Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011

Similar presentations


Presentation on theme: "Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011"— Presentation transcript:

1 Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
Chapter 10 in Computing Essentials 2011

2 Issues with Computer Privacy
Privacy Issues Accuracy Property Access

3 Large Databases Large organizations are constantly compiling data
Personal Information, websites visited, user information, etc. Information Resellers (Information Brokers) collect and sell personal data

4 Personal Information is a marketable commodity
Companies can spread information without your personal consent. Identity theft is the illegal assumption of someone's identity for purposes of economic gain. Information Inaccuracies can lead to many issues (Credit reports, background checks, etc.) Freedom of Information Act entitles you to look at your records from government agencies.

5 Private Networks Most companies conduct business and daily work operations within a private network. They are entitled to go through ANY and ALL information within that network. Some companies use snoopware to monitor employee computer activities. Companies have the right to explore and search through company s.

6 Tips to Prevent Identity Theft
Never give out personal information online. ESPECIALLY in response to an . Phishing is used to describe dishonest s that are sent to try to get you to disclose your account information. 2. Only do online business with large corporations that you know are legitimate with solid reputations. 3. Make sure to remove all personal information from a computer before selling or disposing of it. 4. Check your credit reports to verify information and account activities.

7 Internet and Web Security
Illusion of Anonymity- The idea most people have that little can be done to their personal privacy if they are selective about sharing information. IP Addresses History File-Locations of sites visited by your computer Cookies –Small pieces of information that are deposited on your hard disk from Websites you have visited.

8 How To Delete Internet Browsing and Cookie Information
-Internet Explorer -Chrome -Firefox

9

10 Delete Bro

11

12 How To Run a Disk CleanUp

13 Traditional Cookies provide information on a single site.
Ad network or adware cookies record your activities across different sites. Spyware- wide range of programs that are designed to secretly record and report an individuals activities on the Internet Web bugs- small images or HTML code hidden within an message Keystroke loggers record every activity and keystroke made on your computer system

14 Computer Criminals Employees Outside Users
Hackers- people who create or improve programs to share with others Crackers- create and share programs designed to gain unauthorized access to computers or disrupt networks Organized Crime members Terrorists

15 Malicious Programs Viruses- programs that migrate through networks and operating systems that can alter or delete files. Creation or spreading of viruses is punishable under the Computer Fraud and Abuse Act Worms- special type of virus that fills a computer with self-replicating information so that the computer is drastically slowed or stopped. Trojan Horses- Programs that come into a computer disguised as something else.

16 Zombies Computers that are infected by a virus, worm, or Trojan horse that allow them to be remotely controlled for malicious purposes. Botnet/ Robot Network is a collection of zombie computers that use their combined powers to crack passwords and send spam e- mails. Capcha

17

18

19 Denial of Service Attack (DoS) attempts to slow down or stop a computer system or a network by flooding a computer/network with requests for information and data. Sites/networks become overwhelmed with requests, cannot respond to legitimate users, and shut down. Internet Scams- Fraudulent or deceptive act or operation to trick individuals into providing personal information or spending their time or money Phishing Theft of hardware, software, data, or computer time Data manipulation

20 Common Internet Scams Identity Theft Chain Letters Auction Fraud
Vacation Prize Advance Fee Loans

21

22

23

24

25 Online Identity Information you provide to others online
The identity you create online- address, user names, etc.

26 Privacy Laws Gramm-Leach-Bliley Act protects personal financial information Health Insurance Portability and Accountability Act (HIPAA) protects medical records Family Educational Rights and Privacy Act (FERPA) restricts disclosure of educational records.

27 Protecting Computer Security
Restricting Access Strong passwords that are changed often Firewalls Data Encryption Virtual Private Networks (VPN) Anticipating Disaster

28 Guidelines for morally acceptable use of computers in our society
Computer Ethics Guidelines for morally acceptable use of computers in our society

29 Software piracy- unauthorized copying and distributing of software
Copyright gives content creators the right to control their work and to get financial gain from their work. You break copyright laws when you unlawfully copy music or movies Software piracy- unauthorized copying and distributing of software Digital Millennium Copyright Act established the rights of a software owner to make copies for personal use Plagiarism- Using other’s work or ideas as your own


Download ppt "Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011"

Similar presentations


Ads by Google