Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter Nine (Part 2).

Similar presentations


Presentation on theme: "Chapter Nine (Part 2)."— Presentation transcript:

1 Chapter Nine (Part 2)

2 Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion detection software Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Identify risks and safeguards associated with wireless communications Discuss ways to prevent health-related disorders and injuries due to computer use Discuss issues surrounding information privacy See Page 381 for Detailed Objectives Discovering Computers Fundamentals, 2011 Edition Chapter 10

3 Computer Security Risks
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. Security Risk Pages Figure 10-1 Discovering Computers Fundamentals, 2011 Edition Chapter 10

4 Internet and Network Attacks
An infected computer has one or more of the following symptoms: Operating system runs much slower than usual Available memory is less than expected Files become corrupted Screen displays unusual message or image Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly Unknown programs or files mysteriously appear System properties change Operating system does not start up Operating system shuts down unexpectedly Page 384 Discovering Computers Fundamentals, 2011 Edition Chapter 10

5 How a Virus Can Spread through an E-mail Message??
Virus hide in document & attach trough . Send to thousand of user around the world. Didn’t open the message by non recognize sender but immediately delete. No infected by virus. Infected with virus if open the attachment document. Page 385 Figure 10-2 Discovering Computers Fundamentals, 2011 Edition Chapter 10

6 Internet and Network Attacks
Pages 385 – 387 Figure 10-4 Discovering Computers Fundamentals, 2011 Edition Chapter 10

7 Internet and Network Attacks
Antivirus Program Page 386 Figure 10-3 Discovering Computers Fundamentals, 2011 Edition Chapter 10

8 Denials of Service Attacks - DoS Attacks
Internet and Network Attacks a group of compromised computers connected to a network (Internet) are used to attack others network. A compromise computers, known as a zombie (computer is being control by an outsider.) Botnets the purpose is to disrupt computer access to an Internet service (eg: Web/ ) The victim effected; network slow down, unresponsive or unavailable, blocking from accessing the network. Denials of Service Attacks - DoS Attacks a program or set of instructions in a program that allow users to bypass security controls. (Eg : accessing a program, computing or network) can modify an existing program include a back door to access the computer remotely without knowing by owner. Back Doors a technique intruders use to make their network or Internet transmission appear legitimate to victim computer or network. (Eg or IP Spoofing) Perpetrator will send spam, virus hoaxes or phishing scams and interact user uses the phony website (fake e.banking) Spoofing

9 Internet and Network Attacks
A firewall is hardware and/or software that protects a network’s resources from intrusion Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Firewalls below Chapter 10 Pages Figure 10-5 Discovering Computers Fundamentals, 2011 Edition Chapter 10

10 Internet and Network Attacks
Intrusion detection software Analyzes all network traffic Assesses system vulnerabilities (weakness) Identifies any unauthorized intrusions Notifies network administrators of suspicious behavior patterns or security breaches Page 389 Discovering Computers Fundamentals, 2011 Edition Chapter 10

11 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Exercise 1 Match the term with their definition? 1 The technique intruders use to make their network or Internet transmission appear to a victim computer or network. Classified of program that act without user’s knowledge to alter computer operations like virus, worm, Trojan horses and rootkits. The hardware and/or software that protects a network’s resources from intrusion. Whose purposely is to disrupt computer access to an Internet service. Spoofing Phishing 2 Firewall Malware DoS Attacks Spoofing 3 Malware Firewall 4 DoS Attacks Discovering Computers Fundamentals, 2011 Edition Chapter 10

12 Unauthorized Access and Use
Unauthorized access is the use of a computer or network without permission Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities Page 389 Discovering Computers Fundamentals, 2011 Edition Chapter 10

13 Unauthorized Access and Use
Access controls define who can access a computer, when they can access it, and what actions they can take Username & Password Possessed Objects Biometric Devices Two-Phase Process Identification Authentication Three method of Identification & Authentication Pages Figure 10-6 Discovering Computers Fundamentals, 2011 Edition Chapter 10

14 Unauthorized Access and Use
Method of Identification & Authentication Username & Password Username is a unique combination of characters and password is a private combination of characters. Some website use Completely Automated Public to Computers and Humans Apart (CAPTCHA) program to verifies user input. Possessed Object Any item that you must carry to gain access to a computer or computer facility. Example : cards (bank card), ID cards and keys (PIN). Personal Identification Number (PIN) provide an additional level of security. Biometric Device Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer. Example : fingerprint, hand geometry, face recognition, voice verification, signature, iris recognition and retinal scanners. Discovering Computers Fundamentals, 2011 Edition Chapter 10

15 Unauthorized Access and Use
Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks Many areas use digital forensics Law enforcement Criminal prosecutors Military intelligence Insurance agencies Information security departments Page 392 Discovering Computers Fundamentals, 2011 Edition Chapter 10

16 Exercise 2 T / F For each of the following statements, answer T for TRUE or F for FALSE. 1 Unauthorized access is the use of a computer or its data for unapproved or illegal activities. 2 ATM card is one of possessed object that allows access to your bank account. 3 Many system implement access controls using a phase process called identification or authentication. 4 Digital forensics involves the examination of computer media, programs, data and log files on component, server and network. 5 A CAPTCHA display a series of distorted characters and requires the user to enter the characters and this is one of identification technique.

17 Hardware Theft and Vandalism
Hardware theft is the act of stealing computer equipment Hardware vandalism is the act of defacing or destroying computer equipment Page 393 Discovering Computers Fundamentals, 2011 Edition Chapter 10

18 Hardware Theft and Vandalism
To help the reduce of chances of theft, companies and schools use a variety of security measures Physical access controls Alarm systems Cables to lock equipment Real time location system (RTLS) Passwords, possessed objects, and biometrics Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click RTLS below Chapter 10 Page 393 Figure 10-9 Discovering Computers Fundamentals, 2011 Edition Chapter 10

19 Wireless Security Wireless access poses additional security risks
About 80 percent of wireless networks have no security protection War driving allows individuals to detect wireless networks while driving a vehicle through the area A wireless access point should not broadcast a network name Change the default network name Configure a WAP so that only certain devices can access it Use WPA or WPA2 security standards Page 397 Discovering Computers Fundamentals, 2011 Edition Chapter 10

20 Health Concerns of Computer Use
The widespread use of computers has led to health concerns Repetitive strain injury (RSI) Tendonitis - Pain with movement of muscles and tendons Carpal tunnel syndrome (CTS) - numbness Computer vision syndrome (CVS) blur, headache etc Page 398 Figure 10-15 Discovering Computers Fundamentals, 2011 Edition Chapter 10

21 Health Concerns of Computer Use
Page 398 Figure 10-16 Discovering Computers Fundamentals, 2011 Edition Chapter 10

22 Health Concerns of Computer Use
Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace Page 399 Figure 10-17 Discovering Computers Fundamentals, 2011 Edition Chapter 10

23 Health Concerns of Computer Use
Computer addiction occurs when the computer consumes someone’s entire social life Symptoms of users include: Craves computer time Overjoy when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school Page 399 Discovering Computers Fundamentals, 2011 Edition Chapter 10

24 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Computer ethics are the moral guidelines that govern the use of computers and information systems Information accuracy is a concern Not all information on the Web is correct Page 399 – 401 Figure 10-19 Discovering Computers Fundamentals, 2011 Edition Chapter 10

25 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Spam is an unsolicited message or newsgroup posting filtering blocks messages from designated sources Anti-spam programs attempt to remove spam before it reaches your inbox Pages Figure 10-23 Discovering Computers Fundamentals, 2011 Edition Chapter 10

26 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Phishing is a scam in which a perpetrator sends an official looking message that attempts to obtain your personal and financial information Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing Page 405 Figure 10-24 Discovering Computers Fundamentals, 2011 Edition Chapter 10

27 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Privacy Law - The concern about privacy has led to the enactment of federal and state laws regarding the storage and disclosure of personal data See Figure on page 406 for a listing of major U.S. government laws concerning privacy. Page 406 Discovering Computers Fundamentals, 2011 Edition Chapter 10

28 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers to observe, record, and review an employee’s use of a computer Pages Discovering Computers Fundamentals, 2011 Edition Chapter 10

29 Discovering Computers Fundamentals, 2011 Edition Chapter 10
Ethics and Society Content filtering is the process of restricting access to certain material on the Web Many businesses use content filtering Web filtering software restricts access to specified Web sites Page 407 Figure 10-26 Discovering Computers Fundamentals, 2011 Edition Chapter 10

30 Objectives Overview Describe various types of network attacks, and identify ways to safeguard against these attacks, including firewalls and intrusion detection software Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Identify risks and safeguards associated with wireless communications Discuss ways to prevent health-related disorders and injuries due to computer use Discuss issues surrounding information privacy See Page 381 for Detailed Objectives Discovering Computers Fundamentals, 2011 Edition Chapter 10

31 Chapter Nine Chapter 9 Complete


Download ppt "Chapter Nine (Part 2)."

Similar presentations


Ads by Google