1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.

Slides:



Advertisements
Similar presentations
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Computer Security and Safety, Ethics and Privacy.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer Security and Safety, Ethics and Privacy
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers & Microsoft Office 2010 Discovering Computers Chapter 5.
Physical Security Logical/Computer Security What other examples?
Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion.
Your Interactive Guide to the Digital World Discovering Computers Part 10 Manage Computing Securely, Safely and Ethically.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security Issues and Ethics in Education
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security & Safety
Living in a Digital World Discovering Computers 2010.
Discovering Computers Fundamentals, 2012 Edition Living in a Digital World.
Living in a Digital World Discovering Computers 2011.
Security Issues and Ethics in Education
Discovering Computers 2010
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Chapter 11 Computer Security and Safety, Ethics, and Privacy.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Your Interactive Guide to the Digital World Discovering Computers 2012.
C OMPUTER C ONCEPTS Unit 1 Concept 3 – Solving Technological Problems.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Discuss techniques to prevent unauthorized computer access and use
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues and Ethics in Education
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Your Interactive Guide to the Digital World Discovering Computers 2012 Lecture -13.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter TIK XII Science. DATABASE MANAGEMENT.
history, hardware, software, safety, and computer ethics
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
Living in a Digital World Discovering Computers 2010.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
1 Chapter 10 Security, Safety, Ethics, & Privacy.
Topic 5: Basic Security.
Living in a Digital World Discovering Computers 2011.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Your Interactive Guide to the Digital World Discovering Computers Manage Computing Securely, Safely, and Ethically Chapter Eleven.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Discuss techniques to prevent unauthorized computer access and use
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Discovering Computers Fundamentals, 2010 Edition Living in a Digital World.
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter Nine (Part 1).
Computer Security, Ethics and Privacy
Computer Security, Ethics and Privacy
Objectives Overview Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators Describe various types of Internet.
Presentation transcript:

1 COMPUTER SECURITY AND ETHICS Chapter Five

Computer Security Risks 2

A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability A cybercrime is an online or Internet-based illegal act 3 HackersCrackersScript KiddiesCorporate Spies Unethical Employees CyberextortionistsCyberterrorists

Internet and Network Attacks Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises 4 Computer Virus Affects a computer negatively by altering the way the computer works Worm Copies itself repeatedly, using up resources and possibly shutting down the computer or network Trojan Horse A malicious program that hides within or looks like a legitimate program Rootkit Program that hides in a computer and allows someone from a remote location to take full control

Internet and Network Attacks An infected computer has one or more of the following symptoms: 5 Operating system runs much slower than usual Available memory is less than expected Files become corrupted Screen displays unusual message or image Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly

Internet and Network Attacks Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections 6

Internet and Network Attacks A firewall is hardware and/or software that protects a network’s resources from intrusion 7

Unauthorized Access and Use Unauthorized access is the use of a computer or network without permission Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities 8

Unauthorized Access and Use Organizations take several measures to help prevent unauthorized access and use – Acceptable use policy – Disable file and printer sharing – Firewalls – Intrusion detection software 9

Unauthorized Access and Use Access controls define who can access a computer, when they can access it, and what actions they can take – Two-phase processes called identification and authentication 1) User names and Passwords 10

Unauthorized Access and Use 2) A possessed object is any item that you must carry to gain access to a computer or computer facility – Often are used in combination with a personal identification number (PIN) 3) A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer 11

Hardware Theft and Vandalism Hardware theft is the act of stealing computer equipment Hardware vandalism is the act of defacing or destroying computer equipment 12

Software Theft Software theft occurs when someone: 13 Steals software media Intentionally erases programs Illegally copies a program Illegally registers and/or activates a program

Software Theft Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law Some software requires product activation to function fully 14

Information Theft Information theft occurs when someone steals personal or confidential information Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access 15

Backing Up – The Ultimate Safeguard A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed (To back up a file means to make a copy of it). Offsite backups are stored in a location separate from the computer site. A growing trend is to use cloud storage as an offsite location. In the case of system failure or the discovery of corrupted files, you restore the files by copying the backed up files to their original location on the computer. 16 Cloud Storage

Wireless Security Wireless access poses additional security risks In additional to using firewalls, some safeguards improve security of wireless networks: 17 Configure network so that only certain devices can access it Use wireless security standards

Ethics and Society Computer ethics are the moral guidelines that govern the use of computers and information systems. Information accuracy is a concern (not all information on the Web is correct). A copyright protects any tangible form of expression. Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them 18

Ethics and Society 19

Examples for discussion with students 20 Example1: Plagiarism Scenario Samia is a married Master student and works full time. She had to submit a report but she doesn’t have time to write it. She purchased report and submitted it as her own work. Is it ethical to deceive her professor? Example 2: Anti-Worm Scenario August 2003: Blaster worm infected thousands of Windows computers. Soon after, Nachi worm appeared to locate and destroy copies of Blaster. Is it legal to write a helpful worm that removes a harmful worm from infected computers

Examples for discussion with students 21 Example 3: DVD Rental Scenario Ahmad owns chain of DVD rental stores. He collects information about customers and constructs and sells these profiles. Was Ahmad wrong to sell information without asking for permission? Other examples: Copying the content of CDs and DVDs. Penetrate Israeli websites (What about Palestinian ones?!). Using neighbors’ wireless internet.