Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.

Slides:



Advertisements
Similar presentations
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Mrs. Jefferson Business Information Management I.
Security Issues and Ethics in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Topic 5: Basic Security.
Computer Skills and Applications Computer Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
VIRUSES & ANTI- VIRU-SES. WHAT IS A COMPUTER VIRUS? A computer virus is a small software program that spreads from one computer to another computer and.
bitdefender virus protection
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Security Issues in Information Technology
Chapter 40 Internet Security.
Viruses & Destructive Programs
Security, Social and Legal Issues Regarding Software and Internet
Malware and Computer Maintenance
Unit 4 IT Security.
People used to install software on their computers
Pre-Computer Skills Internet.
How to build a good reputation online
Computing Issues that Affect Us All
Protect Your Computer Against Harmful Attacks!
COMPUTER CRIME.
Pre-Computer Skills Internet.
Scams, Identity Theft, and Viruses Kelly & Caitlin
Computer Ethics.
BCT 2.00 Analyze Technology Issues
UNIT 18 Data Security 1.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Unit 6 Digital Literacy Study S3 Obj 2-2
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
What is Information Security?
Unit 6 Digital Literacy Study S3 Obj 2-2
How to keep the bad guys out and your data safe
Computing Issues that Affect Us All
Technology Mrs. Huddleston
Computing Issues that Affect Us All
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Computer Security

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes

A virus is a program that attach itself in a real program. It can corrupt and destroy a computer system without the user notice. The viruses can replicate themselves to infect other systems. How do viruses spread? A piece of software that contain virus (called host program) someone share the program ( , photo, Apps) The virus will copied to that computer. The software in the computer will be infected Home

The virus will hide in the computer for weeks or even months. It lead us can't detect the viruses immediately. Characteristic: A virus usually is activated as soon as a program or file is used or at the specific times. The virus code will often display a message letting you know that the virus has done its damage. Home

 Hardware theft present a difficult security challenge.  It means that someone stole the computer equipment for example: mobile phone, tablet, USB drive  Hardware theft usually exists in large companies or schools.  In the case of desktop and larger computers at home, hardware theft generally is not a problem. Home

 Software theft can take many forms-- from someone physically stealing a DVD-ROM, CD-ROM, or USB drive to intentional piracy of software.  Software piracy It is the unauthorized and illegal duplication of copy- righted software, which is the most common form of software theft. That means without Software License.  Download or use illegal software from the web or USB drive. Home

 Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.  It can range from a student send personal by school computer to someone gaining access to a school computer server and performing an unauthorized transfer.  Hackers are the one who try to break into a computer system with the intention of stealing or corrupting its data. Home

Information theft typically occurs for a variety of reasons: e.g. An organization stealing or buying stolen information to learn about its competitor. Someone steal others’ credit card information to make purchases on the web. Information theft often involves the data privacy issue and is linked to other types of computer crimes.

Computer viruses: Destroy or corrupt data stored in the infected computer. The symptom or damage caused by a virus can be harmless or cause significant damage, as planned by the creator. Then, your computer may hang or even can't be used. Hardware theft: It will cause the loss of properties -> money. Then, Your computer can't run properly. Home

Software theft:  Using illegal Software will increase the chance of viruses infection.  Poor quality of software and reduces your ability to receive technical support from the software producer.  Drives up the price of original software for all users. Unauthorized use by hackers and Information Theft: Your information, data, programs will be stolen. you will loss your privacy … Home`

Computer Viruses  Use the anti-virus program to check and remove viruses in your computer regularly.  Update the anti-virus list regularly.  Scanning all USB drive, downloaded programs by anti-virus program.  Back up files regularly  Check all downloaded programs for virus and do not open the s come from an unknown source. Methods to safeguard computer systems

Hardware theft  Install additional physical security devices such as alarm system that lock the equipment in a room.  Common sense and a constant awareness of the risk are the best preventive measures against theft of mobile phone, tablet computer and other equipment.  Physical access controls,such as locked doors,windows usually are adequate to protect the equipment. Methods to safeguard computer systems

Software Theft  To reduce software piracy, “educate the users to respect the original creation, don’t use pirated software.” is important.  Using software with license Methods to safeguard computer systems

Unauthorized Access of Hackers  Access control is a security measure that defines who can access a computer,when and what they can take while accessing the computer. Two techniques are used: Identification----verifies that you are a valid user by Setting Password to log in the computer system. Authentication----verifies that who you are ( Giving Authority) and the user right. SSet up Fire-wall in network servers to prevent unauthorized access to the computer network. Methods to safeguard computer systems

Information theft Encryption is one way to protect sensitive data. Sender will convert data to codes which are unreadable and the receiver must get the password and key in order to convert the codes back to meaningful data. Methods to safeguard computer systems

 Do not open / download files from an unknown source on the internet.  Do not disclose your account and passwords to others.  Log out the computer network when you leave.  Use the copyrighted software and do not install illegal software.  Do not steal the hardware of the computer. Home