Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

The Internet and the Web
How to protect yourself, your computer, and others on the internet
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
POSSIBLE THREATS TO DATA
Backing Up Your Computer Hard Drive Lou Koch June 27, 2006.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Security, Privacy, and Ethics Online Computer Crimes.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Free Software Alternatives: Avast! Anti-virus
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Utility Programs and their Functions. Antivirus Software (Virus Checker) Keep the Computer software healthy and free of virus’ that can harm the function.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
SECURITY AND PRIVACY: COMPUTERS AND THE INTERNET Chapter 10.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
Chapter 11 Security and Privacy: Computers and the Internet.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
Staying Safe Online Keep your Information Secure.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
In the old days... You Your computer. Then came... The Network.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Types of Electronic Infection
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 25 – Virus Detection and Prevention.
Chapter 9 Sending and Attachments. 2Practical PC 5 th Edition Chapter 9 Getting Started In this Chapter, you will learn: − How works − How.
Copyright © 2003 by Prentice Hall Computers: Tools for an Information Age Chapter 10 Security and Privacy: Computers and the Internet.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
VIRUS.
Virus. What is a virus ? A virus is a programme that is loaded onto your computer without your knowledge. Most viruses ‘infect’ other programmes by modifying.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Copyright Prentice Hall, Inc. 1 Computers: Information Technology in Perspective, 11e Larry Long and Nancy Long Chapter 5 Storing and Retrieving Information.
IT Security  .
Unit 4 IT Security.
VIRUSES and DESTRUCTIVE PROGRAMS
Computers: Tools for an Information Age
G061 - Network Security.
Presentation transcript:

Welcome to CMPE003 Personal Computers: Hardware and Software Dr. Chane Fullmer Fall 2002 UC Santa Cruz

Assignments Assignment #5 – Due November 8, 2002 Today….

Assignments Assignment #6 – The Last One Due November 22, 2002 Spreadsheets – (M$ Excel) Generate a monthly budget spreadsheet

Final Project Due no later than December 3, 2002 You can turn in earlier.. Power Point presentation 4 pages Extra points for special effects, animations Turn in on a floppy/CDROM

Security and Privacy: Computers and the Internet Chapter 11 Part B

Disaster Recovery Hardware loss Can be replaced Temporarily diminished processing ability Software loss Industry standard – make backups of program files

Disaster Recovery Data loss Reassemble records Customer information Accounting data Design information Major costs and time

Disaster Recovery Plan Restoring computer processing operations and data files if operations are halted or files are damaged by major destruction

Disaster Recovery Plan Approaches Manual services temporarily Purchase time from a service bureau Mutual aid pack Two or more companies will lend each other computer power Problem if regional disaster

Disaster Recovery Plan Approaches Consortium Joint venture Complete computer system Routinely tested Used only if disaster Sites Hot site – fully equipped and environmentally controlled computer center Cold site – environmentally suitable empty shell

Disaster Recovery Plan Advance Arrangements Everything except hardware safely stored in geographically distant locations Program and data files (ie, the backup copies) Program listings Program and operating systems documentation Hardware inventory lists Output forms Copy of the disaster plan manual

Disaster Recovery Plan Includes Priorities for programs Plans for notifying employees List of needed equipment and where it is located Alternative computing facilities Procedures for handling input and output data Emergency Drills

Backup Why Backup? If you are not backing up your files regularly, you deserve to lose them. Average user experiences loss once a year

Backup What Can Cause Data Loss? Incorrect software use Input data incorrectly Software may harm data Hard disk malfunctions Accidentally delete files format c: – oops… Virus infection

Backup Methods Full backup Differential backup Incremental backup Media Diskette Tape Zip disk CD-R / CR-RW DVD Mirrored hard drive

Pests Invade the computer system and cause something unexpected to occur May interfere with function of PC

Worms Rare Transfers over a network Plants itself as a separate file on the targets computer

Viruses Illicit instructions that pass themselves on to other programs Benign Damaging to computer Digital vandalism

Viruses Vaccine or antivirus Stops the spread of and eradicates the virus Install software Download signature files (ie, updates) regularly

Viruses Retrovirus Fights the vaccine and may delete the antivirus software Costs Billions of dollars a year Aggravation to individual users

Virus Transmission Networks Diskettes

Virus Getting Infected Executing the virus program Booting from a diskette containing an infected boot sector including accidentally leaving a non- system disk in the floppy drive Downloading an infected file and executing it Opening an infected attachment Including M$ Word documents By viewing in some versions of Microsoft Outlook

Virus Precautions Be wary of free software from the Internet or friends Only install programs from diskettes in sealed packages Use virus-scanning software to check any file or document before loading it onto your hard disk

Privacy Where is my data? How is it used? Who sees it? Is anything private anymore? Everything about you is in at least one computer file

Privacy How Did They Get My Data? Loans Charge accounts Orders via mail Magazine subscriptions Tax forms Applications for schools, jobs, clubs Insurance claim Hospital stay Sending checks Fund-raisers Advertisers Warranties Military draft registration Court petition Wed just like a little information about you for our files…

Privacy How Did They Get My Data?

Privacy Legislation Fair Credit Reporting Act – 1970 Freedom of Information Act – 1970 Federal Privacy Act – 1974 Video Privacy Protection act – 1988 Computer Matching and Privacy Protections Act – 1988

Privacy Your Boss is Spying on You! Monitoring software Screens Keystrokes per minute Length of breaks What computer files are used and for how long Privacy groups want legislation requiring employers to alert employees that they are being monitored.

Privacy Monitoring by Web Sites Records: City Site you just left Everything you do while on the site Hardware and software you use Click stream Series of clicks that link from site to site History of what the user chooses to view

Privacy Monitoring by Web Sites Cookies Stores information about you Located on your hard drive Beneficial uses Viewing preferences Online shopping Secure sites retain password in cookie Controversial use Tracking surfing habits for advertisers Can set browser to refuse cookies or warn before storing Software available to manage cookies

Privacy P3P Platform for Privacy Preference Project Standards proposed by the World Wide Web Consortium (W3C) User sets privacy preferences Web server transmits privacy policies Software determines if web site meets users requirements Participation by web site is voluntary

Junk Cheaper than snail mail Spamming Sends messages to everyone Abandons the originating site

Junk Help eliminate junk Do not complete a member profile with online service Do not fill in registration forms unless the purveyor promises not to sell or exchange your information Never respond to spamming Use filter software States are beginning to provide laws banning unsolicited junk

Protecting Children Blocking software – high-tech chaperone Examine browser history to see what sites are visited Locate computer in a semipublic, high-traffic location of your home

Protecting Children Laws Communications Decency Act – 1996 Childrens Online Privacy Protection Act (COPPA) – 2000