SlideShare una empresa de Scribd logo
1 de 30
Computer Security Risks
     What is a computer security risk?
               Event or action that causes loss of or damage to
                computer system




Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Computer Emergency
Response Team Coordination
Center below Chapter 11
   p. 556 - 558 Fig. 11-1                                          Next
Internet and Network Attacks

 What are viruses, worms, and Trojan horses?

          Virus is a      Worm copies       Trojan horse hides         Payload
         potentially   itself repeatedly,          within            (destructive
         damaging           using up           or looks like        event) that is
         computer          resources            legitimate         delivered when
                          and possibly
          program        shutting down        program until      you open file, run
                          computer or            triggered       infected program,
                            network                              or boot computer
                                                 Does not        with infected disk
         Can spread                                                 in disk drive
                                                 replicate
            and
                                                 itself on
          damage
                                                   other
            files
                                                computers




p. 558                                                                     Next
Internet and Network Attacks

  How can a virus spread through an e-mail message?
     Step 1. Unscrupulous                                          Step 2. They use
     programmers create a virus                                    the Internet to send
     program. They hide the                                        the e-mail message
     virus in a Word document                                      to thousands of
     and attach the Word                                           users around the
     document to an e-mail                                         world.
     message.




                                  Step 3b. Other users do not
                                  recognize the name of the
     Step 3a. Some                sender of the e-mail message.
     users open the               These users do not open the
     attachment and               e-mail message. Instead they
     their computers              delete the e-mail message.
     become infected              These users’ computers are not
     with the virus.              infected with the virus.


p. 559 Fig. 11-2                                                                   Next
Internet and Network Attacks


            Video: Free Online Malware




                CLICK TO START



                                         Next
Internet and Network Attacks

  How can you protect your system from a macro virus?
     Set macro security level in applications that allow you
      to write macros
     Set security level so that
      warning displays that
      document contains
      macro
                  Macros are instructions
                   saved in an application,
                   such as word processing
                   or spreadsheet program


p. 560 Fig. 11-3                                        Next
Internet and Network Attacks

  What is an antivirus program?
            Identifies and removes
             computer viruses
            Most also protect against
             worms and Trojan
             horses




p. 560 - 561 Fig. 11-4                   Next
Internet and Network Attacks

  What is a virus signature?
     Specific pattern of virus code
                  Also called virus definition
     Antivirus programs
      look for virus
      signatures




p. 561 Fig. 11-5                                  Next
Internet and Network Attacks

 How does an antivirus program inoculate a program
 file?
                                  Records
                               information
                          about program such
                              as file size and
                    Uses          creation
                information         date        Attempts
                 to detect if                  to remove
              virus tampers                   any detected
                  with file                       virus
                               Quarantines
                                  infected
                                files that it
            Keeps file             cannot
            in separate           remove
            area of hard disk

p. 561                                                       Next
Internet and Network Attacks

 What are a denial of service attack, back door and
   spoofing?

  A denial of service attack is an assault which
 disrupts computer access to an Internet service
            such as the Web or e-mail

                                A back door is a program or set of instructions
                                   in a program that allow users to bypass
                                 security controls when accessing a computer
                                                   resource

   Spoofing is a technique intruders use to make
      their network or Internet transmission
     appear legitimate to a victim computer or
                      network
p. 562 and 563                                                         Next
Internet and Network Attacks

  What is a firewall?
            Security system consisting of hardware and/or
             software that prevents unauthorized intrusion




p. 563 Fig. 11-7                                             Next
Internet and Network Attacks

     What is a personal firewall?
                Program that protects personal computer and its data
                 from unauthorized intrusions
                Monitors transmissions to and from computer
                Informs you of attempted intrusion




Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Personal Firewall Software
below Chapter 11
   p. 564 Fig. 11-8                                             Next
Unauthorized Access and Use
  How can companies protect against hackers?

       Intrusion detection software
    analyzes network traffic, assesses                         Access control defines who
  system vulnerabilities, and identifies                        can access computer and
   intrusions and suspicious behavior                          what actions they can take




                                  Audit trail records access
                                          attempts




p. 564 - 565                                                                      Next
Unauthorized Access and Use
  What are other ways to protect your personal computer?
            Disable file and
             printer sharing on
             Internet connection




p. 565 Fig. 11-9                                 Next
Unauthorized Access and Use
  How can you make your password more secure?
            Longer passwords provide greater security




p. 567 Fig. 11-11                                        Next
Unauthorized Access and Use
  What is a possessed object?
            Item that you must carry to gain access to
             computer or facility
            Often used with
             numeric password
             called personal
             identification
             number (PIN)




p. 567 Fig. 11-12                                         Next
Unauthorized Access and Use
  What is a biometric device?
     Authenticates person’s
      identity using personal
      characteristic
                    Fingerprint, hand geometry,
                     voice, signature, and iris




p. 567 - 568 Fig. 11-13                            Next
Hardware Theft and Vandalism
  What are hardware theft and hardware vandalism?
     Hardware theft is act of stealing
      computer equipment
                    Cables sometimes used to lock
                     equipment
                    Some notebook computers use
                     passwords, possessed objects, and
                     biometrics as security methods
                    For PDAs and smart phones, you
                     can password-protect the device
     Hardware vandalism is act of
      defacing or destroying computer
      equipment


p. 569 - 570 Fig. 11-14                                  Next
Software Theft
     What is software theft?

                                 Act of stealing or    Software piracy
                                  illegally stealing   is illegal
                                software, copying      duplication
                                        software or    of copyrighted
                                      intentionally    software
                                            erasing
                                          programs




Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Software Piracy
below Chapter 11
   p. 570                                                                Next
Software Theft
  What is a license agreement?
            Right to use software
            Single-user license agreement allows user to install software
             on one computer, make backup copy, and sell software after
             removing from computer




p. 570 Fig. 11-15                                                  Next
Software Theft
     What are some other safeguards against software theft?

                                 Product activation allows user to input product
                                  identification number online or by phone and
                                receive unique installation identification number




                                Business Software Alliance (BSA) promotes better
                                   understanding of software piracy problems



Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Business Software Alliance
below Chapter 11
    p. 571                                                                          Next
Information Theft
  What is encryption?
            Safeguards against information theft
            Process of converting plaintext (readable data) into ciphertext
             (unreadable characters)
            Encryption key (formula) often uses more than one method
            To read the data, the recipient must decrypt, or decipher, the data




p. 572 Fig. 11-16                                                       Next
Information Theft
     How do Web browsers provide secure data transmission?




                                                    Secure site
                          Many Web browsers
                                                is Web site that uses
                            use encryption
                                              encryption to secure data


                                                   Digital certificate is notice that
                                                  guarantees Web site is legitimate


Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Digital Certificates below
Chapter 11
    p. 573                                                                              Next
Information Theft
  What is Secure Sockets Layer (SSL)?
     Provides encryption of all data that passes between
      client and Internet server
                   Web addresses
                    beginning with
                    “https” indicate
                    secure connections




p. 574 Fig. 11-19                                      Next
System Failure
 What is a system failure?


             Prolonged malfunction                     Can cause loss of hardware,
                  of computer                               software, or data



                               Caused by aging hardware,
                              natural disasters, or electrical
                                   power disturbances
                                                                       Overvoltage or
         Noise—unwanted                                                power surge—
          electrical signal                                         significant increase
                                                                     in electrical power
                                    Undervoltage—drop
                                     in electrical supply

p. 574                                                                           Next
System Failure
     What is a surge protector?
               Protects computer and
                equipment from electrical power
                disturbances
               Uninterruptible power supply
                (UPS) is surge protector that
                provides power during power loss




Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Uninterruptible Power Supply
below Chapter 11
   p. 574 - 575 Figs. 11-20–11-21                  Next
Backing Up — The Ultimate Safeguard
 What is a backup?

                         Duplicate of file, program, or disk

                                                          Three-generation
         Full backup             Selective backup              backup
          all files in           select which files           preserves
          computer                   to back up            three copies of
                                                           important files



                   In case of system failure or corrupted files,
                   restore files by copying to original location



p. 576                                                                       Next
Information Privacy
 What is a cookie?

                                                        Set browser to
                                      Some Web sites
      User            Small file on                     accept cookies,
                                        sell or trade
   preferences       your computer                      prompt you to
                                        information
                      that contains                     accept cookies,
                                       stored in your
                     data about you                       or disable
                                           cookies
                                                            cookies
           How
         regularly
         you visit        Interests
         Web sites          and
                          browsing
                           habits




p. 582                                                           Next
Information Privacy
  How do cookies work?




p. 583 Fig. 11-28        Next
Information Privacy
 What is phishing?



                     Scam in which a perpetrator
                       sends an official looking
                         e-mail that attempts
                     to obtain your personal and
                         financial information




p. 584                                             Next
Information Privacy
 What is computer forensics?
        Also called digital forensics, network forensics, or
         cyberforensics
        Discovery, collection, and analysis of evidence
         found on computers and networks
        Computer forensic analysts must have knowledge
         of the law, technical experience, communication
         skills, and willingness to learn




p. 587                                                      Next

Más contenido relacionado

La actualidad más candente

CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyYhal Htet Aung
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasureEdie II
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsConnecting Up
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFrederik Questier
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security bookletiteclearners
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threatsReadWrite
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3Education
 
Computer security
Computer securityComputer security
Computer securityfiza1975
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
 

La actualidad más candente (20)

CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Wireless network security threats countermeasure
Wireless network security threats countermeasureWireless network security threats countermeasure
Wireless network security threats countermeasure
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Security threats
Security threatsSecurity threats
Security threats
 
Threats of Computer System and its Prevention
Threats of Computer System and its PreventionThreats of Computer System and its Prevention
Threats of Computer System and its Prevention
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Free Libre Open Source Software Development
Free Libre Open Source Software DevelopmentFree Libre Open Source Software Development
Free Libre Open Source Software Development
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IT Security booklet
IT Security bookletIT Security booklet
IT Security booklet
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
5 network-security-threats
5 network-security-threats5 network-security-threats
5 network-security-threats
 
Program security chapter 3
Program security chapter 3Program security chapter 3
Program security chapter 3
 
Computer security
Computer securityComputer security
Computer security
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Network security and viruses
Network security and virusesNetwork security and viruses
Network security and viruses
 
Presentation1
Presentation1Presentation1
Presentation1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 

Similar a Security presentation

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
Chapter11
Chapter11Chapter11
Chapter11Izaham
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part Onebackdoor
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet Love Steven
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Anna Stirling
 
Computer virus
Computer virusComputer virus
Computer virusDark Side
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallySukanya Ben
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)John Bosco Javellana, MAEd.
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 

Similar a Security presentation (20)

Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
viruses
virusesviruses
viruses
 
Chapter11
Chapter11Chapter11
Chapter11
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Ne Course Part One
Ne Course Part OneNe Course Part One
Ne Course Part One
 
Cyber Security – Virus and the Internet
Cyber Security –  Virus and the Internet Cyber Security –  Virus and the Internet
Cyber Security – Virus and the Internet
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
ISDD Hacking and Viruses
ISDD Hacking and VirusesISDD Hacking and Viruses
ISDD Hacking and Viruses
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
Discovering Computers: Chapter 11
Discovering Computers: Chapter 11Discovering Computers: Chapter 11
Discovering Computers: Chapter 11
 
Computer Introduction-Lecture04
Computer Introduction-Lecture04Computer Introduction-Lecture04
Computer Introduction-Lecture04
 
Computer virus
Computer virusComputer virus
Computer virus
 
CH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and EthicallyCH11-Managing Computing Securely, Safely and Ethically
CH11-Managing Computing Securely, Safely and Ethically
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)Empowerment Technologies Lecture 3 (Philippines SHS)
Empowerment Technologies Lecture 3 (Philippines SHS)
 
Virus and antivirus
Virus and antivirusVirus and antivirus
Virus and antivirus
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Privacy, Security
Privacy, SecurityPrivacy, Security
Privacy, Security
 
Safe Computing At Home And Work
Safe Computing At Home And WorkSafe Computing At Home And Work
Safe Computing At Home And Work
 

Más de Nathan Bateman (7)

Ch 18
Ch 18Ch 18
Ch 18
 
Tech use plan_presentation
Tech use plan_presentationTech use plan_presentation
Tech use plan_presentation
 
Ch 12
Ch 12Ch 12
Ch 12
 
Unit 5
Unit 5Unit 5
Unit 5
 
American bluegrass
American bluegrassAmerican bluegrass
American bluegrass
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 

Último

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 

Último (20)

Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 

Security presentation

  • 1. Computer Security Risks What is a computer security risk?  Event or action that causes loss of or damage to computer system Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11 p. 556 - 558 Fig. 11-1 Next
  • 2. Internet and Network Attacks What are viruses, worms, and Trojan horses? Virus is a Worm copies Trojan horse hides Payload potentially itself repeatedly, within (destructive damaging using up or looks like event) that is computer resources legitimate delivered when and possibly program shutting down program until you open file, run computer or triggered infected program, network or boot computer Does not with infected disk Can spread in disk drive replicate and itself on damage other files computers p. 558 Next
  • 3. Internet and Network Attacks How can a virus spread through an e-mail message? Step 1. Unscrupulous Step 2. They use programmers create a virus the Internet to send program. They hide the the e-mail message virus in a Word document to thousands of and attach the Word users around the document to an e-mail world. message. Step 3b. Other users do not recognize the name of the Step 3a. Some sender of the e-mail message. users open the These users do not open the attachment and e-mail message. Instead they their computers delete the e-mail message. become infected These users’ computers are not with the virus. infected with the virus. p. 559 Fig. 11-2 Next
  • 4. Internet and Network Attacks Video: Free Online Malware CLICK TO START Next
  • 5. Internet and Network Attacks How can you protect your system from a macro virus?  Set macro security level in applications that allow you to write macros  Set security level so that warning displays that document contains macro  Macros are instructions saved in an application, such as word processing or spreadsheet program p. 560 Fig. 11-3 Next
  • 6. Internet and Network Attacks What is an antivirus program?  Identifies and removes computer viruses  Most also protect against worms and Trojan horses p. 560 - 561 Fig. 11-4 Next
  • 7. Internet and Network Attacks What is a virus signature?  Specific pattern of virus code  Also called virus definition  Antivirus programs look for virus signatures p. 561 Fig. 11-5 Next
  • 8. Internet and Network Attacks How does an antivirus program inoculate a program file? Records information about program such as file size and Uses creation information date Attempts to detect if to remove virus tampers any detected with file virus Quarantines infected files that it Keeps file cannot in separate remove area of hard disk p. 561 Next
  • 9. Internet and Network Attacks What are a denial of service attack, back door and spoofing? A denial of service attack is an assault which disrupts computer access to an Internet service such as the Web or e-mail A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network p. 562 and 563 Next
  • 10. Internet and Network Attacks What is a firewall?  Security system consisting of hardware and/or software that prevents unauthorized intrusion p. 563 Fig. 11-7 Next
  • 11. Internet and Network Attacks What is a personal firewall?  Program that protects personal computer and its data from unauthorized intrusions  Monitors transmissions to and from computer  Informs you of attempted intrusion Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Personal Firewall Software below Chapter 11 p. 564 Fig. 11-8 Next
  • 12. Unauthorized Access and Use How can companies protect against hackers? Intrusion detection software analyzes network traffic, assesses Access control defines who system vulnerabilities, and identifies can access computer and intrusions and suspicious behavior what actions they can take Audit trail records access attempts p. 564 - 565 Next
  • 13. Unauthorized Access and Use What are other ways to protect your personal computer?  Disable file and printer sharing on Internet connection p. 565 Fig. 11-9 Next
  • 14. Unauthorized Access and Use How can you make your password more secure?  Longer passwords provide greater security p. 567 Fig. 11-11 Next
  • 15. Unauthorized Access and Use What is a possessed object?  Item that you must carry to gain access to computer or facility  Often used with numeric password called personal identification number (PIN) p. 567 Fig. 11-12 Next
  • 16. Unauthorized Access and Use What is a biometric device?  Authenticates person’s identity using personal characteristic  Fingerprint, hand geometry, voice, signature, and iris p. 567 - 568 Fig. 11-13 Next
  • 17. Hardware Theft and Vandalism What are hardware theft and hardware vandalism?  Hardware theft is act of stealing computer equipment  Cables sometimes used to lock equipment  Some notebook computers use passwords, possessed objects, and biometrics as security methods  For PDAs and smart phones, you can password-protect the device  Hardware vandalism is act of defacing or destroying computer equipment p. 569 - 570 Fig. 11-14 Next
  • 18. Software Theft What is software theft? Act of stealing or Software piracy illegally stealing is illegal software, copying duplication software or of copyrighted intentionally software erasing programs Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Software Piracy below Chapter 11 p. 570 Next
  • 19. Software Theft What is a license agreement?  Right to use software  Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer p. 570 Fig. 11-15 Next
  • 20. Software Theft What are some other safeguards against software theft? Product activation allows user to input product identification number online or by phone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11 p. 571 Next
  • 21. Information Theft What is encryption?  Safeguards against information theft  Process of converting plaintext (readable data) into ciphertext (unreadable characters)  Encryption key (formula) often uses more than one method  To read the data, the recipient must decrypt, or decipher, the data p. 572 Fig. 11-16 Next
  • 22. Information Theft How do Web browsers provide secure data transmission? Secure site Many Web browsers is Web site that uses use encryption encryption to secure data Digital certificate is notice that guarantees Web site is legitimate Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11 p. 573 Next
  • 23. Information Theft What is Secure Sockets Layer (SSL)?  Provides encryption of all data that passes between client and Internet server  Web addresses beginning with “https” indicate secure connections p. 574 Fig. 11-19 Next
  • 24. System Failure What is a system failure? Prolonged malfunction Can cause loss of hardware, of computer software, or data Caused by aging hardware, natural disasters, or electrical power disturbances Overvoltage or Noise—unwanted power surge— electrical signal significant increase in electrical power Undervoltage—drop in electrical supply p. 574 Next
  • 25. System Failure What is a surge protector?  Protects computer and equipment from electrical power disturbances  Uninterruptible power supply (UPS) is surge protector that provides power during power loss Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Uninterruptible Power Supply below Chapter 11 p. 574 - 575 Figs. 11-20–11-21 Next
  • 26. Backing Up — The Ultimate Safeguard What is a backup? Duplicate of file, program, or disk Three-generation Full backup Selective backup backup all files in select which files preserves computer to back up three copies of important files In case of system failure or corrupted files, restore files by copying to original location p. 576 Next
  • 27. Information Privacy What is a cookie? Set browser to Some Web sites User Small file on accept cookies, sell or trade preferences your computer prompt you to information that contains accept cookies, stored in your data about you or disable cookies cookies How regularly you visit Interests Web sites and browsing habits p. 582 Next
  • 28. Information Privacy How do cookies work? p. 583 Fig. 11-28 Next
  • 29. Information Privacy What is phishing? Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information p. 584 Next
  • 30. Information Privacy What is computer forensics?  Also called digital forensics, network forensics, or cyberforensics  Discovery, collection, and analysis of evidence found on computers and networks  Computer forensic analysts must have knowledge of the law, technical experience, communication skills, and willingness to learn p. 587 Next