Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.

Slides:



Advertisements
Similar presentations
Unit 6 Digital Literacy Study S3 Obj 1
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
UNIT 6 DIGITAL LITERACY STUDY S3 OBJ 1 VIRUSES & DESTRUCTIVE PROGRAMS.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Computer Virus - this is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
SECURITY CHECK Protecting Your System and Yourself Source:
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Summary Notes TERM TWO BASIC SEVEN 7 Prepared by Sir Lexis Oppong Prepared by Sir Lexis Oppong ACADEMIC YEAR 2013/2014 ACADEMIC YEAR 2013/2014.
Viruses & Destructive Programs
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Data Security GCSE ICT.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Viruses.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Your Interactive Guide to the Digital World Discovering Computers 2012.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Virus and Antivirus Team members: - Muzaffar Malik - Kiran Karki.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
Topic 5: Basic Security.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Skills and Applications Computer Security.
W elcome to our Presentation. Presentation Topic Virus.
Security and Ethics Safeguards and Codes of Conduct.
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues & Ethics in Education By Maud Mushayamunda.
Identity Theft: Protect Yourself Ronald J. Leach.
Computer Security Keeping you and your computer safe in the digital world.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Ethics.
Part 3.
Computer Security.
Presentation transcript:

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes

 A virus is a program that attach itself in a real program. It can corrupt and destroy a computer system without the user notice. The viruses can replicate themselves to infect other systems. How do viruses spread? A piece of software that contain virus (called host program) someone share the program ( , Floppy Disk, CD-Rom) The virus will copied to that computer. The software in the computer will be inflected Home

 The virus will hide in the computer for weeks or even months. It lead us can't detect the viruses immediately. Characteristic:  A virus usually is activated as soon as a program or file is used or at the specific times.  The virus code will often display a message letting you know that the virus has done its damage. Some types of viruses exist now: boot sector viruses, file viruses, macro viruses. Home

 Hardware theft present a difficult security challenge.  It means that someone stole the hardware of the computer, for example:  Hardware theft usually exists in large companies or schools.  In the case of desktop and larger computers at home, hardware theft generally is not a problem. Home CPU, RAM, Hard Disk etc

 Software theft can take many forms-- from someone physically stealing a DVD-ROM, CD-ROM, or floppy disk to intentional piracy of software.  Software piracy is the unauthorized and illegal duplication of copy-righted software, which is the most common form of software theft. That means without Software License.  Download or use illegal software from the web or CDs. Home

 Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.  It can range from a student send personal by school computer to someone gaining access to a bank computer and performing an unauthorized transfer.  Hackers are the one who try to break into a computer with the intention of stealing or corrupting its data. Home

Information theft typically occurs for a variety of reasons: e.g. An organization stealing or buying stolen information to learn about its competitor. Someone steal others’ credit card information to make purchases on the web. Information theft often involves the data privacy issue and is linked to other types of computer crimes.

Computer viruses: Destroy or corrupt data stored in the infected computer. The symptom or damage caused by a virus can be harmless or cause significant damage, as planned by the creator. Then, your computer may hang or even can't be used. Hardware theft: It will cause the loss of properties -> money. Then, Your computer can't run properly. Home

Software theft:  Using illegal Software will increase the chance of viruses infection.  Poor quality of software and reduces your ability to receive technical support from the software producer.  Drives up the price of original software for all users. Unauthorized use by hackers and Information Theft: Your information, data, programs will be stolen. you will loss your privacy … Home`

Computer Viruses  Use the anti-virus program to check and remove viruses in your computer regularly.  Update the anti-virus list regularly.  Scanning all floppy disk, downloaded programs by anti-virus program.  Back up files regularly  Check all downloaded programs for virus and do not open the s come from an unknown source. Methods to safeguard computer systems

Hardware theft  Install additional physical security devices such as alarm system that lock the equipment in a room.  Common sense and a constant awareness of the risk are the best preventive measures against theft of laptop computer and other equipment.  Physical access controls,such as locked doors,windows usually are adequate to protect the equipment. Methods to safeguard computer systems

Software Theft  To reduce software piracy, “educate the users to respect the original creation, don’t use pirated software.” is important.  Using software with license Methods to safeguard computer systems

Unauthorized Access of Hackers  Access control is a security measure that defines who can access a computer,when and what they can take while accessing the computer. Two techniques are used: Identification----verifies that you are a valid user by Setting Password to log in the computer system. Authentication----verifies that who you are ( Giving Authority) and the user right. SSet up Fire-wall in network servers to prevent unauthorized access to the computer network. Methods to safeguard computer systems

Information theft Encryption is one way to protect sensitive data. Sender will convert data to codes which are unreadable and the receiver must get the password and key in order to convert the codes back to meaningful data. Methods to safeguard computer systems

 Do not open / download files from an unknown source on the internet.  Do not disclose your account and passwords to others.  Log out the computer network when you leave.  Use the copyrighted software and do not install illegal software.  Do not steal the hardware of the computer. Home