Computer Security, Ethics and Privacy Chapter 11.

Slides:



Advertisements
Similar presentations
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Advertisements

Computer Tech. What is an unsolicited message sent to many recipients Adware Spam Spyware Phishing here here Want to know how spam really.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
Computer Security and Safety, Ethics and Privacy
Discovering Computers 2008 Fundamentals Fourth Edition Chapter 10 Computer Security, Ethics, and Privacy.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Cyber check Do you work safely and responsibly online? Do you know about the risks to your cyber security? What are your online responsibilities ? How.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Teachers Discovering Computers Integrating Technology and Digital Media in the Classroom 7 th Edition Security Issues and Ethics in Education Chapter 8.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security & Safety
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Computer Security and Risks. Slide 2 Computer Security and Risks Beekman chapter includes: –Computer Crime –Security: Reducing Risks –Privacy, Freedom.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Security and Safety, Ethics, and Privacy
Security Advice Georgie Pepper Campsmount Acadamy.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 10 Computer Security, Ethics, and Privacy.
Technology in Action Chapter 7 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses.
Computer Security and Risks. “If the law doesn't fit reality anymore, law has to be changed. That’s not a new thing. That’s civilization as usual” Gilberto.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Ch 8: Security Issues, Ethics, and Emerging Technologies in Education
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Security Issues, Ethics, & Emerging Technologies in Education
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 10 Computer Security, Ethics, and Privacy.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Chapter TIK XII Science. DATABASE MANAGEMENT.
Chapter 11 Lecture 21: pp Computer Security, Ethics and Privacy.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Chapter 11 Objectives Describe the types of computer security risks
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Avoiding viruses and malware A quick guide. What is malware?  A virus and malware are the same thing  Spyware  Worm  Trojan  Virus.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
What is a Virus? A computer virus is like a little program that can copy and paste itself onto other computers and infect them, getting rid of documents.
Internet Safety Piotr Hasior Introduction Internet Safety Internet safety, or online safety, is the knowledge of maximizing the user's personal safety.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Security and Ethics Safeguards and Codes of Conduct.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Antivirus Software Technology By Mitchell Zell. Intro  Computers are vulnerable to attack  Most common type of attack is Malware  Short for malicious.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Protect Your Computer Against Harmful Attacks!
Computer Technology Notes 5
Chapter Nine (Part 1).
Computer Security, Ethics and Privacy
Chapter 10 Computer Security, Ethics, and Privacy
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
Computer Security, Ethics and Privacy
Chapter # 3 COMPUTER AND INTERNET CRIME
Presentation transcript:

Computer Security, Ethics and Privacy Chapter 11

Computer Security Risk Computer Crime Computer Crime CyberCrime CyberCrime Hacker Hacker Cracker Cracker Script Kiddie Script Kiddie Cyberextortionist Cyberextortionist Cyberterrist Cyberterrist

Internet Attacks Computer viruses Computer viruses Computer program that affects the way a computer works without permission or knowledge of the owner Computer program that affects the way a computer works without permission or knowledge of the owner Can damage files and system software Can damage files and system software Computer worms Computer worms Copies itself repeatedly, causing a network to clog and go down Copies itself repeatedly, causing a network to clog and go down Trojan Horses Trojan Horses Hides within a legitimate program Hides within a legitimate program Condition or action triggers the Trojan horse Condition or action triggers the Trojan horse Does not replicate itself Does not replicate itself

How Should Virus Authors Be Punished?????

How long is an Unprotected Computer safe from Intruders? A – 10 minutes A – 10 minutes B – 20 minutes B – 20 minutes C – 30 minutes C – 30 minutes D – 5 minutes D – 5 minutes

How to Safeguard Yourself Only use trusted sources Only use trusted sources Use Anti-Virus programs Use Anti-Virus programs McAfee McAfee Norton Norton AVG AVG Kapersky Kapersky Spyware Blocker Spyware Blocker

Virus Terminology Virus Signature Virus Signature Virus Definition Virus Definition Inoculate Inoculate Quarantine Quarantine Virus Hoax Virus Hoax

Denial of Service Attacks Designed to overload a server until it crashes Designed to overload a server until it crashes Examples???? Examples????

Back Doors Bypassing Security systems already in place Bypassing Security systems already in place Usually install a program or modify one to meet their needs Usually install a program or modify one to meet their needs Spoofing – transmission appears to be harmless Spoofing – transmission appears to be harmless

Firewalls Hardware and/or software Hardware and/or software Use controls and passwords Use controls and passwords

Passwords The last word in passwords! The last word in passwords! Check out Chart on page 567 Check out Chart on page 567 PINs PINs Biometric Devices Biometric Devices

Hardware Theft and Vandalism Backup Backup

Software Theft Apple vs Microsoft Apple vs Microsoft

Safeguards Against Software Theft Restricting who can load software Restricting who can load software Use or loose the license agreement Use or loose the license agreement

What NOT to DO! Install the software on a network, such as a school computer lab Install the software on a network, such as a school computer lab Give copies to friends and family while continuing to use the software Give copies to friends and family while continuing to use the software Export the software Export the software Rent or lease the software Rent or lease the software