SlideShare una empresa de Scribd logo
1 de 56
Chapter 11
Manage Computing Securely, Safely
and Ethically




Discovering
    Computers 2012
     Your Interactive Guide
      to the Digital World
Objectives Overview


    Define the term,        Describe various types
                                                                    Discuss techniques to
computer security risks,   of Internet and network
                                                                    prevent unauthorized
and briefly describe the     attacks, and identify
                                                                    computer access and
  types of cybercrime          ways to safeguard
                                                                             use
     perpetrators            against these attacks


                               Explain the ways
   Identify safeguards                                              Discuss how encryption
                           software manufacturers
 against hardware theft                                             works, and explain why
                                protect against
     and vandalism                                                       it is necessary
                               software piracy



See Page 555               Discovering Computers 2012: Chapter 11                           2
for Detailed Objectives
Objectives Overview


  Discuss the types of                                                 Identify risks and
                             Explain the options
 devices available that                                              safeguards associated
                           available for backing up
protect computers from                                                    with wireless
                             computer resources
     system failure                                                     communications


                           Recognize issues related
Discuss ways to prevent
                           to information accuracy,                      Discuss issues
health-related disorders
                              intellectual property                 surrounding information
  and injuries due to
                           rights, codes of conduct,                        privacy
     computer use
                             and green computing



See Page 555               Discovering Computers 2012: Chapter 11                            3
for Detailed Objectives
Computer Security Risks

• A computer security risk is any event or action that could
  cause a loss of or damage to computer
  hardware, software, data, information, or processing
  capability
• A cybercrime is an online or Internet-based illegal act
         Hackers                Crackers                   Script Kiddies             Corporate Spies




                    Unethical
                                       Cyberextortionists                   Cyberterrorists
                   Employees


Pages 556 - 557                    Discovering Computers 2012: Chapter 11                               4
Computer Security Risks




Pages 556 – 557   Discovering Computers 2012: Chapter 11   5
Figure 11-1
Internet and Network Attacks

• Information transmitted over networks has a higher
  degree of security risk than information kept on an
  organization’s premises
• An online security service is a Web site that evaluates
  your computer to check for Internet and e-mail
  vulnerabilities




Page 558              Discovering Computers 2012: Chapter 11   6
Figure 11-2
Internet and Network Attacks

    Computer
                      Worm                       Trojan Horse        Rootkit
      Virus
• Affects a       • Copies itself             • A malicious       • Program that
  computer          repeatedly,                 program that        hides in a
  negatively by     using up                    hides within        computer
  altering the      resources                   or looks like       and allows
  way the           and possibly                a legitimate        someone
  computer          shutting                    program             from a
  works             down the                                        remote
                    computer or                                     location to
                    network                                         take full
                                                                    control


Page 558                 Discovering Computers 2012: Chapter 11                7
Video: Attack of the Mobile Viruses




                      CLICK TO START

              Discovering Computers 2012: Chapter 11   8
Internet and Network Attacks

• An infected computer has one or more of the
  following symptoms:
        Operating system    Available memory                                         Screen displays
                                                              Files become
        runs much slower       is less than                                         unusual message
                                                                corrupted
           than usual           expected                                                or image


                                                                                       Unknown
        Music or unusual                                   Programs or files
                            Existing programs                                       programs or files
         sound plays                                         do not work
                            and files disappear                                       mysteriously
          randomly                                             properly
                                                                                        appear


                                                                          Operating system
                  System properties         Operating system
                                                                            shuts down
                       change               does not start up
                                                                           unexpectedly

Pages 558 - 559                       Discovering Computers 2012: Chapter 11                            9
Internet and Network Attacks




Page 559      Discovering Computers 2012: Chapter 11   10
Figure 11-3
Internet and Network Attacks




Page 561      Discovering Computers 2012: Chapter 11   11
Figure 11-6
Internet and Network Attacks

    • Users can take several
      precautions to protect
      their home and work
      computers and mobile
      devices from these
      malicious infections




Page 560 – 561        Discovering Computers 2012: Chapter 11   12
Figure 11-7
Internet and Network Attacks

• A botnet is a group of compromised computers connected to a
  network
       – A compromised computer is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to
  Internet services
       – Distributed DoS (DDoS)
• A back door is a program or set of instructions in a program that
  allow users to bypass security controls
• Spoofing is a technique intruders use to make their network or
  Internet transmission appear legitimate


Pages 562 - 563                   Discovering Computers 2012: Chapter 11   13
Internet and Network Attacks

• A firewall is hardware and/or software that
  protects a network’s resources from intrusion




Pages 563 - 564   Discovering Computers 2012: Chapter 11   14
Figure 11-8
Internet and Network Attacks

 Intrusion detection software
  • Analyzes all network traffic
  • Assesses system vulnerabilities
  • Identifies any unauthorized intrusions
  • Notifies network administrators of suspicious behavior
    patterns or system breaches
 Honeypot
  • Vulnerable computer that is set up to entice an intruder to
    break into it
Page 564                Discovering Computers 2012: Chapter 11    15
Unauthorized Access and Use




  Unauthorized access is                                 Unauthorized use is the
 the use of a computer or                                use of a computer or its
     network without                                     data for unapproved or
        permission                                       possibly illegal activities




Page 564               Discovering Computers 2012: Chapter 11                      16
Unauthorized Access and Use

    • Organizations take
      several measures to
      help prevent
      unauthorized access
      and use
           – Acceptable use policy
           – Disable file and printer
             sharing
           – Firewalls
           – Intrusion detection
             software

Page 565                      Discovering Computers 2012: Chapter 11   17
Figure 11-10
Unauthorized Access and Use

• Access controls define who can access a
  computer, when they can access it, and what
  actions they can take
      – Two-phase processes called identification and
        authentication
      – User name
      – Password
      – Passphrase
      – CAPTCHA
Pages 565 – 567         Discovering Computers 2012: Chapter 11   18
Figure 11-11
Unauthorized Access and Use

    • A possessed object is any                     • A biometric device
      item that you must carry to                     authenticates a person’s
      gain access to a computer                       identity by translating a
      or computer facility                            personal characteristic into
           – Often are used in                        a digital code that is
             combination with a personal              compared with a digital
             identification number (PIN)              code in a computer




Page 568                        Discovering Computers 2012: Chapter 11               19
Figure 11-14
Unauthorized Access and Use

• Digital forensics is the discovery, collection, and
  analysis of evidence found on computers and
  networks
• Many areas use digital forensics
               Law                 Criminal                         Military
           enforcement           prosecutors                      intelligence


                                                 Information
                     Insurance
                                                   security
                      agencies
                                                 departments
Page 569                 Discovering Computers 2012: Chapter 11                  20
Hardware Theft and Vandalism



                                       Hardware vandalism
Hardware theft is the
                                       is the act of defacing
   act of stealing
                                            or destroying
computer equipment
                                       computer equipment



Page 570        Discovering Computers 2012: Chapter 11      21
Hardware Theft and Vandalism

• To help reduce the of chances of theft, companies
  and schools use a variety of security measures
                                                                        Cables to lock
   Physical access controls        Alarm systems
                                                                         equipment




                    Real time location            Passwords, possessed
                          system                 objects, and biometrics




Page 570                                 Discovering Computers 2012: Chapter 11          22
Figure 11-15
Software Theft

• Software theft occurs when someone:


           Steals software                                Intentionally
               media                                    erases programs




                                                            Illegally
           Illegally copies a                           registers and/or
                program                                    activates a
                                                            program
Page 571                 Discovering Computers 2012: Chapter 11            23
Software Theft

• A single-user license agreement typically contains the
  following conditions:
Permitted to
  • Install the software on one computer
  • Make one copy of the software
  • Remove the software from your computer before giving it away or selling it

Not permitted to
  •   Install the software on a network
  •   Give copies to friends or colleagues while continuing to use the software
  •   Export the software
  •   Rent or lease the software
Page 571                        Discovering Computers 2012: Chapter 11            24
Software Theft

    • Copying, loaning,
      borrowing, renting, or
      distributing software
      can be a violation of
      copyright law
    • Some software requires
      product activation to
      function fully



Pages 571 – 572       Discovering Computers 2012: Chapter 11   25
Figure 11-16
Information Theft

• Information theft occurs when someone steals
  personal or confidential information
• Encryption is a process of converting readable
  data into unreadable characters to prevent
  unauthorized access




Pages 572 - 573   Discovering Computers 2012: Chapter 11   26
Figure 11-17
Information Theft




Page 573       Discovering Computers 2012: Chapter 11   27
Figure 11-18
Information Theft

• A digital signature is an encrypted code that a
  person, Web site, or organization attaches to an
  electronic message to verify the identity of the
  sender
      – Often used to ensure that an impostor is not
        participating in an Internet transaction
• Web browsers and Web sites use encryption
  techniques

Page 574                Discovering Computers 2012: Chapter 11   28
Information Theft

• Popular security techniques include

                    Digital                   Transport Layer
                  Certificates                 Security (TLS)



                  Secure HTTP                               VPN


Pages 574 - 575           Discovering Computers 2012: Chapter 11   29
Information Theft




Pages 574 - 575         Discovering Computers 2012: Chapter 11   30
Figures 11-19 – 11-20
System Failure

• A system failure is the prolonged malfunction of a
  computer
• A variety of factors can lead to system failure,
  including:
      – Aging hardware
      – Natural disasters
      – Electrical power problems
           • Noise, undervoltages, and overvoltages
      – Errors in computer programs
Page 575                    Discovering Computers 2012: Chapter 11   31
System Failure

• Two ways to protect from system failures caused
  by electrical power variations include surge
  protectors and uninterruptable power supplies
  (UPS)




Page 576                Discovering Computers 2012: Chapter 11   32
Figures 11-21 – 11-22
Backing Up – The Ultimate Safeguard

• A backup is a duplicate of a file, program, or disk
  that can be used if the original is lost, damaged,
  or destroyed
      – To back up a file means to make a copy of it
• Offsite backups are stored in a location separate
  from the computer site
                                                          Cloud
                                                         Storage

Page 577                Discovering Computers 2012: Chapter 11     33
Backing Up – The Ultimate Safeguard

    • Two categories of                             • Three-generation
      backups:                                        backup policy
           – Full backup
                                                                     Grandparent
           – Selective backup


                                                                         Parent




                                                                         Child


Page 577                        Discovering Computers 2012: Chapter 11             34
Wireless Security

• Wireless access poses additional security risks
       – About 80 percent of wireless networks have no security
         protection
• War driving allows individuals to detect wireless
  networks while driving a vehicle through the area




Page 578                    Discovering Computers 2012: Chapter 11   35
Figure 11-23
Wireless Security

• In additional to using firewalls, some safeguards
  improve security of wireless networks:
           A wireless access
                                           Change the default
            point should not
                                                 SSID
           broadcast an SSID


            Configure a WAP
               so that only                 Use WPA or WPA2
           certain devices can              security standards
                 access it
Page 578              Discovering Computers 2012: Chapter 11     36
Health Concerns of Computer Use

    • The widespread use of
      computers has led to
      health concerns
           – Repetitive strain injury
             (RSI)
               • Tendonitis
               • Carpal tunnel syndrome
                 (CTS)
           – Computer vision
             syndrome (CVS)


Page 579                        Discovering Computers 2012: Chapter 11   37
Figure 11-24
Health Concerns of Computer Use




Page 580       Discovering Computers 2012: Chapter 11   38
Figure 11-25
Health Concerns of Computer Use

    • Ergonomics is an
      applied science devoted
      to incorporating
      comfort, efficiency, and
      safety into the design of
      items in the workplace




Page 580                Discovering Computers 2012: Chapter 11   39
Figure 11-26
Health Concerns of Computer Use

• Computer addiction occurs when the computer
  consumes someone’s entire social life
• Symptoms of users include:
              Craves            Overjoyed                            Unable to stop
             computer           when at the                            computer
               time              computer                               activity

           Irritable when          Neglects                           Problems at
              not at the          family and                            work or
              computer              friends                              school
Page 581                    Discovering Computers 2012: Chapter 11                    40
Ethics and Society

    • Computer ethics are
      the moral guidelines
      that govern the use of
      computers and
      information systems
    • Information accuracy is
      a concern
           – Not all information on
             the Web is correct


Pages 581 – 582              Discovering Computers 2012: Chapter 11   41
Figure 11-28
Ethics and Society


 Intellectual property rights are the rights to
 which creators are entitled for their work

  • A copyright protects any tangible form of expression

 An IT code of conduct is a written guideline
 that helps determine whether a specific
 computer action is ethical or unethical

Page 582               Discovering Computers 2012: Chapter 11   42
Ethics and Society




Page 583       Discovering Computers 2012: Chapter 11   43
Figure 11-29
Ethics and Society

• Green computing involves reducing the electricity
  and environmental waste while using a computer




Pages 583 – 584   Discovering Computers 2012: Chapter 11   44
Figure 11-30
Ethics and Society

• Information privacy refers to the right of
  individuals and companies to deny or restrict the
  collection and use of information about them
• Huge databases store data online
• It is important to safeguard your information




Page 584           Discovering Computers 2012: Chapter 11   45
Ethics and Society




Page 584       Discovering Computers 2012: Chapter 11   46
Figure 11-31
Ethics and Society

    • When you fill out a
      form, the merchant that
      receives the form
      usually enters it into a
      database
    • Many companies today
      allow people to specify
      whether they want
      their personal
      information distributed
Page 585               Discovering Computers 2012: Chapter 11   47
Figure 11-32
Ethics and Society

• A cookie is a small text file that a Web server stores on
  your computer
• Web sites use cookies for a variety of reasons:
                                                                   Assist with
        Allow for             Store users’
                                                                     online
     personalization           passwords
                                                                    shopping

                  Track how
                                                   Target
                  often users
                                               advertisements
                   visit a site
Pages 585 – 586           Discovering Computers 2012: Chapter 11                 48
Ethics and Society




Page 586       Discovering Computers 2012: Chapter 11   49
Figure 11-33
Ethics and Society

    • Spam is an unsolicited
      e-mail message or
      newsgroup posting
    • E-mail filtering blocks
      e-mail messages from
      designated sources
    • Anti-spam programs
      attempt to remove
      spam before it reaches
      your inbox

Page 587               Discovering Computers 2012: Chapter 11   50
Figure 11-34
Ethics and Society

                                      • Phishing is a scam in
                                        which a perpetrator sends
                                        an official looking e-mail
                                        message that attempts to
                                        obtain your personal and
                                        financial information
                                      • Pharming is a scam
                                        where a perpetrator
                                        attempts to obtain your
                                        personal and financial
                                        information via spoofing


Pages 587 - 588   Discovering Computers 2012: Chapter 11             51
Figure 11-35
Ethics and Society

• The concern about privacy has led to the
  enactment of federal and state laws regarding the
  storage and disclosure of personal data
      – See Figure 11-36 on page 589 for a listing of major U.S.
        government laws concerning privacy
• The 1970 Fair Credit Reporting Act limits the
  rights of others viewing a credit report to only
  those with a legitimate business need

Page 588                 Discovering Computers 2012: Chapter 11   52
Ethics and Society


 Social engineering is defined as gaining
 unauthorized access or obtaining confidential
 information by taking advantage of trust and naivety

 Employee monitoring involves the use of computers
 to observe, record, and review an employee’s use of
 a computer


Page 590           Discovering Computers 2012: Chapter 11   53
Ethics and Society

    • Content filtering is the
      process of restricting
      access to certain material
      on the Web
    • Many businesses use
      content filtering
    • Internet Content Rating
      Association (ICRA)
    • Web filtering software
      restricts access to
      specified Web sites

Pages 590 – 591          Discovering Computers 2012: Chapter 11   54
Figure 11-37
Summary


           Potential computer risks and               Wireless security risks and
                    safeguards                               safeguards




                                                      Ethical issues surrounding
                                                        information accuracy,
            Computer-related health                  intellectual property rights,
             issues and preventions                    codes of conduct, green
                                                     computing, and information
                                                                 privacy
Page 591                       Discovering Computers 2012: Chapter 11                55
Chapter 11
Manage Computing Securely, Safely
and Ethically




Discovering
    Computers 2012
     Your Interactive Guide
      to the Digital World
    Chapter 11 Complete

Más contenido relacionado

La actualidad más candente

Data collection in quantitative research
Data collection in quantitative researchData collection in quantitative research
Data collection in quantitative researchMuhammad Saud PhD
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & EncryptionBiroja
 
Assessment frensic psychology
Assessment frensic psychologyAssessment frensic psychology
Assessment frensic psychologyghulam_qadir
 
Chapter 5 data resource management
Chapter 5 data resource managementChapter 5 data resource management
Chapter 5 data resource managementAG RD
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide WebSamudin Kassan
 
Management Information Systems - Chapter 3
Management Information Systems - Chapter 3Management Information Systems - Chapter 3
Management Information Systems - Chapter 3Joel Briza
 

La actualidad más candente (10)

Perceptual Organization Presentation
Perceptual Organization PresentationPerceptual Organization Presentation
Perceptual Organization Presentation
 
Data collection in quantitative research
Data collection in quantitative researchData collection in quantitative research
Data collection in quantitative research
 
E-commerce- Security & Encryption
E-commerce- Security & EncryptionE-commerce- Security & Encryption
E-commerce- Security & Encryption
 
Chapter 7 e business systems
Chapter 7  e business systemsChapter 7  e business systems
Chapter 7 e business systems
 
Assessment frensic psychology
Assessment frensic psychologyAssessment frensic psychology
Assessment frensic psychology
 
Chapter 5 data resource management
Chapter 5 data resource managementChapter 5 data resource management
Chapter 5 data resource management
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Eating Disorders
Eating DisordersEating Disorders
Eating Disorders
 
Internet and World Wide Web
Internet and World Wide WebInternet and World Wide Web
Internet and World Wide Web
 
Management Information Systems - Chapter 3
Management Information Systems - Chapter 3Management Information Systems - Chapter 3
Management Information Systems - Chapter 3
 

Similar a CH11-Managing Computing Securely, Safely and Ethically

Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacySamudin Kassan
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptxssuser666f98
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacyhaider ali
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfShahidMehmood285010
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security riskshazirma
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxssuser666f98
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security RiskDedi Dwianto
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaNew Horizons Bulgaria
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionWebroot
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentationsathiyamaha
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Anindya Ghosh,
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint ProtectionSophos
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 

Similar a CH11-Managing Computing Securely, Safely and Ethically (20)

Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Computer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & PrivacyComputer Security and Safety, Ethics & Privacy
Computer Security and Safety, Ethics & Privacy
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Computer security and safety.pptx
Computer security and safety.pptxComputer security and safety.pptx
Computer security and safety.pptx
 
Chapter 11 computer security and safety, ethics, and privacy
Chapter 11   computer security and safety, ethics, and privacyChapter 11   computer security and safety, ethics, and privacy
Chapter 11 computer security and safety, ethics, and privacy
 
chapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdfchapter11-120214225647-phpapp01.pdf
chapter11-120214225647-phpapp01.pdf
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
4.2.1 computer security risks
4.2.1 computer security risks4.2.1 computer security risks
4.2.1 computer security risks
 
chapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptxchapter11-120214225647-phpapp01.pptx
chapter11-120214225647-phpapp01.pptx
 
Network Security Risk
Network Security RiskNetwork Security Risk
Network Security Risk
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Information Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons BulgariaInformation Security Fundamentals - New Horizons Bulgaria
Information Security Fundamentals - New Horizons Bulgaria
 
Real-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware InfectionReal-Time Protection From Every Malware Infection
Real-Time Protection From Every Malware Infection
 
Cyber security-briefing-presentation
Cyber security-briefing-presentationCyber security-briefing-presentation
Cyber security-briefing-presentation
 
Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1Cio ciso security_strategyv1.1
Cio ciso security_strategyv1.1
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Symantec Endpoint Protection 12
Symantec Endpoint Protection 12Symantec Endpoint Protection 12
Symantec Endpoint Protection 12
 
Endpoint Protection
Endpoint ProtectionEndpoint Protection
Endpoint Protection
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 

Más de Sukanya Ben

[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology Trends[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology TrendsSukanya Ben
 
[GE207] Session02: Digital Transformation
[GE207] Session02: Digital Transformation[GE207] Session02: Digital Transformation
[GE207] Session02: Digital TransformationSukanya Ben
 
[Ge207] Digital Technology Outline
[Ge207] Digital Technology Outline[Ge207] Digital Technology Outline
[Ge207] Digital Technology OutlineSukanya Ben
 
TQF03_DigitalTechnology
TQF03_DigitalTechnologyTQF03_DigitalTechnology
TQF03_DigitalTechnologySukanya Ben
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital TechnologySukanya Ben
 
[GE207] Prototyping
[GE207] Prototyping[GE207] Prototyping
[GE207] PrototypingSukanya Ben
 
MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsSukanya Ben
 
MIS-CH14: Managing Projects
MIS-CH14: Managing ProjectsMIS-CH14: Managing Projects
MIS-CH14: Managing ProjectsSukanya Ben
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsSukanya Ben
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeSukanya Ben
 
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsMIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsSukanya Ben
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacySukanya Ben
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsSukanya Ben
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologySukanya Ben
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISSukanya Ben
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategySukanya Ben
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 

Más de Sukanya Ben (20)

[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology Trends[GE207] Session03: Digital Technology Trends
[GE207] Session03: Digital Technology Trends
 
[GE207] Session02: Digital Transformation
[GE207] Session02: Digital Transformation[GE207] Session02: Digital Transformation
[GE207] Session02: Digital Transformation
 
[Ge207] Digital Technology Outline
[Ge207] Digital Technology Outline[Ge207] Digital Technology Outline
[Ge207] Digital Technology Outline
 
TQF03_DigitalTechnology
TQF03_DigitalTechnologyTQF03_DigitalTechnology
TQF03_DigitalTechnology
 
[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology[GE207] Session01: Introduction to Digital Technology
[GE207] Session01: Introduction to Digital Technology
 
[GE207] Prototyping
[GE207] Prototyping[GE207] Prototyping
[GE207] Prototyping
 
MIS-CH15: Managing Global Systems
MIS-CH15: Managing Global SystemsMIS-CH15: Managing Global Systems
MIS-CH15: Managing Global Systems
 
MIS-CH14: Managing Projects
MIS-CH14: Managing ProjectsMIS-CH14: Managing Projects
MIS-CH14: Managing Projects
 
MIS-CH13: Building Information Systems
MIS-CH13: Building Information SystemsMIS-CH13: Building Information Systems
MIS-CH13: Building Information Systems
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
MIS-CH11: Managing Knowledge
MIS-CH11: Managing KnowledgeMIS-CH11: Managing Knowledge
MIS-CH11: Managing Knowledge
 
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital GoodsMIS-CH10: e-Commerce: Digital Markets, Digital Goods
MIS-CH10: e-Commerce: Digital Markets, Digital Goods
 
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer IntimacyMIS-CH9: Achieving Operational Excellence and Customer Intimacy
MIS-CH9: Achieving Operational Excellence and Customer Intimacy
 
MIS-CH08: Securing Information Systems
MIS-CH08: Securing Information SystemsMIS-CH08: Securing Information Systems
MIS-CH08: Securing Information Systems
 
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless TechnologyMIS-CH07: Telecommunications, the Internet, and Wireless Technology
MIS-CH07: Telecommunications, the Internet, and Wireless Technology
 
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & ISMIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
MIS-CH6: Foundation of BUsiness Intelligence: Databases & IS
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
MIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and StrategyMIS-CH01: Information Systems, Organization, and Strategy
MIS-CH01: Information Systems, Organization, and Strategy
 
MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 

Último

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Último (20)

Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

CH11-Managing Computing Securely, Safely and Ethically

  • 1. Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World
  • 2. Objectives Overview Define the term, Describe various types Discuss techniques to computer security risks, of Internet and network prevent unauthorized and briefly describe the attacks, and identify computer access and types of cybercrime ways to safeguard use perpetrators against these attacks Explain the ways Identify safeguards Discuss how encryption software manufacturers against hardware theft works, and explain why protect against and vandalism it is necessary software piracy See Page 555 Discovering Computers 2012: Chapter 11 2 for Detailed Objectives
  • 3. Objectives Overview Discuss the types of Identify risks and Explain the options devices available that safeguards associated available for backing up protect computers from with wireless computer resources system failure communications Recognize issues related Discuss ways to prevent to information accuracy, Discuss issues health-related disorders intellectual property surrounding information and injuries due to rights, codes of conduct, privacy computer use and green computing See Page 555 Discovering Computers 2012: Chapter 11 3 for Detailed Objectives
  • 4. Computer Security Risks • A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability • A cybercrime is an online or Internet-based illegal act Hackers Crackers Script Kiddies Corporate Spies Unethical Cyberextortionists Cyberterrorists Employees Pages 556 - 557 Discovering Computers 2012: Chapter 11 4
  • 5. Computer Security Risks Pages 556 – 557 Discovering Computers 2012: Chapter 11 5 Figure 11-1
  • 6. Internet and Network Attacks • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises • An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities Page 558 Discovering Computers 2012: Chapter 11 6 Figure 11-2
  • 7. Internet and Network Attacks Computer Worm Trojan Horse Rootkit Virus • Affects a • Copies itself • A malicious • Program that computer repeatedly, program that hides in a negatively by using up hides within computer altering the resources or looks like and allows way the and possibly a legitimate someone computer shutting program from a works down the remote computer or location to network take full control Page 558 Discovering Computers 2012: Chapter 11 7
  • 8. Video: Attack of the Mobile Viruses CLICK TO START Discovering Computers 2012: Chapter 11 8
  • 9. Internet and Network Attacks • An infected computer has one or more of the following symptoms: Operating system Available memory Screen displays Files become runs much slower is less than unusual message corrupted than usual expected or image Unknown Music or unusual Programs or files Existing programs programs or files sound plays do not work and files disappear mysteriously randomly properly appear Operating system System properties Operating system shuts down change does not start up unexpectedly Pages 558 - 559 Discovering Computers 2012: Chapter 11 9
  • 10. Internet and Network Attacks Page 559 Discovering Computers 2012: Chapter 11 10 Figure 11-3
  • 11. Internet and Network Attacks Page 561 Discovering Computers 2012: Chapter 11 11 Figure 11-6
  • 12. Internet and Network Attacks • Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections Page 560 – 561 Discovering Computers 2012: Chapter 11 12 Figure 11-7
  • 13. Internet and Network Attacks • A botnet is a group of compromised computers connected to a network – A compromised computer is known as a zombie • A denial of service attack (DoS attack) disrupts computer access to Internet services – Distributed DoS (DDoS) • A back door is a program or set of instructions in a program that allow users to bypass security controls • Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate Pages 562 - 563 Discovering Computers 2012: Chapter 11 13
  • 14. Internet and Network Attacks • A firewall is hardware and/or software that protects a network’s resources from intrusion Pages 563 - 564 Discovering Computers 2012: Chapter 11 14 Figure 11-8
  • 15. Internet and Network Attacks Intrusion detection software • Analyzes all network traffic • Assesses system vulnerabilities • Identifies any unauthorized intrusions • Notifies network administrators of suspicious behavior patterns or system breaches Honeypot • Vulnerable computer that is set up to entice an intruder to break into it Page 564 Discovering Computers 2012: Chapter 11 15
  • 16. Unauthorized Access and Use Unauthorized access is Unauthorized use is the the use of a computer or use of a computer or its network without data for unapproved or permission possibly illegal activities Page 564 Discovering Computers 2012: Chapter 11 16
  • 17. Unauthorized Access and Use • Organizations take several measures to help prevent unauthorized access and use – Acceptable use policy – Disable file and printer sharing – Firewalls – Intrusion detection software Page 565 Discovering Computers 2012: Chapter 11 17 Figure 11-10
  • 18. Unauthorized Access and Use • Access controls define who can access a computer, when they can access it, and what actions they can take – Two-phase processes called identification and authentication – User name – Password – Passphrase – CAPTCHA Pages 565 – 567 Discovering Computers 2012: Chapter 11 18 Figure 11-11
  • 19. Unauthorized Access and Use • A possessed object is any • A biometric device item that you must carry to authenticates a person’s gain access to a computer identity by translating a or computer facility personal characteristic into – Often are used in a digital code that is combination with a personal compared with a digital identification number (PIN) code in a computer Page 568 Discovering Computers 2012: Chapter 11 19 Figure 11-14
  • 20. Unauthorized Access and Use • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks • Many areas use digital forensics Law Criminal Military enforcement prosecutors intelligence Information Insurance security agencies departments Page 569 Discovering Computers 2012: Chapter 11 20
  • 21. Hardware Theft and Vandalism Hardware vandalism Hardware theft is the is the act of defacing act of stealing or destroying computer equipment computer equipment Page 570 Discovering Computers 2012: Chapter 11 21
  • 22. Hardware Theft and Vandalism • To help reduce the of chances of theft, companies and schools use a variety of security measures Cables to lock Physical access controls Alarm systems equipment Real time location Passwords, possessed system objects, and biometrics Page 570 Discovering Computers 2012: Chapter 11 22 Figure 11-15
  • 23. Software Theft • Software theft occurs when someone: Steals software Intentionally media erases programs Illegally Illegally copies a registers and/or program activates a program Page 571 Discovering Computers 2012: Chapter 11 23
  • 24. Software Theft • A single-user license agreement typically contains the following conditions: Permitted to • Install the software on one computer • Make one copy of the software • Remove the software from your computer before giving it away or selling it Not permitted to • Install the software on a network • Give copies to friends or colleagues while continuing to use the software • Export the software • Rent or lease the software Page 571 Discovering Computers 2012: Chapter 11 24
  • 25. Software Theft • Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law • Some software requires product activation to function fully Pages 571 – 572 Discovering Computers 2012: Chapter 11 25 Figure 11-16
  • 26. Information Theft • Information theft occurs when someone steals personal or confidential information • Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access Pages 572 - 573 Discovering Computers 2012: Chapter 11 26 Figure 11-17
  • 27. Information Theft Page 573 Discovering Computers 2012: Chapter 11 27 Figure 11-18
  • 28. Information Theft • A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender – Often used to ensure that an impostor is not participating in an Internet transaction • Web browsers and Web sites use encryption techniques Page 574 Discovering Computers 2012: Chapter 11 28
  • 29. Information Theft • Popular security techniques include Digital Transport Layer Certificates Security (TLS) Secure HTTP VPN Pages 574 - 575 Discovering Computers 2012: Chapter 11 29
  • 30. Information Theft Pages 574 - 575 Discovering Computers 2012: Chapter 11 30 Figures 11-19 – 11-20
  • 31. System Failure • A system failure is the prolonged malfunction of a computer • A variety of factors can lead to system failure, including: – Aging hardware – Natural disasters – Electrical power problems • Noise, undervoltages, and overvoltages – Errors in computer programs Page 575 Discovering Computers 2012: Chapter 11 31
  • 32. System Failure • Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS) Page 576 Discovering Computers 2012: Chapter 11 32 Figures 11-21 – 11-22
  • 33. Backing Up – The Ultimate Safeguard • A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed – To back up a file means to make a copy of it • Offsite backups are stored in a location separate from the computer site Cloud Storage Page 577 Discovering Computers 2012: Chapter 11 33
  • 34. Backing Up – The Ultimate Safeguard • Two categories of • Three-generation backups: backup policy – Full backup Grandparent – Selective backup Parent Child Page 577 Discovering Computers 2012: Chapter 11 34
  • 35. Wireless Security • Wireless access poses additional security risks – About 80 percent of wireless networks have no security protection • War driving allows individuals to detect wireless networks while driving a vehicle through the area Page 578 Discovering Computers 2012: Chapter 11 35 Figure 11-23
  • 36. Wireless Security • In additional to using firewalls, some safeguards improve security of wireless networks: A wireless access Change the default point should not SSID broadcast an SSID Configure a WAP so that only Use WPA or WPA2 certain devices can security standards access it Page 578 Discovering Computers 2012: Chapter 11 36
  • 37. Health Concerns of Computer Use • The widespread use of computers has led to health concerns – Repetitive strain injury (RSI) • Tendonitis • Carpal tunnel syndrome (CTS) – Computer vision syndrome (CVS) Page 579 Discovering Computers 2012: Chapter 11 37 Figure 11-24
  • 38. Health Concerns of Computer Use Page 580 Discovering Computers 2012: Chapter 11 38 Figure 11-25
  • 39. Health Concerns of Computer Use • Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Page 580 Discovering Computers 2012: Chapter 11 39 Figure 11-26
  • 40. Health Concerns of Computer Use • Computer addiction occurs when the computer consumes someone’s entire social life • Symptoms of users include: Craves Overjoyed Unable to stop computer when at the computer time computer activity Irritable when Neglects Problems at not at the family and work or computer friends school Page 581 Discovering Computers 2012: Chapter 11 40
  • 41. Ethics and Society • Computer ethics are the moral guidelines that govern the use of computers and information systems • Information accuracy is a concern – Not all information on the Web is correct Pages 581 – 582 Discovering Computers 2012: Chapter 11 41 Figure 11-28
  • 42. Ethics and Society Intellectual property rights are the rights to which creators are entitled for their work • A copyright protects any tangible form of expression An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Page 582 Discovering Computers 2012: Chapter 11 42
  • 43. Ethics and Society Page 583 Discovering Computers 2012: Chapter 11 43 Figure 11-29
  • 44. Ethics and Society • Green computing involves reducing the electricity and environmental waste while using a computer Pages 583 – 584 Discovering Computers 2012: Chapter 11 44 Figure 11-30
  • 45. Ethics and Society • Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them • Huge databases store data online • It is important to safeguard your information Page 584 Discovering Computers 2012: Chapter 11 45
  • 46. Ethics and Society Page 584 Discovering Computers 2012: Chapter 11 46 Figure 11-31
  • 47. Ethics and Society • When you fill out a form, the merchant that receives the form usually enters it into a database • Many companies today allow people to specify whether they want their personal information distributed Page 585 Discovering Computers 2012: Chapter 11 47 Figure 11-32
  • 48. Ethics and Society • A cookie is a small text file that a Web server stores on your computer • Web sites use cookies for a variety of reasons: Assist with Allow for Store users’ online personalization passwords shopping Track how Target often users advertisements visit a site Pages 585 – 586 Discovering Computers 2012: Chapter 11 48
  • 49. Ethics and Society Page 586 Discovering Computers 2012: Chapter 11 49 Figure 11-33
  • 50. Ethics and Society • Spam is an unsolicited e-mail message or newsgroup posting • E-mail filtering blocks e-mail messages from designated sources • Anti-spam programs attempt to remove spam before it reaches your inbox Page 587 Discovering Computers 2012: Chapter 11 50 Figure 11-34
  • 51. Ethics and Society • Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information • Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing Pages 587 - 588 Discovering Computers 2012: Chapter 11 51 Figure 11-35
  • 52. Ethics and Society • The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data – See Figure 11-36 on page 589 for a listing of major U.S. government laws concerning privacy • The 1970 Fair Credit Reporting Act limits the rights of others viewing a credit report to only those with a legitimate business need Page 588 Discovering Computers 2012: Chapter 11 52
  • 53. Ethics and Society Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers to observe, record, and review an employee’s use of a computer Page 590 Discovering Computers 2012: Chapter 11 53
  • 54. Ethics and Society • Content filtering is the process of restricting access to certain material on the Web • Many businesses use content filtering • Internet Content Rating Association (ICRA) • Web filtering software restricts access to specified Web sites Pages 590 – 591 Discovering Computers 2012: Chapter 11 54 Figure 11-37
  • 55. Summary Potential computer risks and Wireless security risks and safeguards safeguards Ethical issues surrounding information accuracy, Computer-related health intellectual property rights, issues and preventions codes of conduct, green computing, and information privacy Page 591 Discovering Computers 2012: Chapter 11 55
  • 56. Chapter 11 Manage Computing Securely, Safely and Ethically Discovering Computers 2012 Your Interactive Guide to the Digital World Chapter 11 Complete