Computer Security, Ethics and Privacy

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Thank you to IT Training at Indiana University Computer Malware.
Security Objectives Describe the types of computer security risks
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Chapter 9: Privacy, Crime, and Security
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Chapter 11 Computer Security, Ethics and Privacy
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Security Issues and Ethics in Education
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Computer Security, Ethics and Privacy
1 Pertemuan 11 Understanding Computers Privacy & Health Concerns Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Chapter 11 Objectives Describe the types of computer security risks
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Topic 5: Basic Security.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
Any criminal action perpetrated primarily through the use of a computer.
Computer Ethics. Ethics Notes Ethics: standards of honesty, morality, and fairnessEthics: standards of honesty, morality, and fairness Public Data: information.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Chapter 40 Internet Security.
Digital Security Identity theft Copyright Laws Plagiarism, and More.
Managing Windows Security
Network and Internet Security and Privacy
IT Security  .
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter Nine (Part 1).
Computer Ethics.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy
Network and Internet Security and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
Computer Security, Ethics and Privacy
HOW DO I KEEP MY COMPUTER SAFE?
King Saud University- College OF Applied Studies
Faculty of Science IT Department By Raz Dara MA.
Chapter 11 Computer Security, Ethics and Privacy
Chapter 11 Computers and Society, Security, Privacy, and Ethics
How to keep the bad guys out and your data safe
King Saud University- College OF Applied Studies
Chapter 11 Computer Security, Ethics and Privacy
Computer Security By: Muhammed Anwar.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Computer Security, Ethics and Privacy

Learning Objectives Describe the types of computer security risks Identify ways to safeguard against computer malware. Discuss techniques to prevent unauthorized computer access and use Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure

Learning Objectives Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy

Computer Security Risks Event or action that causes loss of or damage to computer system including Malware Unauthorized access Information theft Software theft Hardware theft System failure

Malware Short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. Malware is a general term for; Viruses Worms Trojan horses Sypware Dishonest addware Crimeware Rootkits

Computer Virus Computer program designed to copy itself into other programs, with the intention of causing mischief or damage A virus is loaded into a computer's memory and instructs its host program to copy the viral code into any number of other programs and files stored in the computer. When the program is started or the file is accessed a fatal error occurs usually causing the program to shut down or in rare cases the computer to crash.

Worms A computer worm is a type of virus that replicates itself, but does not alter any files on your machine. Worms cause havoc by multiplying so many times that they take up all your computer's available memory or hard disk space. This can lead to denial of service.

Trojan horses A Trojan horses is a software programs that masquerade as a regular program, such as games, disk utilities, and even antivirus programs. A Trojan horse might appear to be a computer game, but once you double-click it, the program starts writing over certain parts of your hard drive, corrupting your data.

Spyware As the name implies, this is software that "spies" on your computer Spyware can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet.

Preventing Malware from Infecting Your Computer Install an antivirus program on all of your computers Never open an e-mail attachment unless you are expecting it and it is from a trusted source If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately Check all downloaded programs for viruses, worms, or Trojan horses

Anti-virus Programs Identifies and removes computer viruses Most also protect against worms and Trojan horses Most anti-virus programs provide more then just virus protection.

Anti-virus Programs

Internet and Network Attacks A denial of service attack is an assault which disrupts computer access to an Internet service such as the Web or e-mail A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network

Firewall A computer firewall limits the data that can pass through it and protects a networked server or client machine from damage by unauthorized users. Firewalls can be either hardware or software-based.

Firewall

User Names and Passwords User name - Unique combination of characters that identifies user Password is private combination of characters associated with the user name that allows access to computer resources

User Names and Passwords

Software Theft Act of stealing software, copying software or intentionally erasing programs Software piracy is illegal duplication of copyrighted software License agreement Right to use software Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer Volume licensing is use in industry where multiple copies of the same program are used on networks.

Safeguards Against Software Theft Product activation allows user to input product identification number online or by phone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems

Encryption Encryption is the coding or scrambling of information so that it can only be decoded and read by someone who has the correct decoding key. Encryption key (formula) often uses more than one method Encryption is used in secure Web sites as well as other mediums of data transfer.

Buying Online Make sure that when you enter the shopping cart are the address changes to https://- secure socket layer Look for the following logos at the bottom of the home page of the merchants Web site.

Buying Online -Certification

Systems Failure Prolonged malfunction of computer Can cause loss of hardware, software, or data Caused by aging hardware, natural disasters, or electrical power disturbances Electric power disturbances Noise—unwanted electrical signal Under-voltage—drop in electrical supply Overvoltage or power surge—significant increase in electrical power

Power Protection Surge protector – protects equipment from noise and over voltage Uninterruptible power supply (UPS) - protects equipment from noise and over voltage and under voltage.

Backing up Your Data How important is your data? You can back up on a random basis on to CD/DVD/Blue Ray disks or attached hard drives. You can automate back up onto internal or external hard drives. You can set up a RIAD 1 system which is mirroring of drives.

Wireless Security When you set up a wireless router for your home network system you are creating a wireless access point (WAP). The factory presets on a wireless system provide no security To secure such a system you need to WAP should not broadcast your network name Enable Wired Equivalent Privacy or Wi-Fi Protected Access (WPA)

Information Privacy Right of individuals and companies to deny or restrict collection and use of information about them Difficult to maintain today because data is stored online Employee monitoring is using computers to observe employee computer use Legal for employers to use monitoring software programs

Ways to Safe Guard Personal Information Fill in only necessary information on rebate, warranty, and registration forms Avoid shopping club and buyers cards Inform merchants that you do not want them to distribute your personal information Limit the amount of information you provide to Web sites, fill in only required information Install a cookie manager to filter cookies Clear your history file when you are finished browsing

Ways to Safe Guard Personal Information Set up a free e-mail account; use this e-mail address for merchant forms Turn off file and print sharing on your Internet connection Sign up for e-mail filtering through your Internet service provider or use an antispam program, Do not reply to spam for any reason Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com