Beruflich Dokumente
Kultur Dokumente
Computers 2009
Chapter 11
Computer Security,
Ethics and Privacy
Chapter 11 Objectives
Describe the types of computer security risks Discuss the types of devices available that
protect computers from system failure
Identify ways to safeguard against Explain the options available for backing up
computer viruses, worms, Trojan horses, computer resources
botnets, denial of service attacks, back
doors, and spoofing
Identify risks and safeguards associated with
wireless communications
Discuss techniques to prevent unauthorized
computer access and use
Recognize issues related to information
accuracy, rights, and conduct
Identify safeguards against hardware theft
and vandalism
Discuss issues surrounding information
privacy
Explain the ways software manufacturers
protect against software piracy
Discuss ways to prevent health-related
disorders and injuries due to computer use
Define encryption and explain why it is
necessary
Next
Computer Security Risks
What is a computer security risk?
Event or action that causes loss of or damage to
computer system
Safeguards
Internet and Network Attacks
What are viruses, worms, and Trojan horses?
- malware
Virus is a Worm copies Trojan horse hides Malware are
potentially itself repeatedly, within programs act
damaging using up or looks like without a user’s
computer resources legitimate knowledge and
and possibly
program shutting down program until deliberately alter
computer or triggered the computer’s
network operations
Does not
Can spread Payload
replicate
and (destructive
itself on
damage event) that
other
files is delivered
computers
Internet and Network Attacks
Computer viruses, worms, and Trojan horses
deliver their payload on a computer in four basic
ways: when a user
1. Opens an infected file
2. Runs an infected program
3. Boots the computer with infected removable media
inserted in a drive or plugged in a port
4. Connects an unprotected computer to a network
p. 561 Next
Internet and Network Attacks
What are some tips for preventing virus, worm, and Trojan
horse infections?
Never open an
Never start a e-mail attachment
Install an antivirus
computer with unless you are
program on all of
removable media expecting it and
your computers
inserted it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
What is a firewall?
Security system consisting of hardware and/or
software that prevents unauthorized intrusion
p. 567 Next
Unauthorized Access and Use
What is a biometric device?
Authenticates person’s
identity using personal
characteristic
Fingerprint, hand geometry,
voice, signature, and iris
p. 570 Next
Software Theft
What is a license agreement?
Right to use software
Single-user license agreement
allows user to install software on
one computer, make backup
copy, and sell software after
removing from computer
Users are not permitted to do:
Install the software on a
network
Give copies to friends and
colleagues, while continuing
to use the software
Export the sotware
Rent or lease the software
p. 570 - 571 Fig. 11-15 Next
Software Theft
What are some other safeguards against software theft?
Secure site
Many Web browsers
is Web site that uses
use encryption
encryption to secure data
p. 574 Next
System Failure
What is a surge protector?
Protects computer and
equipment from electrical power
disturbances
Uninterruptible power supply
(UPS) is surge protector that
provides power during power loss
Duplicate components
Three-generation
Full backup Selective backup backup
all files in select which files preserves
computer to back up three copies of
important files
p. 576 Next
Wireless Security
How can I ensure my wireless communication is
secure?
Secure your wireless access point (WAP)
WAP should not broadcast your network name (SSID)
Enable Wi-Fi Protected Access (WPA)
802.11i
Unauthorized use of
computers and Software theft Information accuracy
networks
Intellectual property
rights—rights to which
Codes of conduct
creators are entitled for
their work
Set browser to
Small text file Some Web sites
User accept cookies,
on your sell or trade
preferences prompt you to
computer that information
accept cookies,
contains data stored in your
or disable
about you cookies
cookies
How
regularly
you visit Interests
Web sites and
browsing
habits
p. 582 Next
Information Privacy
How do cookies work?
Service that
E-mail filtering
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources
Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
p. 584 Next
Information Privacy
What is phishing?
p. 584 Next
Information Privacy
What are some ways to safeguard personal information?
Fill in only necessary information Install a cookie manager Sign up for e-mail
on rebate, warranty, and to filter cookies filtering through your
registration forms Internet access provider or
Clear your history file when use an antispam program,
you are finished browsing such as Brightmail
Avoid shopping club
and buyers cards
Set up a free e-mail account;
Do not reply to spam
use this e-mail address for
for any reason
Inform merchants that you merchant forms
do not want them to distribute
your personal information
Turn off file and print sharing Surf the Web anonymously
on your Internet connection with a program such as
Freedom Web Secure or
Limit the amount of information through an anonymous
you provide to Web sites; fill Web site such as
in only required information Install a personal firewall Anonymizer.com
p. 581 Next
Information Privacy
What privacy laws have been enacted?
Computer addiction—when
computer consumes entire
social life
p. 587 - 589 Next
Health Concerns of Computer Use
What precautions can prevent tendonitis or carpal
tunnel syndrome?
Spread fingers apart for several seconds while keeping
wrists straight
Gently push back fingers and
then thumb
Dangle arms
loosely at sides and
then shake arms
and hands
adjustable
seat
adjustable
height chair
with 4 or 5
legs for
stability
Chapter 11 Complete