING UP – THE ULTIMATE
SAFEGUARD
 A backup is a duplicate of a file, program, or disk that can be used
if the original is lost, damaged, or destroyed
 To back up a file means to make a copy of it
 Offsite backups are stored in a location separate from the computer
site
BACKING UP – THE ULTIMATE
SAFEGUARD
 Twocategories of  Three-generation backup
backups: policy
 Fullbackup
 Selective backup Grandparent

Parent

Child
WIRELESS SECURITY
 Wireless access poses additional security risks
 About 80 percent of wireless networks have no security
protection
 Wardriving allows individuals to detect wireless networks
while driving a vehicle through the area
WIRELESS SECURITY
 In additional to using firewalls, some safeguards improve security
of wireless networks:

A wireless access
Change the default
point should not
SSID
broadcast an SSID

Configure a WAP
so that only certain Use WPA or WPA2
devices can access security standards
it
HEALTH CONCERNS OF COMPUTER USE
 Thewidespread use of
computers has led to
health concerns
 Repetitive strain injury
(RSI)
 Tendonitis
 Carpal tunnel syndrome

(CTS)
 Computer vision
syndrome (CVS)
HEALTH CONCERNS OF COMPUTER USE
HEALTH CONCERNS OF COMPUTER USE
 Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
HEALTH CONCERNS OF COMPUTER USE
 Computer addiction occurs when the computer consumes
someone’s entire social life
 Symptoms of users include:

Unable to stop
Craves Overjoyed when
computer
computer time at the computer
activity

Irritable when
Neglects family Problems at
not at the
and friends work or school
computer
ETHICS AND SOCIETY
 Computer ethics are the
moral guidelines that
govern the use of
computers and
information systems
 Information accuracy is
a concern
 Notall information on the
Web is correct
ETHICS AND SOCIETY
 Green computing involves reducing the electricity and
environmental waste while using a computer
ETHICS AND SOCIETY
 Information privacy refers to the right of individuals and
companies to deny or restrict the collection and use of information
about them
 Huge databases store data online

 It is important to safeguard your information


ETHICS AND SOCIETY
ETHICS AND SOCIETY
 When you fill out a
form, the merchant that
receives the form usually
enters it into a database
 Many companies today
allow people to specify
whether they want their
personal information
distributed
ETHICS AND SOCIETY
 A cookie is a small text file that a Web server stores on
your computer
 Web sites use cookies for a variety of reasons:

Allow for Store users’ Assist with


personalization passwords online shopping

Track how often Target


users visit a site advertisements
ETHICS AND SOCIETY

You might also like