Chapter 11 ObjectivesDescribe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and
Trang 1Chapter 11 Computer Security, Ethics
and Privacy
Trang 2Chapter 11 Objectives
Describe the types of computer security risks
Identify ways to safeguard against computer
viruses, worms, Trojan horses, denial of
service attacks, back doors, and spoofing
Identify ways to safeguard against computer
viruses, worms, Trojan horses, denial of
service attacks, back doors, and spoofing
Discuss techniques to prevent unauthorized
computer access and use
Discuss techniques to prevent unauthorized
computer access and use
Identify safeguards against hardware theft
and vandalism
Identify safeguards against hardware theft
and vandalism
Explain the ways software manufacturers
protect against software piracy
Explain the ways software manufacturers
protect against software piracy
Define encryption and explain why it is
Trang 3Computer Security Risks
What is a computer security risk ?
system
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Computer Emergency
Response Team Coordination
Center below Chapter 11
Trang 4Computer Viruses, Worms, and Trojan Horses
What are viruses , worms , and Trojan horses ?
Trojan horse hides within
or looks like legitimate program until triggered
Payload (destructive event) that is delivered when you open file, run infected program,
or boot computer with infected disk
in disk drive
Can spread
and damage
files
Does not replicate itself on other computers
Trang 5Computer Viruses, Worms, and Trojan Horses
How can a virus spread through an e-mail message?
Step 1 Unscrupulous
programmers create a virus
program They hide the
virus in a Word document
and attach the Word
document to an e-mail
message.
Step 2 They use the Internet to send the e-mail message to thousands of users around the world.
Step 3b Other users do not recognize the name of the sender of the e-mail message
These users do not open the e-mail message Instead they delete the e-mail message
These users’ computers are not infected with the virus.
Step 3a Some
users open the
Trang 6Computer Viruses, Worms, and Trojan Horses
How can you protect your system from a macro virus?
to write macros
level, warning displays
that document contains
macro
Macros are instructions
saved in an application, such as word processing
or spreadsheet program
Trang 7Computer Viruses, Worms, and Trojan Horses
What is an antivirus program ?
computer viruses
worms and Trojan
horses
Trang 8Computer Viruses, Worms, and Trojan Horses
What is a virus signature ?
Also called virus definition
look for virus
signatures
Trang 9Keeps file
in separate area of hard disk
Computer Viruses, Worms, and Trojan Horses
file?
Records information about program such
as file size and creation
to remove any detected virus
Uses information
to detect if virus tampers with file
Quarantines
infected files that it cannot remove
Trang 10Computer Viruses, Worms, and Trojan Horses
What are some tips for preventing virus, worm, and Trojan horse infections?
Install a personal firewall program
If the antivirus program flags an e-mail attachment
as infected, delete the attachment immediately
Set the macro security
in programs so you can enable or disable
macros
Never open an e-mail attachment unless you are expecting it and
it is from a trusted source
Install an antivirus program on all of your computers
Check all downloaded programs for viruses, worms,
or Trojan horses
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Virus Hoaxes below Chapter 11
Trang 11Computer Viruses, Worms, and Trojan Horses
What is a denial of service attack and back door ?
A denial of service attack is an assault which disrupts access to an Internet service such as
the Web or e-mail
A back door is a program or set of instructions
in a program that allow users to bypass security controls when accessing a computer
resource
Trang 12Computer Viruses, Worms, and Trojan Horses
What is spoofing ?
Makes a network
or Internet Transmission appear legitimate
IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source
Perpetrators of IP spoofing trick their
victims into interacting with a phony Web site
Trang 13Computer Viruses, Worms, and Trojan Horses
What is a firewall ?
software that prevents unauthorized network access
Trang 14Computer Viruses, Worms, and Trojan Horses
What is a personal firewall utility ?
from unauthorized intrusions
Trang 15Unauthorized Access and Use
How can companies protect against hackers?
Intrusion detection software
analyzes network traffic, assesses
system vulnerabilities, and identifies
intrusions and suspicious behavior
Access control defines who can access computer and what actions they can take
Audit trail records access
attempts
Trang 16Video: Honeynet Project Founder Lance Spitzer
The Honeynet tracks hackers and exposes their techniques
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Honeypots below Chapter 11
Trang 17Unauthorized Access and Use
What are other ways to protect your personal computer?
Trang 18Unauthorized Access and Use
What is a user name ?
with the user name
that allows access
to computer
resources
Trang 19Unauthorized Access and Use
How can you make your password more secure?
Trang 20Unauthorized Access and Use
What is a possessed object?
Trang 21Unauthorized Access and Use
What is a biometric device ?
identity using personal
characteristic
Fingerprint, hand geometry,
voice, signature, and iris
Trang 23Hardware Theft and Vandalism
Some notebook computers use
passwords, possessed objects, and biometrics as security methods
For PDAs, you can
password-protect the device
Hardware vandalism is act of
defacing or destroying computer
equipment
Trang 24Software Theft
What is software theft ?
Act of stealing or illegally copying
software or intentionally
erasing programs
Software piracy
is illegal duplication
of copyrighted software
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Software Piracy
below Chapter 11
Trang 25Software Theft
What is a license agreement ?
Right to use software
Single-user license agreement allows user to install software
on one computer, make backup copy, and sell software
after removing from computer
Trang 26Business Software Alliance (BSA) promotes better understanding of software piracy problems
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Business Software Alliance
below Chapter 11
Trang 27Information Theft
What is encryption ?
Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
Encryption key (formula) often uses more than one method
To read the data, the recipient must decrypt , or decipher, the data
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Encryption below Chapter 11
Trang 28Information Theft
What does an encrypted file look like?
Trang 29Secure site
is Web site that uses encryption to secure data
Internet Security Risks
How do Web browsers provide secure data transmission?
Trang 30Internet Security Risks
What is a certificate authority (CA)?
Trang 31Internet Security Risks
What is Secure Sockets Layer (SSL)?
client and Internet server
beginning with
“https” indicate secure connections
Trang 32of computer
Trang 33System Failure
What is a surge protector ?
equipment from electrical power disturbances
provides power during power loss
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Uninterruptible Power Supply
below Chapter 11
Trang 34Backing Up — The Ultimate
Full backup
all files in computer
Three-generation
backup
preserves three copies of important files
In case of system failure or corrupted files, restore files by copying to original location
Trang 35Wireless Security
How can I ensure my wireless communication is
secure?
Trang 36Ethics and Society
What are computer ethics ?
Information privacy
Intellectual property rights—rights to which creators are entitled for
their work
Intellectual property rights —rights to which creators are entitled for
Unauthorized use of
computers and networks
Moral guidelines that govern use of computers and information systems
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Intellectual Property Rights
below Chapter 11
Trang 37Ethics and Society
What is an IT code of conduct ?
Trang 38computers to observe employee
computer use
Right of individuals and companies to restrict collection and use of information about
them
Trang 39Information Privacy
What are some ways to safeguard personal information?
Fill in only necessary information
on rebate, warranty, and
registration forms
Avoid shopping club
and buyers cards
Install a cookie manager
to filter cookies
Inform merchants that you
do not want them to distribute
your personal information
Limit the amount of information
you provide to Web sites; fill
in only required information
Clear your history file when you are finished browsing
Set up a free e-mail account;
use this e-mail address for merchant forms
Turn off file and print sharing
on your Internet connection
Install a personal firewall
Sign up for e-mail filtering through your Internet service provider or use an antispam program, such as Brightmail
Do not reply to spam for any reason
Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com
Trang 41Information Privacy
What is a cookie ?
Set browser to accept cookies, prompt you to accept cookies,
or disable cookies
Some Web sites sell or trade information stored in your cookies
Small file on your computer that contains data about you
User
preferences
Interests and browsing habits
How regularly you visit Web sites
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Cookies below Chapter 11
Trang 42Information Privacy
How do cookies work?
Step 1 When you type
Web address of Web site in
your browser window,
browser program searches
your hard disk for a cookie
associated with Web site.
Unique ID
Step 2 If browser finds a cookie, it sends information in cookie file to Web site.
Step 3 If Web site does not receive
cookie information, and is expecting it,
Web site creates an identification number
for you in its database and sends that
number to your browser Browser in turn
creates a cookie file based on that number
and stores cookie file on your hard disk
Web site now can update information in
cookie files whenever you access the site.
Trang 44Information Privacy
How can you control spam?
Collects spam in central location that you can view any time
Attempts to remove spam
Anti-spam program
Trang 45to obtain your personal
information
Trang 46Information Privacy
What privacy laws have been enacted?
Trang 47Information Privacy
What privacy laws have been enacted? (cont’d)
Trang 48Information Privacy
What is content filtering ?
Association (ICRA) provides rating system
of Web content
restricts access to specified sites
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Internet Content Rating
Association below Chapter 11
Trang 49Computer vision syndrome
(CVS)—eye and vision
problems
Computer vision syndrome
(CVS)—eye and vision
Tendonitis—inflammation of tendon due to repeated motion
Carpal tunnel syndrome (CTS)
—inflammation of nerve that connects forearm to palm
Carpal tunnel syndrome (CTS)
—inflammation of nerve that connects forearm to palm
Trang 50Health Concerns of Computer Use
What precautions can prevent tendonitis or carpal tunnel syndrome?
and arms
of times you switch
between mouse and
keyboard
Trang 51Health Concerns of Computer Use
How can you ease eyestrain
when working at the computer?
Trang 52Health Concerns of Computer Use
to 28”
feet flat on floor
adjustable height chair with 5 legs for stability
adjustable seat
adjustable backrest
elbows at 90°
and arms and hands parallel
to floor
Trang 53Health Concerns of Computer Use
What is green computing ?
using computer
Click to view Web
Link, click Chapter 11, Click
Web Link from left
navigation, then click
Green Computing below
Chapter 11
Trang 54Summary of Computer Security, Ethics and
Privacy
Potential computer risks
Safeguards that schools, business, and individuals can implement to minimize these risks
Safeguards that schools, business, and individuals can implement to minimize these risks
Wireless security risks and safeguards
Ethical issues surrounding information accuracy, intellectual property rights, codes
of conduct, and information privacy
Ethical issues surrounding information accuracy, intellectual property rights, codes
of conduct, and information privacy
Computer-related health issues, their preventions, and ways to keep the environment healthy
Computer-related health issues, their preventions, and ways to keep the environment healthy
Chapter 11 Complete