SlideShare a Scribd company logo
1 of 55
Computer Security and
Safety, Ethics, and Privacy

Sumesh Koyon
Objectives Overview
Define the term,
computer security risks,
and briefly describe the
types of cybercrime
perpetrators

Describe various types
of Internet and network
attacks, and identify
ways to safeguard
against these attacks

Discuss techniques to
prevent unauthorized
computer access and
use

Identify safeguards
against hardware theft
and vandalism

Explain the ways
software manufacturers
protect against
software piracy

Discuss how encryption
works, and explain why
it is necessary

Support Organization With IT

2
Objectives Overview

Discuss the types of
devices available that
protect computers from
system failure

Explain the options
available for backing up
computer resources

Identify risks and
safeguards associated
with wireless
communications

Discuss ways to prevent
health-related disorders
and injuries due to
computer use

Recognize issues related
to information accuracy,
intellectual property
rights, codes of conduct,
and green computing

Discuss issues
surrounding information
privacy

Support Organization With IT

3
Computer Security Risks
• A computer security risk is any event or action that could
cause a loss of or damage to computer hardware,
software, data, information, or processing capability
• A cybercrime is an online or Internet-based illegal act
Hackers

Crackers

Unethical
Employees

Script Kiddies

Cyberextortionists

Support Organization With IT

Corporate Spies

Cyberterrorists

4
Computer Security Risks

Support Organization With IT

5
Internet and Network Attacks
• Information transmitted over networks has a higher
degree of security risk than information kept on an
organization’s premises
• An online security service is a Web site that evaluates
your computer to check for Internet and e-mail
vulnerabilities

Support Organization With IT

6
Internet and Network Attacks
Computer
Virus

• Affects a
computer
negatively by
altering the
way the
computer
works

Worm

Trojan Horse

Rootkit

• Copies itself
repeatedly,
using up
resources
and possibly
shutting
down the
computer or
network

• A malicious
program that
hides within
or looks like
a legitimate
program

• Program that
hides in a
computer
and allows
someone
from a
remote
location to
take full
control

Support Organization With IT

7
Internet and Network Attacks
• An infected computer has one or more of the
following symptoms:
Operating system
runs much slower
than usual

Music or unusual
sound plays
randomly

Available memory
is less than
expected

Files become
corrupted

Screen displays
unusual message
or image

Existing programs
and files disappear

Programs or files
do not work
properly

Unknown
programs or files
mysteriously
appear

System properties
change

Operating system
does not start up
Support Organization With IT

Operating system
shuts down
unexpectedly
8
Internet and Network Attacks

Support Organization With IT

9
Internet and Network Attacks

Support Organization With IT

10
Internet and Network Attacks
• Users can take several
precautions to protect
their home and work
computers and mobile
devices from these
malicious infections

Support Organization With IT

11
Internet and Network Attacks
• A botnet is a group of compromised computers connected to a
network
– A compromised computer is known as a zombie

• A denial of service attack (DoS attack) disrupts computer access to
Internet services
– Distributed DoS (DDoS)

• A back door is a program or set of instructions in a program that
allow users to bypass security controls
• Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimate

Support Organization With IT

12
Internet and Network Attacks
• A firewall is hardware and/or software that
protects a network’s resources from intrusion

Support Organization With IT

13
Internet and Network Attacks
Intrusion detection software
• Analyzes all network traffic
• Assesses system vulnerabilities
• Identifies any unauthorized intrusions
• Notifies network administrators of suspicious behavior
patterns or system breaches

Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
Support Organization With IT

14
Unauthorized Access and Use

Unauthorized access is
the use of a computer or
network without
permission

Unauthorized use is the
use of a computer or its
data for unapproved or
possibly illegal activities

Support Organization With IT

15
Unauthorized Access and Use
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
Support Organization With IT

16
Unauthorized Access and Use
• Access controls define who can access a
computer, when they can access it, and what
actions they can take
– Two-phase processes called identification and
authentication
– User name
– Password
– Passphrase
– CAPTCHA
Support Organization With IT

17
Unauthorized Access and Use
• A possessed object is any
item that you must carry to
gain access to a computer
or computer facility
– Often are used in
combination with a personal
identification number (PIN)

• A biometric device
authenticates a person’s
identity by translating a
personal characteristic into
a digital code that is
compared with a digital
code in a computer

Support Organization With IT

18
Unauthorized Access and Use
• Digital forensics is the discovery, collection, and
analysis of evidence found on computers and
networks
• Many areas use digital forensics
Law
enforcement

Criminal
prosecutors

Insurance
agencies

Military
intelligence

Information
security
departments

Support Organization With IT

19
Hardware Theft and Vandalism

Hardware theft is the
act of stealing
computer equipment

Hardware vandalism
is the act of defacing
or destroying
computer equipment

Support Organization With IT

20
Hardware Theft and Vandalism
• To help reduce the of chances of theft, companies
and schools use a variety of security measures
Physical access controls

Alarm systems

Real time location
system

Cables to lock
equipment

Passwords, possessed
objects, and biometrics

Support Organization With IT

21
Software Theft
• Software theft occurs when someone:

Steals software
media

Intentionally
erases programs

Illegally copies a
program

Illegally
registers and/or
activates a
program
Support Organization With IT

22
Software Theft
• A single-user license agreement typically contains the
following conditions:
Permitted to
• Install the software on one computer
• Make one copy of the software
• Remove the software from your computer before giving it away or selling it

Not permitted to
•
•
•
•

Install the software on a network
Give copies to friends or colleagues while continuing to use the software
Export the software
Rent or lease the software
Support Organization With IT

23
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully

Support Organization With IT

24
Information Theft
• Information theft occurs when someone steals
personal or confidential information
• Encryption is a process of converting readable
data into unreadable characters to prevent
unauthorized access

Support Organization With IT

25
Information Theft

Support Organization With IT

26
Information Theft
• A digital signature is an encrypted code that a
person, Web site, or organization attaches to an
electronic message to verify the identity of the
sender
– Often used to ensure that an impostor is not
participating in an Internet transaction

• Web browsers and Web sites use encryption
techniques
Support Organization With IT

27
Information Theft
• Popular security techniques include
Digital
Certificates

Transport Layer
Security (TLS)

Secure HTTP

VPN

Support Organization With IT

28
Information Theft

Support Organization With IT

29
System Failure
• A system failure is the prolonged malfunction of a
computer
• A variety of factors can lead to system failure,
including:
– Aging hardware
– Natural disasters
– Electrical power problems
• Noise, undervoltages, and overvoltages

– Errors in computer programs
Support Organization With IT

30
System Failure
• Two ways to protect from system failures caused
by electrical power variations include surge
protectors and uninterruptable power supplies
(UPS)

Support Organization With IT

31
Backing Up – The Ultimate Safeguard
• A backup is a duplicate of a file, program, or disk
that can be used if the original is lost, damaged,
or destroyed
– To back up a file means to make a copy of it

• Offsite backups are stored in a location separate
from the computer site
Cloud
Storage
Support Organization With IT

32
Backing Up – The Ultimate Safeguard
• Two categories of
backups:

• Three-generation
backup policy

– Full backup
– Selective backup

Grandparent

Parent

Child

Support Organization With IT

33
Wireless Security
• Wireless access poses additional security risks
– About 80 percent of wireless networks have no security
protection

• War driving allows individuals to detect wireless
networks while driving a vehicle through the area

Support Organization With IT

34
Wireless Security
• In additional to using firewalls, some safeguards
improve security of wireless networks:
A wireless access
point should not
broadcast an SSID

Change the default
SSID

Configure a WAP
so that only
certain devices can
access it

Use WPA or WPA2
security standards

Support Organization With IT

35
Health Concerns of Computer Use
• The widespread use of
computers has led to
health concerns
– Repetitive strain injury
(RSI)
• Tendonitis
• Carpal tunnel syndrome
(CTS)

– Computer vision
syndrome (CVS)

Support Organization With IT

36
Health Concerns of Computer Use

Support Organization With IT

37
Health Concerns of Computer Use
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace

Support Organization With IT

38
Health Concerns of Computer Use
• Computer addiction occurs when the computer
consumes someone’s entire social life
• Symptoms of users include:
Craves
computer
time

Overjoyed
when at the
computer

Unable to stop
computer
activity

Irritable when
not at the
computer

Neglects
family and
friends

Problems at
work or
school

Support Organization With IT

39
Ethics and Society
• Computer ethics are
the moral guidelines
that govern the use of
computers and
information systems
• Information accuracy is
a concern
– Not all information on
the Web is correct

Support Organization With IT

40
Ethics and Society
Intellectual property rights are the rights to
which creators are entitled for their work
• A copyright protects any tangible form of expression

An IT code of conduct is a written guideline
that helps determine whether a specific
computer action is ethical or unethical
Support Organization With IT

41
Ethics and Society

Support Organization With IT

42
Ethics and Society
• Green computing involves reducing the electricity
and environmental waste while using a computer

Support Organization With IT

43
Ethics and Society
• Information privacy refers to the right of
individuals and companies to deny or restrict the
collection and use of information about them
• Huge databases store data online
• It is important to safeguard your information

Support Organization With IT

44
Ethics and Society

Support Organization With IT

45
Ethics and Society
• When you fill out a
form, the merchant that
receives the form
usually enters it into a
database
• Many companies today
allow people to specify
whether they want
their personal
information distributed
Support Organization With IT

46
Ethics and Society
• A cookie is a small text file that a Web server stores on
your computer
• Web sites use cookies for a variety of reasons:

Allow for
personalization

Store users’
passwords

Track how
often users
visit a site

Assist with
online
shopping

Target
advertisements

Support Organization With IT

47
Ethics and Society

Support Organization With IT

48
Ethics and Society
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks
e-mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox
Support Organization With IT

49
Ethics and Society
• Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
• Pharming is a scam
where a perpetrator
attempts to obtain your
personal and financial
information via spoofing

Support Organization With IT

50
Ethics and Society
• The concern about privacy has led to the
enactment of federal and state laws regarding the
storage and disclosure of personal data
– See Figure 11-36 on page 589 for a listing of major U.S.
government laws concerning privacy

• The 1970 Fair Credit Reporting Act limits the
rights of others viewing a credit report to only
those with a legitimate business need
Support Organization With IT

51
Ethics and Society

Social engineering is defined as gaining
unauthorized access or obtaining confidential
information by taking advantage of trust and naivety
Employee monitoring involves the use of computers
to observe, record, and review an employee’s use of
a computer

Support Organization With IT

52
Ethics and Society
• Content filtering is the
process of restricting
access to certain material
on the Web
• Many businesses use
content filtering
• Internet Content Rating
Association (ICRA)
• Web filtering software
restricts access to
specified Web sites
Support Organization With IT

53
Summary

Potential computer risks and
safeguards

Wireless security risks and
safeguards

Computer-related health
issues and preventions

Ethical issues surrounding
information accuracy,
intellectual property rights,
codes of conduct, green
computing, and information
privacy

Support Organization With IT

54
Computer Security and
Safety, Ethics, and Privacy

Sumesh Koyon

More Related Content

What's hot

Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer SecurityVibrant Event
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...yaminohime
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...yaminohime
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTjonspav
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systemsaissa benyahya
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is usedgracepm28
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewSam Bowne
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
network security lec2 ccns
network security lec2 ccnsnetwork security lec2 ccns
network security lec2 ccnsDanish Mahmood
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesKislaychd
 

What's hot (20)

internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
Introduction To Computer Security
Introduction To Computer SecurityIntroduction To Computer Security
Introduction To Computer Security
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 15 - Comput...
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
File000119
File000119File000119
File000119
 
06. security concept
06. security concept06. security concept
06. security concept
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9 - Network...
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
iGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICTiGCSE Theory Unit 6 – Effects of Using ICT
iGCSE Theory Unit 6 – Effects of Using ICT
 
Unit v
Unit vUnit v
Unit v
 
Securing embedded systems
Securing embedded systemsSecuring embedded systems
Securing embedded systems
 
The ways in which ict is used
The ways in which ict is usedThe ways in which ict is used
The ways in which ict is used
 
CNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking OverviewCNIT 123: Ch 1 Ethical Hacking Overview
CNIT 123: Ch 1 Ethical Hacking Overview
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
Uc13.chapter.09
Uc13.chapter.09Uc13.chapter.09
Uc13.chapter.09
 
network security lec2 ccns
network security lec2 ccnsnetwork security lec2 ccns
network security lec2 ccns
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Ce Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering TechniquesCe Hv6 Module 44 Internet Content Filtering Techniques
Ce Hv6 Module 44 Internet Content Filtering Techniques
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 

Similar to Week 12

Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.rizwanshafique4321
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxFannyKwok1
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy cscHisyam Rosly
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptxDibyesh1
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptWilsonWanjohi5
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks ShellyAdeel Khurram
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power pointbodo-con
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxssuser666f98
 
Computer Security
Computer SecurityComputer Security
Computer SecurityAkNirojan
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxKirti Verma
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfsatonaka3
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptxssuser666f98
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdfZeeshanMajeed15
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security conceptsG Prachi
 
Security and privacy
Security and privacySecurity and privacy
Security and privacyMohammed Adam
 

Similar to Week 12 (20)

Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.Computer Security and their social effect and their usage.
Computer Security and their social effect and their usage.
 
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptxChapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 5 - Digital Security, Ethics, Privacy.pptx
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
Chapter 9 security privacy csc
Chapter 9 security privacy cscChapter 9 security privacy csc
Chapter 9 security privacy csc
 
Lecture 5.1.pptx
Lecture 5.1.pptxLecture 5.1.pptx
Lecture 5.1.pptx
 
DC16_Ch05.pptx
DC16_Ch05.pptxDC16_Ch05.pptx
DC16_Ch05.pptx
 
DATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.pptDATA SECURITY AND CONTROL.ppt
DATA SECURITY AND CONTROL.ppt
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Ch15 power point
Ch15 power pointCh15 power point
Ch15 power point
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptx
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
BCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptxBCE L-3omputer security Basics.pptx
BCE L-3omputer security Basics.pptx
 
chapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdfchapter13 - Computing Security Ethics.pdf
chapter13 - Computing Security Ethics.pdf
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptx
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Lecture 7---Security (1).pdf
Lecture 7---Security (1).pdfLecture 7---Security (1).pdf
Lecture 7---Security (1).pdf
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 
Security and privacy
Security and privacySecurity and privacy
Security and privacy
 

More from Joey Pierce (10)

Week 11
Week 11Week 11
Week 11
 
Week 10
Week 10Week 10
Week 10
 
Week 9
Week 9Week 9
Week 9
 
Week 7 & 8
Week 7 & 8Week 7 & 8
Week 7 & 8
 
Week 6
Week 6Week 6
Week 6
 
Week 5
Week 5Week 5
Week 5
 
Week 4
Week 4Week 4
Week 4
 
Week 3
Week 3Week 3
Week 3
 
Week 2
Week 2Week 2
Week 2
 
Week 1
Week 1Week 1
Week 1
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 

Week 12

  • 1. Computer Security and Safety, Ethics, and Privacy Sumesh Koyon
  • 2. Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Discuss how encryption works, and explain why it is necessary Support Organization With IT 2
  • 3. Objectives Overview Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Discuss ways to prevent health-related disorders and injuries due to computer use Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing Discuss issues surrounding information privacy Support Organization With IT 3
  • 4. Computer Security Risks • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability • A cybercrime is an online or Internet-based illegal act Hackers Crackers Unethical Employees Script Kiddies Cyberextortionists Support Organization With IT Corporate Spies Cyberterrorists 4
  • 5. Computer Security Risks Support Organization With IT 5
  • 6. Internet and Network Attacks • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises • An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities Support Organization With IT 6
  • 7. Internet and Network Attacks Computer Virus • Affects a computer negatively by altering the way the computer works Worm Trojan Horse Rootkit • Copies itself repeatedly, using up resources and possibly shutting down the computer or network • A malicious program that hides within or looks like a legitimate program • Program that hides in a computer and allows someone from a remote location to take full control Support Organization With IT 7
  • 8. Internet and Network Attacks • An infected computer has one or more of the following symptoms: Operating system runs much slower than usual Music or unusual sound plays randomly Available memory is less than expected Files become corrupted Screen displays unusual message or image Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Support Organization With IT Operating system shuts down unexpectedly 8
  • 9. Internet and Network Attacks Support Organization With IT 9
  • 10. Internet and Network Attacks Support Organization With IT 10
  • 11. Internet and Network Attacks • Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Support Organization With IT 11
  • 12. Internet and Network Attacks • A botnet is a group of compromised computers connected to a network – A compromised computer is known as a zombie • A denial of service attack (DoS attack) disrupts computer access to Internet services – Distributed DoS (DDoS) • A back door is a program or set of instructions in a program that allow users to bypass security controls • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate Support Organization With IT 12
  • 13. Internet and Network Attacks • A firewall is hardware and/or software that protects a network’s resources from intrusion Support Organization With IT 13
  • 14. Internet and Network Attacks Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or system breaches Honeypot • Vulnerable computer that is set up to entice an intruder to break into it Support Organization With IT 14
  • 15. Unauthorized Access and Use Unauthorized access is the use of a computer or network without permission Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities Support Organization With IT 15
  • 16. Unauthorized Access and Use • Organizations take several measures to help prevent unauthorized access and use – Acceptable use policy – Disable file and printer sharing – Firewalls – Intrusion detection software Support Organization With IT 16
  • 17. Unauthorized Access and Use • Access controls define who can access a computer, when they can access it, and what actions they can take – Two-phase processes called identification and authentication – User name – Password – Passphrase – CAPTCHA Support Organization With IT 17
  • 18. Unauthorized Access and Use • A possessed object is any item that you must carry to gain access to a computer or computer facility – Often are used in combination with a personal identification number (PIN) • A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer Support Organization With IT 18
  • 19. Unauthorized Access and Use • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks • Many areas use digital forensics Law enforcement Criminal prosecutors Insurance agencies Military intelligence Information security departments Support Organization With IT 19
  • 20. Hardware Theft and Vandalism Hardware theft is the act of stealing computer equipment Hardware vandalism is the act of defacing or destroying computer equipment Support Organization With IT 20
  • 21. Hardware Theft and Vandalism • To help reduce the of chances of theft, companies and schools use a variety of security measures Physical access controls Alarm systems Real time location system Cables to lock equipment Passwords, possessed objects, and biometrics Support Organization With IT 21
  • 22. Software Theft • Software theft occurs when someone: Steals software media Intentionally erases programs Illegally copies a program Illegally registers and/or activates a program Support Organization With IT 22
  • 23. Software Theft • A single-user license agreement typically contains the following conditions: Permitted to • Install the software on one computer • Make one copy of the software • Remove the software from your computer before giving it away or selling it Not permitted to • • • • Install the software on a network Give copies to friends or colleagues while continuing to use the software Export the software Rent or lease the software Support Organization With IT 23
  • 24. Software Theft • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law • Some software requires product activation to function fully Support Organization With IT 24
  • 25. Information Theft • Information theft occurs when someone steals personal or confidential information • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access Support Organization With IT 25
  • 27. Information Theft • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender – Often used to ensure that an impostor is not participating in an Internet transaction • Web browsers and Web sites use encryption techniques Support Organization With IT 27
  • 28. Information Theft • Popular security techniques include Digital Certificates Transport Layer Security (TLS) Secure HTTP VPN Support Organization With IT 28
  • 30. System Failure • A system failure is the prolonged malfunction of a computer • A variety of factors can lead to system failure, including: – Aging hardware – Natural disasters – Electrical power problems • Noise, undervoltages, and overvoltages – Errors in computer programs Support Organization With IT 30
  • 31. System Failure • Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS) Support Organization With IT 31
  • 32. Backing Up – The Ultimate Safeguard • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it • Offsite backups are stored in a location separate from the computer site Cloud Storage Support Organization With IT 32
  • 33. Backing Up – The Ultimate Safeguard • Two categories of backups: • Three-generation backup policy – Full backup – Selective backup Grandparent Parent Child Support Organization With IT 33
  • 34. Wireless Security • Wireless access poses additional security risks – About 80 percent of wireless networks have no security protection • War driving allows individuals to detect wireless networks while driving a vehicle through the area Support Organization With IT 34
  • 35. Wireless Security • In additional to using firewalls, some safeguards improve security of wireless networks: A wireless access point should not broadcast an SSID Change the default SSID Configure a WAP so that only certain devices can access it Use WPA or WPA2 security standards Support Organization With IT 35
  • 36. Health Concerns of Computer Use • The widespread use of computers has led to health concerns – Repetitive strain injury (RSI) • Tendonitis • Carpal tunnel syndrome (CTS) – Computer vision syndrome (CVS) Support Organization With IT 36
  • 37. Health Concerns of Computer Use Support Organization With IT 37
  • 38. Health Concerns of Computer Use • Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Support Organization With IT 38
  • 39. Health Concerns of Computer Use • Computer addiction occurs when the computer consumes someone’s entire social life • Symptoms of users include: Craves computer time Overjoyed when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school Support Organization With IT 39
  • 40. Ethics and Society • Computer ethics are the moral guidelines that govern the use of computers and information systems • Information accuracy is a concern – Not all information on the Web is correct Support Organization With IT 40
  • 41. Ethics and Society Intellectual property rights are the rights to which creators are entitled for their work • A copyright protects any tangible form of expression An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Support Organization With IT 41
  • 42. Ethics and Society Support Organization With IT 42
  • 43. Ethics and Society • Green computing involves reducing the electricity and environmental waste while using a computer Support Organization With IT 43
  • 44. Ethics and Society • Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them • Huge databases store data online • It is important to safeguard your information Support Organization With IT 44
  • 45. Ethics and Society Support Organization With IT 45
  • 46. Ethics and Society • When you fill out a form, the merchant that receives the form usually enters it into a database • Many companies today allow people to specify whether they want their personal information distributed Support Organization With IT 46
  • 47. Ethics and Society • A cookie is a small text file that a Web server stores on your computer • Web sites use cookies for a variety of reasons: Allow for personalization Store users’ passwords Track how often users visit a site Assist with online shopping Target advertisements Support Organization With IT 47
  • 48. Ethics and Society Support Organization With IT 48
  • 49. Ethics and Society • Spam is an unsolicited e-mail message or newsgroup posting • E-mail filtering blocks e-mail messages from designated sources • Anti-spam programs attempt to remove spam before it reaches your inbox Support Organization With IT 49
  • 50. Ethics and Society • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information • Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing Support Organization With IT 50
  • 51. Ethics and Society • The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data – See Figure 11-36 on page 589 for a listing of major U.S. government laws concerning privacy • The 1970 Fair Credit Reporting Act limits the rights of others viewing a credit report to only those with a legitimate business need Support Organization With IT 51
  • 52. Ethics and Society Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers to observe, record, and review an employee’s use of a computer Support Organization With IT 52
  • 53. Ethics and Society • Content filtering is the process of restricting access to certain material on the Web • Many businesses use content filtering • Internet Content Rating Association (ICRA) • Web filtering software restricts access to specified Web sites Support Organization With IT 53
  • 54. Summary Potential computer risks and safeguards Wireless security risks and safeguards Computer-related health issues and preventions Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, green computing, and information privacy Support Organization With IT 54
  • 55. Computer Security and Safety, Ethics, and Privacy Sumesh Koyon