Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A.

Slides:



Advertisements
Similar presentations
Understanding Computers: Today and Tomorrow, 13th Edition Chapter 9: Network and Internet Security.
Advertisements

Today and Tomorrow 12 th Edition Understanding Computers Chapter 9 Network and Internet Security.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Crime and Security in the Networked Economy Part 4.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Network and Internet Security and Privacy.  Explain network and Internet security concerns  Identify online threats.
Network and Internet Security
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS SECTION 4.1.
4-1 Chapter Four Overview SECTION ETHICS –Ethics –Information Ethics –Developing Information Management Policies –Ethics in the Workplace SECTION.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Discovering Computers 2010
Chapter 9: Network and Internet Security. Overview This chapter covers: – Security concerns stemming from the use of computer networks and the Internet.
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Discovering Computers 2008 Chapter 11 Computer Security, Ethics and Privacy.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Chapter 4 Computers and Security. Why Should I Be Concerned About Computer Security? YOU may be affected in a negative way.
Chapter 9: Securing Your Network and Internet Connections.
Security. If I get 7.5% interest on $5,349.44, how much do I get in a month? (.075/12) = * 5, = $ What happens to the.004? =
9 Network and Internet Security CHAPTER TODAY AND TOMORROW
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Today and Tomrrow 12 th Edition Understanding Computers Chapter 9 Network and Internet Security.
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Securing Information Systems
Network and Internet Security Chapter 9. 2 Why Be Concerned about Network and Internet Security?  Crime: Illegal activity  Computer crime (cybercrime):
Protecting People and Information: Threats and Safeguards
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
CHAPTER 3 Information Privacy and Security. CHAPTER OUTLINE  Ethical Issues in Information Systems  Threats to Information Security  Protecting Information.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
BUSINESS B1 Information Security.
Networks and Security Monday, 10 th Week. Types of Attacks/Security Issues  Viruses  Worms  Macro Virus  Virus  Trojan Horse  Phishing 
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
C8- Securing Information Systems
IT Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Management Information Systems Chapter Eight Securing Information Systems Md. Golam Kibria Lecturer, Southeast University.
BY: CHASIDY TUCKER Digital Citizenship Project. Plagiarism Pass off ideas of others without crediting the source.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
Dimeji Ogunshola 10b  There are many threats to your computer system. The computer threats can be mainly transferred through unknown s or accidental.
Prepared by Natalie Rose1 Managing Information Resources, Control and Security Lecture 9.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
Chapter 5 Digital Safety and Security Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Security Distributed Systems Lecture # 14. Why care about security? Authentication Use another person’s ID for sending Non-repudiation E-commerce.
Network and Internet Security
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 11 Manage Computing Securely, Safely and Ethically.
Cybersecurity Test Review Introduction to Digital Technology.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
E-Commerce & Bank Security By: Mark Reed COSC 480.
ESTABLISHING AND MANAGING IT SECURITY Prepared by : Siti Mahani Mahmud Yong Azua Mat Zaliza Azan.
Definition s a set of actions taken to prevent or minimize adverse consequences to assets an entity of importance a weakness in the security system to.
CHAPTER 10 Digital Security Copyright © Cengage Learning. All rights reserved.
Information Systems Design and Development Security Precautions Computing Science.
Information Technology Security Office of the Vice President for Information Technology New Employee Orientation II.
Securing Information Systems
Chapter 17 Risks, Security and Disaster Recovery
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
– Communication Technology in a Changing World
ISNE101 Dr. Ken Cosh Week 13.
Presentation transcript:

Ch9QQ T F 1.Hacking is an example of unauthorized access. T F 2.A Trojan horse is a type of malware that masquerades as another type of program. T F 3.A password is a type of possessed object. T F 4.With public key encryption, both the sender and receiver need to agree on a single password. T F 5.Digital certificates can be used to authenticate Web sites.

Ch9QQ __ 6. Which of the following is an example of a biometric device? a. password b. firewall c. personal PIN d. smart card reader e. hand geometry reader __ 7. To ensure that an message or file came from the designated individual and was not tampered with during transmission, you should use which of the following? a. firewall b. digital signature c. antivirus program d. encryption e. surge protector

Ch9QQ a. hacking b. phishing c. identity theft d. cyberstalking e. denial of service attack ___ 8. Where an individual receives threats or harassing behavior via the Internet. ___ 9. When someone impersonates another individual to buy goods or services. ___ 10. When someone sends a spoofed message in hopes of obtaining personal information that can be used in fraudulent activities.