Download presentation
Presentation is loading. Please wait.
Published byAmi Waters Modified over 9 years ago
1
Chapter 11 – Section 4-5
2
Techniques use to Access the network War Driving or access point mapping ▪ Individuals attempt to detect wireless network via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network War Flying ▪ Use airplanes instead of vehicle to detect unsecured wireless network
3
How can I ensure my wireless communication is secure? Firewalls Secure your wireless access point (WAP) WiFi Protected Access (WPA) Authenticate network users and provide advanced encryption techniques 802.11i (WPAs) Conforms to the government security standards and uses more sophisticated encryption techniques the WPA
4
What are some health concerns of computer use? Computer vision syndrome (CVS) eye and vision problems Computer addiction-when computer consume entire social Tendonitis – inflammation of a tendon due to repeated motion Carpal tunnel syndrome – inflammation of the nerve that connects the forearm to the palm Repetitive strain injury (RSI) Injury or disorder of the muscles, nerves, tendons, ligaments, and joints
5
What precautions can prevent tendonitis or carpal tunnel syndrome? Spread fingers apart for several seconds while keeping wrist straight Gently push back fingers and then thumb Dangle arms loosely at sides and shake arms and hands
6
What is Ergonomics? An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
7
What are computer ethics? Moral guidelines that govern use of computers and information systems Unauthorized use of computer &Networks Intellectual property rights Codes of conduct Information privacy Information accuracy Software theft (piracy) Green Computing
8
What is information accuracy? Accuracy of computer input Altering photo National Press Photographer Association oppose
9
What are intellectual Property (IP) and Intellectual property rights? Intellectual Property ▪ Refer to unique & original work such as ideas, inventions, art, writing, processes, company and product name and logos. Intellectual Property Rights ▪ The rights to which creators are entitled for their work
10
What is an IT code of conduct? Written guideline that helps determine whether computer action is ethical Employers can distribute to employees IT Code of Conduct 1.Computer may not be used to harm other people. 2.Employee may not interfere with other’s computer work. 3.Employees my not meddle in other’s computer files. 4.Computers may not be used to steal 5..Computers may not be used to bear false witness. 6.Employees may not copy or use software illegally. 7.Employees may not use others’ computer resources without authorization 8. Employees may not use others’ intellectual property as their own. 9.Employees shall consider the social impact of program and systems they design. 10.Employees always should use computers in a way that demonstrates and respect for fellow humans.
11
What is Green Computing? Involves reducing the electricity and environmental waste while using a computer. ENERGY STAR program ▪ Develop by US Department of Energy and US Environmental Protection Agency (EPA) ▪ Help reduce the amount of electricity used by computer and related devices
12
What is Information Privacy? Right of individual and companies to deny or restrict the collection and use of information about them Difficult to maintain today because data is stored online
13
What is an electronic profile? Data collected when you fill out forms on the Web Merchant sell your electronic profile Often you can specify whether you want personal information distributed
14
What is a Cookie? Small text file on your computer that contains data about you Set browser to accept cookies, prompt you to accept cookies or disable cookies Some Web sites sell or trade information stored on your cookie User Preferences How regularly you visit Web site Interest and browsing habits
15
What is Spam? Unsolicited e-mail message or newsgroup, posting sent to many recipients or newsgroups at once. Internet Junk mail
16
How can you control spam? E-mail filtering Anti-spam program Service that blocks email messages from designated source Attempts to remove spam Collects spam in central location that you can view anytime Sometimes removes valid email messages
17
What is Phishing and Pharming? Phishing Scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and financial information Pharming Similar as phishing but they attempts to obtain your personal and financial information through spoofing
18
What are Spyware and Adware? Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user Adware is a program that displays an online advertisement
19
Some Privacy laws that have been enacted 1970 Fair Credit Reporting Act Limits the right of other viewing a credit report to only those with a legitimate business need. 1984 Computer Fraud and Abuse Act Outlaws unauthorized access of federal government computers 1998 Children’s Online Privacy Protection Act (COPPA) Requires Web sites protect personal information of children under 13 years of age
20
What is Social Engineering? Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and naivety of other
21
What is Employee Monitoring? Involves the use of computers to observe, record, and review an employee’s use of a computer
22
What is content filtering? Process of restricting access to certain material Internet Content Rating Association (ICRA) provides rating system of Web content Web filtering software restricts access to specific sites
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.