Download presentation
Presentation is loading. Please wait.
Published byJocelyn Scott Modified over 9 years ago
1
COMPUTER Protection & PRIVACY ISSUES Selected examples using concepts from Computer Concepts by Pusins & Ambrose, South-Western Education Division, 2001 and IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.
2
Safeguarding Hardware & Data Computers are vulnerable to: –Power surges –Spikes in electric current –Power failures/outages A power spike can corrupt computer hardware, rendering it inoperable and making stored information inaccessible. A power outage can wipe out any data that has not been properly saved. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.
3
Safeguarding Hardware & Data Safeguarding computer systems from power outages would include: –Securing electric cords so that they cannot be accidentally disconnected –Installing an uninterruptible power source (UPS) –Using surge protectors –Saving active files frequently –Backing up important files regularly (even saved data can be lost or corrupted by equipment failure, software viruses or hackers, fire or flood, or power irregularities) Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.
4
Types of Computer Crimes Unauthorized use of a computer Infection of a computer by a malicious program (a virus) Harassment and stalking on the computer Theft of computer equipment Copyright violations of software Copyright violations of information found on the Internet Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
5
Computer Fraud Computer Fraud is the conduct that involves the manipulation of a computer or computer data in order to obtain money, property, or value dishonestly or to cause loss. Examples might include stealing money from bank accounts and stealing information from other people’s computers for gain. Managers/supervisors should be aware of signs that may be indicators of computer fraud: –Low staff morale: Unhappy staff members may decide the company “owes” them. –Unusual work patterns. –Staff members who appear to be living beyond their income. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.
6
Computer Hacking Involves invading someone else’s computer, usually for personal gain or just the satisfaction of invading someone else’s computer. Hackers are usually computer experts who enjoy having the power to invade someone else’s privacy. They can steal money or change or damage data stored on a computer. Hacking causes millions of dollars of damage each year. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
7
Computer Viruses Source: Computer Concepts – Basics (South-Western) A virus is a program that has been written, usually by a hacker, to cause corruption of data on a computer. The virus is attached to an executable file (like a program file) and spreads from one file to another once the program is executed. A virus can cause major damage to a computer’s data or it can do something as minor as display messages on your screen. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
8
Types of Computer Viruses A worm makes many copies of itself resulting in the consumption of system resources that slows down or actually halts tasks. Worms don’t have to attach themselves to other files. A time bomb is a virus that does not cause its damage until a certain date or until the system has been booted a certain number of times. A logic bomb is a virus triggered by the appearance or disappearance of specified data. A trojan horse is a virus that does something different from what it is expected to do. It may look like it is doing one thing while in actuality it is doing something quite opposite (usually something disastrous). Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
9
Types of Computer Viruses A password sniffer is a file that seeks out passwords on your computer, then sends them to a hacker. A blended threat is a program that combines characteristics of viruses, worms and Trojan horses.
10
Computer Virus Example CODE RED WORM CODE RED WORM – July, 2001 Infected hundreds of thousands of machines running Microsoft Internet Information Services. This virus would lie dormant for 20 days while the bug spread across the Web without doing harm. On the last day of its sleep cycle, the worm launched attacks on the White House and other government sites. The worm then mutated in an attempt to avoid detection and attacked again after the 20-day cycle. Source: www.ccn.com
11
Protection Against Virus Damage Use antivirus software. The software should always run on your computer and should be updated regularly. Be careful in opening e-mail attachments. It is a good idea to save them to disk before reading them so you can scan them. Don’t access files copied from floppy disks or downloaded from the Internet without scanning them first. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
12
Computer Security The use of passwords to restrict access to data The use of firewalls, which consist of special hardware and software The use of antivirus software to protect data on your computer The use of a very selective hiring process and careful screening of potential employees to prevent internal theft or sabotage Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
13
Privacy Issues Anytime you submit information on the Internet, it is possible for it to be gathered by many individuals and used for various situations. Information can also be gathered from online data regarding: -School -Banking -Hospitals -Insurance -Credit History, etc. If a company provides you with e-mail, the information you send is available to the company. The company can also monitor Internet logs to determine web sites that have been visited. Ambrose, Bergerud, Busche, Morrison, and Wells-Pusins: IC3 BASICS, Internet and Computing Core Certification, Thomson Course Technology, 2003.
14
Protection for Technology Injuries The Copyright Act of 1976: Protects the developers of software. Software Piracy and Counterfeiting Amending of 1983. Electronic Fraud and Abuse Act, 1986: Prohibits individuals without authorization from knowingly accessing a company computer to obtain records from financial communications. Computer Matching & Privacy Protection Act, 1988: Regulates how federal data can be used to determine whether an individual is entitled to federal benefits. Digital Millennium copyright Act of 1998: Prohibits people from defeating software encryption programs and other safeguards; makes the distribution of security-cracking illegal and imposes damages ranging from $200 to $2,500. Repeat offenders face criminal penalties of up to $1 million in fines or 10 years in jail. Many states have individual laws governing computer crimes in their states. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
15
Did You Know? The first computer crime, electronic embezzlement, was committed in 1958. The penalty for copying software can be up to $250,000, five years in prison, or both. A computer won a World Chess Championship game against a human. Pusins & Ambrose: Computer Concepts – Basics. South-Western Computer Education, 2001.
16
Ten Commandments of Computer Ethics 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people's computer ware. 3. Thou shalt not snoop around in other people's computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people's computer resources without authorization. 8.Thou shalt not appropriate other people's intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt use a computer in ways that demonstrate consideration and respect.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.