Computing Issues that Affect Us All

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

Computing Issues that Affect Us All lesson 30. This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment.
M. Guymon - Pleasant Grove High - Spring 2003 VIRUSES Computer Technology Day 21.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Stole it Straight from Wilkes County. Questions from 1.01.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 Privacy and Security McGraw-Hill
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
1 Pertemuan 05 Malicious Software Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Human-Computer Interface Course 2. Content The use of IT in everyday life Electronic Commerce Security Computer Viruses Copyright and the Law File Systems.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
VIRUSES and DESTRUCTIVE PROGRAMS
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Lecture 14 Overview. Program Flaws Taxonomy of flaws: – how (genesis) – when (time) – where (location) the flaw was introduced into the system 2 CS 450/650.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
Topic 5: Basic Security.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
CONTENTS What is Virus ? Types of computer viruses.
VIRUS.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Computer virus Done: Aaesha Mohammed ID: H
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
bitdefender virus protection
THIS IS A POWERPOINT PRESENTATION FOR THE TOPIC VIRUS SUBMITTED BY : ROHIT SHRESHTHA UNDER THE GUIDANCE OF MY FACULTY Mr. DATTATREYA JOSHI.
Computer Viruses Author: Alyse Allen.
Chapter Objectives In this chapter, you will learn:
Viruses & Destructive Programs
3.6 Fundamentals of cyber security
IT Security  .
Presentation on Computer Virus
War between Good and Evil.
Computer Viruses Latifah alabdulkarim
Lecture 8. Cyber Security, Ethics and Trust
Unit A: Exploring Computer Systems
COMPUTER VIRUSES Computer Technology.
Why Computer Security Need???
SEMINAR ON PC SECURITY FROM VIRUSES
Fundamentals of Information Systems
Related to data, hardware, and software
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Technology Notes 5
VIRUSES and DESTRUCTIVE PROGRAMS
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Computer Ethics.
Computer Technology Day 21
BCT 2.00 Analyze Technology Issues
Chap 10 Malicious Software.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
What is Information Security?
Chap 10 Malicious Software.
Securing your system, protecting your digital data and devices.
Computing Issues that Affect Us All
Computing Issues that Affect Us All
Malicious Program and Protection
Presentation transcript:

Computing Issues that Affect Us All lesson 30 Computing Issues that Affect Us All

This lesson includes the following sections: Computer Crime Computer Viruses Theft Computers and the Environment

Computer Crime Software Piracy Protections from Piracy

Computer Crime - Software Piracy Software piracy – the illegal copying of software programs – is the biggest legal issue affecting the computer industry. Piracy is of greatest concern to developers of commercial software, or programs that must be purchased before using. Piracy is less of a concern for shareware makers, whose programs must be registered but not always purchased. Piracy is not a concern for freeware, which is software that can be freely distributed by anyone.

Computer Crime - Protections from Piracy Various forms of copy protection have been used to discourage piracy, including: Installation diskettes that record the number of times the software is installed. Hardware locks, without which the program cannot function. Passwords, serial numbers, or other codes required for installation.

Computer Viruses Categories of Viruses Preventing Infection

Computer Viruses - Categories of Viruses A virus is a parasitic program that infects another program (the host). Most viruses fall into the following categories: Boot sector viruses Self-encrypting viruses Cluster viruses Self-changing viruses File-infecting viruses Stealth viruses Worms Macro viruses Bombs Joke programs Trojan Horses Bimodal viruses Polymorphic viruses Bipartite viruses Self-garbling viruses Multipartite viruses E-mail viruses Macro viruses

Computer Viruses - Preventing Infection Viruses are spread in several ways. The most common are: Treat all disks as though they are infected. Install an antivirus program and keep its virus definitions (database of virus information) up to date. Run your antivirus program regularly. Receiving an infected disk. Downloading an infected executable file from a network or the Internet. Copying a document file that is infected with a macro virus. To avoid viruses, you should:

Theft Hardware and Software Theft Data Theft Protecting Networks

Theft - Hardware and Software Theft As PCs become smaller – and as more people use laptop and handheld computers – hardware theft is becoming a growing problem. Software theft is also a major problem for companies, many of which must purchase large quantities of expensive software programs. To combat hardware and software theft, many companies are locking hardware to desks and securing software in libraries, granting access to employees only as needed.

Theft - Data Theft Data theft can be far more serious than software or hardware losses, because data can be difficult or impossible to replace. Hackers are a threat to sensitive corporate and government data because they pride themselves on getting around security measures. Organizations can keep hackers at bay by protecting their networks. This can be done by enforcing the use of user IDs and passwords. Data can also be protected through encryption, making it useless to anyone who does not have the encryption key.

Computers and the Environment Planned Obsolescence Use of Power

Computers and the Environment - Planned Obsolescence Because hardware and software products become obsolete after a given time, older systems are disposed of in large numbers. Large-scale disposals add to the clogging of landfills and pollution. To reduce these problems, organizations can download software from the Internet (reducing the number of disks and manuals used). Hardware can be recycled or donated to charities or schools.

Computers and the Environment - Use of Power Many people leave their computers running continuously, whether in use or not. This consumes power unnecessarily. To solve this problem, you can use a "green PC," which automatically powers down the monitor and hard drive after a period of non-use. Another way to conserve energy is to use hardware that conforms to the EPA's "Energy Star" program, which sets standards for power consumption.

lesson 30 review Define software piracy and explain why it is illegal. Name two ways in which computer viruses can be spread. Describe two methods used to protect networks from hackers.