1. Trang chủ
  2. » Công Nghệ Thông Tin

Lecture Introduction to Computers: Chapter 14A - Peter Norton''s

23 79 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 23
Dung lượng 467,22 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system.

Trang 1

McGraw­Hill Technology Education McGraw­Hill Technology Education Copyright © 2006 by The McGraw­Hill Companies, Inc. All rights reserved.

Trang 2

Chapter 14A

Understanding the Need for Security Measures

Trang 4

Basic Security Concepts

• Inability to use hardware

• Inability to use software

Trang 6

Threats To Users

• Identity Theft

– Impersonation by private information

• Thief can ‘become’ the victim

– Reported incidents rising– Methods of stealing information

Trang 7

• Data is sold to other companies

– Public records on the Internet– Internet use is monitored and logged– None of these techniques are illegal

Trang 8

Threats to Users

• Cookies

– Files delivered from a web site– Originally improved a site’s function– Cookies now track history and passwords– Browsers include cookie blocking tools

Trang 9

– Hides from users– Several programs exist to eliminate

Trang 11

• Stop spam before reaching the inbox

– Spammers acquire addresses using many methods

– CAN-SPAM Act passed in 2003

Trang 12

• Surge suppressors

• Line conditioners

• Uninterruptible power supplies

Trang 13

Threats to Hardware

• Theft and vandalism

– Thieves steal the entire computer– Accidental or intentional damage– Countermeasures

• Keep the PC in a secure area

• Lock the computer to a desk

• Do not eat near the computer

• Watch equipment

• Chase away loiterers

• Handle equipment with care

Trang 14

Threats to Hardware

• Natural disasters

– Disasters differ by location– Typically result in total loss– Disaster planning

• Plan for recovery

• List potential disasters

• Plan for all eventualities

• Practice all plans

Trang 15

Threats to Data

• The most serious threat

– Data is the reason for computers– Data is very difficult to replace– Protection is difficult

• Data is intangible

Trang 18

Threats to Data

• Cybercrime

– Using a computer in an illegal act– Fraud and theft are common acts

Trang 21

Threats to Data

• Distributed denial of service attack

– Attempt to stop a public server– Hackers plant the code on computers– Code is simultaneously launched

– Too many requests stops the server

Trang 22

• Computer Emergency Response Team (CERT)

• Department of Homeland Security

Trang 23

McGraw­Hill Technology Education

Chapter 14A

End of Chapter

Ngày đăng: 30/01/2020, 03:43

TỪ KHÓA LIÊN QUAN