Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
The Internet.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Chapter 9: Privacy, Crime, and Security
Professor Michael J. Losacco CIS 1150 – Introduction to Computer Information Systems Privacy, Security, and Ethics Chapter 9.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Chapter 10 Privacy and Security McGraw-Hill
Chapter 10 Privacy and Security.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
By Connie Lopez. Main Points 1. Computer Technology Arises Concerns 2. Computer Ethics & Guidelines that Govern the morally acceptable use of Computers.
McGraw-Hill/Irwin Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 Privacy and Security.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
1010 CHAPTER PRIVACY AND SECURITY. © 2005 The McGraw-Hill Companies, Inc. All Rights Reserved Competencies Describe concerns associated with computer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Chapter 11 Security and Privacy: Computers and the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Computing ESSENTIALS     CHAPTER Privacy and Security computing ESSENTIALS.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
Computer Programming I
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Privacy, Security, and Ethics © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Computing Essentials 2013.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
The Internet. 2 So what is the internet? The internet is global network that connects most of the world’s personal computers. The World Wide Web is a.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Copyright © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Chapter 10: Privacy, Security, and Ethics.
Privacy, Security and Ethics
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
Computer Security Keeping you and your computer safe in the digital world.
© 2017 by McGraw-Hill Education. This proprietary material solely for authorized instructor use. Not authorized for sale or distribution in any manner.
Security Risks Todays Lesson Security Risks Security Precautions
Privacy, Security and Ethics
Privacy, Security and Ethics
GCSE ICT SECURITY THREATS.
IT Security  .
Unit 4 IT Security.
Instructor Materials Chapter 7 Network Security
Protect Your Computer Against Harmful Attacks!
Securing Information Systems
Identify the most significant concerns for effective implementation of computer technology.
Chapter 10 Privacy and Security McGraw-Hill
BCT 2.00 Analyze Technology Issues
Chapter 10: Privacy, Security, and Ethics
Chapter 10: Privacy, Security, and Ethics
Chapter9.
Chapter 13 Security and Ethical Challenges.
Chapter9.
Chapter 10: Privacy, Security, and Ethics
Computer Programming I
HOW DO I KEEP MY COMPUTER SAFE?
Chapter # 3 COMPUTER AND INTERNET CRIME
Privacy, Security, and Ethics
Security, Privacy, Ethics And Ergonomic
Presentation transcript:

Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011 Chapter 10 in Computing Essentials 2011

Issues with Computer Privacy Privacy Issues Accuracy Property Access

Large Databases Large organizations are constantly compiling data Personal Information, websites visited, user information, etc. Information Resellers (Information Brokers) collect and sell personal data

Personal Information is a marketable commodity Companies can spread information without your personal consent. Identity theft is the illegal assumption of someone's identity for purposes of economic gain. Information Inaccuracies can lead to many issues (Credit reports, background checks, etc.) Freedom of Information Act entitles you to look at your records from government agencies.

Private Networks Most companies conduct business and daily work operations within a private network. They are entitled to go through ANY and ALL information within that network. Some companies use snoopware to monitor employee computer activities. Companies have the right to explore and search through company e-mails.

Tips to Prevent Identity Theft Never give out personal information online. ESPECIALLY in response to an e-mail. Phishing is used to describe dishonest e-mails that are sent to try to get you to disclose your account information. 2. Only do online business with large corporations that you know are legitimate with solid reputations. 3. Make sure to remove all personal information from a computer before selling or disposing of it. 4. Check your credit reports to verify information and account activities.

Internet and Web Security Illusion of Anonymity- The idea most people have that little can be done to their personal privacy if they are selective about sharing information. IP Addresses History File-Locations of sites visited by your computer Cookies –Small pieces of information that are deposited on your hard disk from Websites you have visited.

How To Delete Internet Browsing and Cookie Information -Internet Explorer -Chrome -Firefox

Delete Bro

How To Run a Disk CleanUp

Traditional Cookies provide information on a single site. Ad network or adware cookies record your activities across different sites. Spyware- wide range of programs that are designed to secretly record and report an individuals activities on the Internet Web bugs- small images or HTML code hidden within an e-mail message Keystroke loggers record every activity and keystroke made on your computer system

Computer Criminals Employees Outside Users Hackers- people who create or improve programs to share with others Crackers- create and share programs designed to gain unauthorized access to computers or disrupt networks Organized Crime members Terrorists

Malicious Programs Viruses- programs that migrate through networks and operating systems that can alter or delete files. Creation or spreading of viruses is punishable under the Computer Fraud and Abuse Act Worms- special type of virus that fills a computer with self-replicating information so that the computer is drastically slowed or stopped. Trojan Horses- Programs that come into a computer disguised as something else.

Zombies Computers that are infected by a virus, worm, or Trojan horse that allow them to be remotely controlled for malicious purposes. Botnet/ Robot Network is a collection of zombie computers that use their combined powers to crack passwords and send spam e- mails. Capcha

Denial of Service Attack (DoS) attempts to slow down or stop a computer system or a network by flooding a computer/network with requests for information and data. Sites/networks become overwhelmed with requests, cannot respond to legitimate users, and shut down. Internet Scams- Fraudulent or deceptive act or operation to trick individuals into providing personal information or spending their time or money Phishing Theft of hardware, software, data, or computer time Data manipulation

Common Internet Scams Identity Theft Chain Letters Auction Fraud Vacation Prize Advance Fee Loans

Online Identity Information you provide to others online The identity you create online- e-mail address, user names, etc.

Privacy Laws Gramm-Leach-Bliley Act protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) protects medical records Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational records.

Protecting Computer Security Restricting Access Strong passwords that are changed often Firewalls Data Encryption Virtual Private Networks (VPN) Anticipating Disaster

Guidelines for morally acceptable use of computers in our society Computer Ethics Guidelines for morally acceptable use of computers in our society

Software piracy- unauthorized copying and distributing of software Copyright gives content creators the right to control their work and to get financial gain from their work. You break copyright laws when you unlawfully copy music or movies Software piracy- unauthorized copying and distributing of software Digital Millennium Copyright Act established the rights of a software owner to make copies for personal use Plagiarism- Using other’s work or ideas as your own