SlideShare una empresa de Scribd logo
1 de 53
Chapter 11 Computer Security,  Ethics and Privacy
Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses,  botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
Computer Security Risks ,[object Object],p. 556 - 558 Fig. 11-1 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Computer Emergency Response Team Coordination Center below Chapter 11
Internet and Network Attacks ,[object Object],p. 558 Virus  is a potentially damaging  computer  program ,[object Object],Trojan horse   hides within  or looks like legitimate program until triggered Payload  (destructive  event) that is delivered Can spread and damage files Does not replicate itself on other computers Next
Internet and Network Attacks ,[object Object],p. 559 Fig. 11-2 Step 1.  Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a picture and attach the picture to an e-mail message. Step 2.  They use the Internet to send the e-mail message to thousands of users around the world. Step 3b.  Other users do not recognize the name of the sender of the e-mail message. These users do not open the  e-mail message - instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a.  Some users open the attachment and their computers become infected with the virus. Next
Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
Internet and Network Attacks ,[object Object],p. 560 Fig. 11-3 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 560 - 561 Fig. 11-4 ,[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Fig. 11-5 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Keeps file  in separate  area of hard disk Next Records  information  about program such  as file size and  creation  date Attempts  to remove  any detected  virus Uses  information  to detect if  virus tampers  with file Quarantines   infected  files that it  cannot  remove
Internet and Network Attacks ,[object Object],p. 562 Install a personal firewall program If the antivirus program flags an  e-mail attachment  as infected, delete  the attachment immediately Never start a computer with removable media inserted Never open an  e-mail attachment unless you are expecting it and  it is from a  trusted source Install an antivirus program on all of your computers Check all  downloaded  programs for  viruses, worms,  or Trojan horses Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Virus Hoaxes below Chapter 11
Internet and Network Attacks ,[object Object],p. 562 - 563 A  denial of service attack  is an assault which disrupts computer access to an Internet service  such as the Web or e-mail A  back door  is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing  is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network Next
Internet and Network Attacks ,[object Object],p. 563 Fig. 11-7 ,[object Object],Next
Internet and Network Attacks ,[object Object],p. 564 Fig. 11-8 ,[object Object],[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 564 - 565 Next Intrusion detection software analyzes network traffic, assesses  system vulnerabilities, and identifies  intrusions and suspicious behavior Access control defines who  can access computer and  what actions they can take Audit trail  records access attempts
Unauthorized Access and Use ,[object Object],p. 565 Fig. 11-9 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 566 Fig. 11-10 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  CAPTCHAs below Chapter 11
Unauthorized Access and Use ,[object Object],p. 566 - 567 Fig. 11-11 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 ,[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 - 568 Fig. 11-13 ,[object Object],[object Object],Next
Hardware Theft and Vandalism ,[object Object],p. 569 - 570 Fig. 11-14 ,[object Object],[object Object],[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  RTLS below Chapter 11
Software Theft ,[object Object],p. 570 Next Act of stealing or  illegally stealing software, copying  software or  intentionally  erasing  programs Software  piracy   is illegal duplication  of copyrighted software
Software Theft ,[object Object],p. 570 - 571 Fig. 11-15 ,[object Object],[object Object],Next
Software Theft ,[object Object],p. 571 Product activation  allows user to input product identification number online or by telephone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Business Software Alliance below Chapter 11
Information Theft ,[object Object],p. 572 Fig. 11-16 ,[object Object],[object Object],[object Object],[object Object],Next
Information Theft ,[object Object],p. 573 Fig. 11-17 Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  BitLocker below Chapter 11
Information Theft ,[object Object],Secure site   is Web site that uses encryption to secure data p. 573 Digital certificate  is notice that guarantees Web site is legitimate Many Web browsers  use encryption Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Certificates below Chapter 11
Information Theft ,[object Object],p. 573 Fig. 11-18 ,[object Object],[object Object],Next
Information Theft ,[object Object],p. 574 Fig. 11-19 ,[object Object],[object Object],Next
System Failure ,[object Object],p. 574  Caused by aging hardware,  natural disasters, or electrical  power disturbances Can cause loss of hardware,  software, or data Prolonged malfunction  of computer Undervoltage —drop  in electrical supply Next Overvoltage  or  power surge — significant increase  in electrical power Noise —unwanted  electrical signal
System Failure ,[object Object],p. 574 - 575 Figs. 11-20–11-21 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Uninterruptible Power Supply below Chapter 11
Backing Up — The Ultimate Safeguard ,[object Object],p. 576 Duplicate of file, program, or disk Full backup all files in computer Selective backup select which files  to back up Three-generation backup preserves  three copies of important files In case of system failure or corrupted files,  restore  files by copying to original location Next
Wireless Security ,[object Object],p. 577 Fig. 11-22 ,[object Object],[object Object],[object Object],[object Object],Next
Ethics and Society ,[object Object],p. 578 - 579 Information privacy Intellectual property rights —rights to which creators are entitled for their work Software theft Information accuracy Codes of conduct Unauthorized use of computers and networks Moral guidelines that govern use of computers and information systems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Rights Management below Chapter 11
Ethics and Society ,[object Object],p. 580 Fig. 11-25 ,[object Object],[object Object],Next
Information Privacy ,[object Object],p. 580 and 586 Legal for employers to use monitoring software programs Difficult to maintain today because data is stored online Employee monitoring  is using computers to observe employee computer use Right of individuals and companies to deny or restrict collection and use of information about them Next
Information Privacy ,[object Object],p. 581 Fill in only necessary information on rebate, warranty, and  registration forms Avoid shopping club  and buyers cards Install a cookie manager  to filter cookies Inform merchants that you  do not want them to distribute  your personal information Limit the amount of information  you provide to Web sites; fill  in only required information Clear your history file when  you are finished browsing Set up a free e-mail account;  use this e-mail address for  merchant forms Turn off file and print sharing  on your Internet connection Install a personal firewall Sign up for e-mail  filtering through your  Internet access provider or  use an antispam program,  such as Brightmail Do not reply to spam  for any reason Surf the Web anonymously  with a program such as  Freedom Web Secure or  through an anonymous  Web site such as  Anonymizer.com Next
Information Privacy ,[object Object],p. 581 - 582 Fig. 11-27 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 582 Set browser to accept cookies, prompt you to accept cookies, or disable cookies Some Web sites sell or trade information stored in your cookies Small text file on your computer that contains data about you User preferences Interests and browsing habits How regularly you visit Web sites Next
Information Privacy ,[object Object],p. 583 Fig. 11-28 Next
Information Privacy ,[object Object],p. 583 - 584 Fig. 11-29 ,[object Object],[object Object],[object Object],Next Click to view  Web Link, click Chapter 11, Click Web Link from left  navigation, then click  Spam below Chapter 11
Information Privacy ,[object Object],p. 584 E-mail filtering Anti-spam program Next Collects spam in central location  that you can  view any time Service that  blocks e-mail  messages from  designated  sources Sometimes  removes valid  e-mail messages Attempts to  remove spam
Information Privacy ,[object Object],p. 584 Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and  financial information Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 586 - 587 Fig. 11-31 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 587 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],Computer vision syndrome (CVS) —eye and vision problems p. 587 - 589 Repetitive strain injury (RSI) Computer addiction —when computer consumes entire social life Tendonitis—inflammation of tendon due to repeated motion Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-32 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-33 Next
Health Concerns of Computer Use ,[object Object],p. 589 Fig. 11-34  ,[object Object],keyboard height: 23” to 28” feet flat on floor adjustable height chair with 4 or 5 legs for stability adjustable seat elbows at 90° and arms and hands parallel to floor Next
Health Concerns of Computer Use ,[object Object],p. 590 Fig. 11-35 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Green Computing below Chapter 11
Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools,  business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues,  their preventions, and ways to  keep the environment healthy Chapter 11 Complete

Más contenido relacionado

La actualidad más candente

Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
geneveve_
 

La actualidad más candente (20)

CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber security
Cyber securityCyber security
Cyber security
 
Data Security - English
Data Security - EnglishData Security - English
Data Security - English
 
Cyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptxCyber Security Awareness Program.pptx
Cyber Security Awareness Program.pptx
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Cyber security fundamentals
Cyber security fundamentalsCyber security fundamentals
Cyber security fundamentals
 
Computer security privacy and ethics
Computer security privacy and ethicsComputer security privacy and ethics
Computer security privacy and ethics
 
Security awareness
Security awarenessSecurity awareness
Security awareness
 
What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?What is Cybercrime and How to Prevent Cybercrime?
What is Cybercrime and How to Prevent Cybercrime?
 
Network Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and TechniquesNetwork Security: Attacks, Tools and Techniques
Network Security: Attacks, Tools and Techniques
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Mobile protection
Mobile protection Mobile protection
Mobile protection
 
Web security
Web securityWeb security
Web security
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Introduction Network security
Introduction Network securityIntroduction Network security
Introduction Network security
 
cyber security PPT
cyber security PPTcyber security PPT
cyber security PPT
 

Similar a Chapter11

Internet security
Internet securityInternet security
Internet security
at1211
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
sharing notes123
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
lbcollins18
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
Mark Lanterman
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
angelaag98
 

Similar a Chapter11 (20)

Computer security
Computer securityComputer security
Computer security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Internet security
Internet securityInternet security
Internet security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

Más de Izaham

Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
Izaham
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
Izaham
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
Izaham
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
Izaham
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
Izaham
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
Izaham
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
Izaham
 
Flowchart
FlowchartFlowchart
Flowchart
Izaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
Izaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
Izaham
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
Izaham
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
Izaham
 

Más de Izaham (20)

Morphology 1
Morphology 1Morphology 1
Morphology 1
 
Morphology
MorphologyMorphology
Morphology
 
Critical reading
Critical readingCritical reading
Critical reading
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
 
Flowchart
FlowchartFlowchart
Flowchart
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 

Chapter11

  • 1. Chapter 11 Computer Security, Ethics and Privacy
  • 2. Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
  • 3.
  • 4.
  • 5.
  • 6. Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools, business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues, their preventions, and ways to keep the environment healthy Chapter 11 Complete