1. Trang chủ
  2. » Công Nghệ Thông Tin

Discovering Computers: Chapter 11 Computer Security, Ethics and Privacy doc

54 438 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Discovering Computers: Chapter 11 Computer Security, Ethics and Privacy
Trường học University of [Name] [Link to university homepage]
Chuyên ngành Computer Security, Ethics, and Privacy
Thể loại lecture notes
Năm xuất bản 2023
Thành phố Unknown
Định dạng
Số trang 54
Dung lượng 5,07 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 11 ObjectivesDescribe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and

Trang 1

Chapter 11 Computer Security, Ethics

and Privacy

Trang 2

Chapter 11 Objectives

Describe the types of computer security risks

Identify ways to safeguard against computer

viruses, worms, Trojan horses, denial of

service attacks, back doors, and spoofing

Identify ways to safeguard against computer

viruses, worms, Trojan horses, denial of

service attacks, back doors, and spoofing

Discuss techniques to prevent unauthorized

computer access and use

Discuss techniques to prevent unauthorized

computer access and use

Identify safeguards against hardware theft

and vandalism

Identify safeguards against hardware theft

and vandalism

Explain the ways software manufacturers

protect against software piracy

Explain the ways software manufacturers

protect against software piracy

Define encryption and explain why it is

Trang 3

Computer Security Risks

What is a computer security risk ?

system

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Computer Emergency

Response Team Coordination

Center below Chapter 11

Trang 4

Computer Viruses, Worms, and Trojan Horses

What are viruses , worms , and Trojan horses ?

Trojan horse hides within

or looks like legitimate program until triggered

Payload (destructive event) that is delivered when you open file, run infected program,

or boot computer with infected disk

in disk drive

Can spread

and damage

files

Does not replicate itself on other computers

Trang 5

Computer Viruses, Worms, and Trojan Horses

How can a virus spread through an e-mail message?

Step 1 Unscrupulous

programmers create a virus

program They hide the

virus in a Word document

and attach the Word

document to an e-mail

message.

Step 2 They use the Internet to send the e-mail message to thousands of users around the world.

Step 3b Other users do not recognize the name of the sender of the e-mail message

These users do not open the e-mail message Instead they delete the e-mail message

These users’ computers are not infected with the virus.

Step 3a Some

users open the

Trang 6

Computer Viruses, Worms, and Trojan Horses

How can you protect your system from a macro virus?

to write macros

level, warning displays

that document contains

macro

 Macros are instructions

saved in an application, such as word processing

or spreadsheet program

Trang 7

Computer Viruses, Worms, and Trojan Horses

What is an antivirus program ?

computer viruses

worms and Trojan

horses

Trang 8

Computer Viruses, Worms, and Trojan Horses

What is a virus signature ?

 Also called virus definition

look for virus

signatures

Trang 9

Keeps file

in separate area of hard disk

Computer Viruses, Worms, and Trojan Horses

file?

Records information about program such

as file size and creation

to remove any detected virus

Uses information

to detect if virus tampers with file

Quarantines

infected files that it cannot remove

Trang 10

Computer Viruses, Worms, and Trojan Horses

What are some tips for preventing virus, worm, and Trojan horse infections?

Install a personal firewall program

If the antivirus program flags an e-mail attachment

as infected, delete the attachment immediately

Set the macro security

in programs so you can enable or disable

macros

Never open an e-mail attachment unless you are expecting it and

it is from a trusted source

Install an antivirus program on all of your computers

Check all downloaded programs for viruses, worms,

or Trojan horses

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Virus Hoaxes below Chapter 11

Trang 11

Computer Viruses, Worms, and Trojan Horses

What is a denial of service attack and back door ?

A denial of service attack is an assault which disrupts access to an Internet service such as

the Web or e-mail

A back door is a program or set of instructions

in a program that allow users to bypass security controls when accessing a computer

resource

Trang 12

Computer Viruses, Worms, and Trojan Horses

What is spoofing ?

Makes a network

or Internet Transmission appear legitimate

IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source

Perpetrators of IP spoofing trick their

victims into interacting with a phony Web site

Trang 13

Computer Viruses, Worms, and Trojan Horses

What is a firewall ?

software that prevents unauthorized network access

Trang 14

Computer Viruses, Worms, and Trojan Horses

What is a personal firewall utility ?

from unauthorized intrusions

Trang 15

Unauthorized Access and Use

How can companies protect against hackers?

Intrusion detection software

analyzes network traffic, assesses

system vulnerabilities, and identifies

intrusions and suspicious behavior

Access control defines who can access computer and what actions they can take

Audit trail records access

attempts

Trang 16

Video: Honeynet Project Founder Lance Spitzer

The Honeynet tracks hackers and exposes their techniques

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Honeypots below Chapter 11

Trang 17

Unauthorized Access and Use

What are other ways to protect your personal computer?

Trang 18

Unauthorized Access and Use

What is a user name ?

with the user name

that allows access

to computer

resources

Trang 19

Unauthorized Access and Use

How can you make your password more secure?

Trang 20

Unauthorized Access and Use

What is a possessed object?

Trang 21

Unauthorized Access and Use

What is a biometric device ?

identity using personal

characteristic

 Fingerprint, hand geometry,

voice, signature, and iris

Trang 23

Hardware Theft and Vandalism

 Some notebook computers use

passwords, possessed objects, and biometrics as security methods

 For PDAs, you can

password-protect the device

Hardware vandalism is act of

defacing or destroying computer

equipment

Trang 24

Software Theft

What is software theft ?

Act of stealing or illegally copying

software or intentionally

erasing programs

Software piracy

is illegal duplication

of copyrighted software

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Software Piracy

below Chapter 11

Trang 25

Software Theft

What is a license agreement ?

Right to use software

Single-user license agreement allows user to install software

on one computer, make backup copy, and sell software

after removing from computer

Trang 26

Business Software Alliance (BSA) promotes better understanding of software piracy problems

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Business Software Alliance

below Chapter 11

Trang 27

Information Theft

What is encryption ?

Process of converting plaintext (readable data) into ciphertext

(unreadable characters)

Encryption key (formula) often uses more than one method

To read the data, the recipient must decrypt , or decipher, the data

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Encryption below Chapter 11

Trang 28

Information Theft

What does an encrypted file look like?

Trang 29

Secure site

is Web site that uses encryption to secure data

Internet Security Risks

How do Web browsers provide secure data transmission?

Trang 30

Internet Security Risks

What is a certificate authority (CA)?

Trang 31

Internet Security Risks

What is Secure Sockets Layer (SSL)?

client and Internet server

beginning with

“https” indicate secure connections

Trang 32

of computer

Trang 33

System Failure

What is a surge protector ?

equipment from electrical power disturbances

provides power during power loss

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Uninterruptible Power Supply

below Chapter 11

Trang 34

Backing Up — The Ultimate

Full backup

all files in computer

Three-generation

backup

preserves three copies of important files

In case of system failure or corrupted files, restore files by copying to original location

Trang 35

Wireless Security

How can I ensure my wireless communication is

secure?

Trang 36

Ethics and Society

What are computer ethics ?

Information privacy

Intellectual property rights—rights to which creators are entitled for

their work

Intellectual property rights —rights to which creators are entitled for

Unauthorized use of

computers and networks

Moral guidelines that govern use of computers and information systems

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Intellectual Property Rights

below Chapter 11

Trang 37

Ethics and Society

What is an IT code of conduct ?

Trang 38

computers to observe employee

computer use

Right of individuals and companies to restrict collection and use of information about

them

Trang 39

Information Privacy

What are some ways to safeguard personal information?

Fill in only necessary information

on rebate, warranty, and

registration forms

Avoid shopping club

and buyers cards

Install a cookie manager

to filter cookies

Inform merchants that you

do not want them to distribute

your personal information

Limit the amount of information

you provide to Web sites; fill

in only required information

Clear your history file when you are finished browsing

Set up a free e-mail account;

use this e-mail address for merchant forms

Turn off file and print sharing

on your Internet connection

Install a personal firewall

Sign up for e-mail filtering through your Internet service provider or use an antispam program, such as Brightmail

Do not reply to spam for any reason

Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com

Trang 41

Information Privacy

What is a cookie ?

Set browser to accept cookies, prompt you to accept cookies,

or disable cookies

Some Web sites sell or trade information stored in your cookies

Small file on your computer that contains data about you

User

preferences

Interests and browsing habits

How regularly you visit Web sites

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Cookies below Chapter 11

Trang 42

Information Privacy

How do cookies work?

Step 1 When you type

Web address of Web site in

your browser window,

browser program searches

your hard disk for a cookie

associated with Web site.

Unique ID

Step 2 If browser finds a cookie, it sends information in cookie file to Web site.

Step 3 If Web site does not receive

cookie information, and is expecting it,

Web site creates an identification number

for you in its database and sends that

number to your browser Browser in turn

creates a cookie file based on that number

and stores cookie file on your hard disk

Web site now can update information in

cookie files whenever you access the site.

Trang 44

Information Privacy

How can you control spam?

Collects spam in central location that you can view any time

Attempts to remove spam

Anti-spam program

Trang 45

to obtain your personal

information

Trang 46

Information Privacy

What privacy laws have been enacted?

Trang 47

Information Privacy

What privacy laws have been enacted? (cont’d)

Trang 48

Information Privacy

What is content filtering ?

Association (ICRA) provides rating system

of Web content

restricts access to specified sites

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Internet Content Rating

Association below Chapter 11

Trang 49

Computer vision syndrome

(CVS)—eye and vision

problems

Computer vision syndrome

(CVS)—eye and vision

Tendonitis—inflammation of tendon due to repeated motion

Carpal tunnel syndrome (CTS)

—inflammation of nerve that connects forearm to palm

Carpal tunnel syndrome (CTS)

—inflammation of nerve that connects forearm to palm

Trang 50

Health Concerns of Computer Use

What precautions can prevent tendonitis or carpal tunnel syndrome?

and arms

of times you switch

between mouse and

keyboard

Trang 51

Health Concerns of Computer Use

How can you ease eyestrain

when working at the computer?

Trang 52

Health Concerns of Computer Use

to 28”

feet flat on floor

adjustable height chair with 5 legs for stability

adjustable seat

adjustable backrest

elbows at 90°

and arms and hands parallel

to floor

Trang 53

Health Concerns of Computer Use

What is green computing ?

using computer

Click to view Web

Link, click Chapter 11, Click

Web Link from left

navigation, then click

Green Computing below

Chapter 11

Trang 54

Summary of Computer Security, Ethics and

Privacy

Potential computer risks

Safeguards that schools, business, and individuals can implement to minimize these risks

Safeguards that schools, business, and individuals can implement to minimize these risks

Wireless security risks and safeguards

Ethical issues surrounding information accuracy, intellectual property rights, codes

of conduct, and information privacy

Ethical issues surrounding information accuracy, intellectual property rights, codes

of conduct, and information privacy

Computer-related health issues, their preventions, and ways to keep the environment healthy

Computer-related health issues, their preventions, and ways to keep the environment healthy

Chapter 11 Complete

Ngày đăng: 07/03/2014, 14:20

TỪ KHÓA LIÊN QUAN