Download presentation
Presentation is loading. Please wait.
Published byScot Preston Modified over 9 years ago
1
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video Last Class: Power Point Tutorial 1: Creating a Presentation Last Class: Power point Tutorial 2: Applying and Modifying Text and Graphic Objects Chapter 4 in Computers and Technology in a Changing Society: Computers and Security Agenda for Next Class Chapter 21
2
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Last Class Power Point is a powerful presentation graphics program Power Point can be used to create 35 mm slides, on- screen slides, and color overheads Slide Show view fills the screen and is used to present the slide to an audience Outline tab displays the titles and text of each the slides The notes pane contains any notes that you might prepare on each slide Footers are useful for displaying date, time, slide numbers and so on, on all slides Power Point wizards help you to quickly develop effective presentations Chapter 22
3
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 43 Computers and Security Microsoft Windows Security Hole Microsoft Windows Security Hole Chapter 4
4
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 44 Objectives 1.Explain why all computer users should be concerned about computer security. 2.Discuss security concerns related to unauthorized access, unauthorized use, and computer sabotage and suggest some possible safeguards for these concerns. 3.Name several types of dot cons and explain some precautions users can take. 4.List some risks associated wit hardware theft, damage, and system failure and understand ways to safeguard a PC against these risks.
5
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 45 Objectives (cont’d) 5.Define software piracy and digital counterfeiting and explain how they may be prevented. 6.Understand some personal safety risks associated with Internet use and some precautions individuals can take. 7.Give some examples of computer crime legislation.
6
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 46 Why Be Concerned About Computer Security? All computer users should be aware of security concerns such as computer viruses and hacking. Many computer security concerns today can be categorized as computer crimes. A computer crime (cybercrime) includes any illegal act involving a computer.
7
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 47 Unauthorized Access and Use, and Computer Sabotage Unauthorized access – when an individual gains access to a computer or computer resource without permission. Unauthorized use – using a computer resource for unapproved activities. Organizations typically use codes of conduct to explain acceptable computer use to their authorized users.
8
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 48 An Example of a Code of Conduct Figure 4-1
9
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 49 Hacking Hacking – the act of breaking into a remote computer system, often via the Internet or a wireless network. The person doing the hacking is called a hacker. The motivation to hack is often to steal information, sabotage a computer system, hijack a PC, or perform some other type of illegal act. Hacking is considered a very serious threat to our nation’s security.
10
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 410 Interception of Communications Criminals can also gain access to data as it is being sent over the Internet. Intercepted data can be read, altered, or used for illegal purposes, such as credit card fraud or identity theft. Wireless (such as Wi-Fi) networks are inherently less secure than wired networks, so interception is easier.
11
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 411 Computer Sabotage Computer sabotage – an act of malicious destruction to a computer or computer resource. Common types include: ▪ Computer viruses and other types of malware. ▪ Denial of service (DoS) attacks. ▪ Data or program alteration.
12
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 412 Computer Viruses Computer virus – a small software program installed without the permission or knowledge of the user that is designed to alter the way a computer operates. Viruses can be downloaded from the Internet or sent via e-mail. Most viruses are programmed to harm the PCs they infect, such as delete files or slow down the PC, or to gain control of the PC for illegal purposes.
13
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 413 How a Computer Virus Might Spread Figure 4-3
14
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 414 Other Types of Malware Computer worm – similar to a virus but does not infect other files to replicate itself; it sends copies of itself instead. ▪ Spread very rapidly. Trojan horse – masquerades as a legitimate program, but does its damage when the program is run. Common to use the term “virus” to refer to any type of malware.
15
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 415 Denial of Service Attacks Attempts to flood a network or Web server with so many requests that it shuts down. Often uses multiple PCs, a distributed denial of service (DDos) attack; PCs are often zombies. Very expensive; often listed as the most expensive type of computer crime.
16
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 416 How a Denial of Service Attack Might Work Figure 4-4
17
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 417 Data or Program Alteration Figure 4-5 Can change data or programs on a computer. Web site defacement is increasingly used to draw attention to a hacker or a specific cause.
18
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 418 Protecting Against Unauthorized Access and Use, and Computer Sabotage Many security risks can be reduced or eliminated by controlling access to facilities and computer systems. ▪ Identification systems – verify the person requesting access is listed as an authorized user, but can’t tell if the person is really the individual he or she claims to be. ▪ Authentication systems – verify the person requesting access is who she or he claim to be. Access systems can use possessed knowledge, possessed objects, or biometrics.
19
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 419 Possessed Knowledge Access Systems Possessed knowledge access system – requires the individual requesting access to provide information that only the authorized user is supposed to know. ▪ Passwords, usernames, PINs It is important to select good passwords and change them frequently. One disadvantage is that the knowledge can be forgotten or used by an unauthorized individual.
20
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 420 Password Strategies Figure 4-6
21
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 421 Possessed Object Access Systems Possessed object access systems – use physical objects for identification purposes. Common types of possessed objects: ▪ Smart cards ▪ Encoded badges ▪ Magnetic cards One disadvantage is that the object can be lost or used by an unauthorized individual. Figure 4-7
22
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 422 Biometric Access Systems Biometric access systems use biometric readers to identify users by a particular unique biological characteristic. Are increasingly being used to control access to facilities, as well as computer systems. Very accurate and convenient.
23
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 423 Biometric Access Systems Fingerprint scanners ▪ Easy to use and inexpensive. ▪ Requires contact with scanner. Figure 4-8
24
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 424 Biometric Access Systems Hand geometry readers ▪ Easy to use. ▪ Requires contact with scanner; fairly expensive. Figure 4-8
25
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 425 Biometric Access Systems Face readers ▪ Requires no contact with scanner and can be used without the person’s cooperation. ▪ Lighting and disguises may affect the results; fairly expensive. Figure 4-8
26
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 426 Biometric Access Systems Iris scanners ▪ Easy to use and requires no contact with scanner. ▪ Lighting may affect results; expensive. Figure 4-8
27
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 427 Firewalls and Antivirus Software A firewall is a security system that acts as a protective boundary between a computer network and the outside world. Protects against unauthorized incoming and outgoing activities. Figure 4-8
28
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 428 Firewalls and Antivirus Software Antivirus software should be installed to protect against becoming infected with a computer virus or other type of malware. Should scan all incoming e-mail messages and downloaded files, as well as the entire PC on an ongoing basis. Figure 4-10
29
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 429 Firewalls and Antivirus Software Antivirus software should be updated regularly. Additional common sense tips can help prevent virus infections. Figure 4-11
30
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 430 E-Mail and File Encryption Encryption – a technique used to secure e-mail messages or other documents sent over the Internet. Encrypted files cannot be understood until they are decrypted. The two most common types of encryption are: ▪ Private key encryption. ▪ Public key encryption.
31
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 431 E-Mail and File Encryption Private key encryption (symmetric key encryption) Uses a single key (password) to both encrypt and decrypt the file. If used to send documents to others, both the sender and the recipient need to know the key. Often used by an individual to encrypt files stored on a hard drive.
32
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 432 E-Mail and File Encryption Public key encryption (asymmetric key encryption) Uses two keys: One to encrypt the file and one to decrypt the file. Keys are related and assigned to an individual. The recipient’s public key is not secret and is used by the sender to encrypt files sent to the recipient. The recipient’s private key is secret and is used by the recipient to decrypt files sent to that individual.
33
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 433 An Example of Public Key Encryption Figure 4-12
34
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 434 E-Mail and File Encryption Web-based encrypted e-mail – encrypted e-mail is sent and retrieved via a secure server. ▪ Don’t need to know keys, just the password to your encrypted e-mail account. ▪ Some servers require both the sender and recipient to be subscribers. Various strengths of encryption, from weak 40-bit encryption to military-strength 2,048-bit encryption.
35
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 435 Secure Web Servers Secure Web server – protected against unauthorized access and encrypts data going to and coming from the server. ▪ All e-commerce transactions should be performed on a secure server. ▪ Looks for a locked padlock and a URL that begins with https: Figure 4-14
36
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 436 Virtual Private Networks (VPNs) Virtual private network (VPN) – provides a continuous secure private tunnel from the user’s computer through the Internet to the business’s network. Use public infrastructure, so not cost prohibitive. Can provide a secure environment to a large geographical area.
37
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 437 Wi-Fi Security Wi-Fi security standards include: ▪ WEP (Wired Equivalent Privacy) ▪ WPA (Wi-Fi Protected Access) ▪ WPA2 (802.11i) is the newest standard. Important to enable security features, since most are switched off by default.
38
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 438 Online Theft, Fraud, and Other Dot Cons Dot cons – A booming area of computer crime that involves online theft, fraud, scams, and related activities. Data or information theft includes: ▪ Stolen customer or proprietary corporate data. ▪ Stolen credit card numbers and other personal data. ▪ Monetary theft
39
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 439 Online Theft, Fraud, and Other Dot Cons Identity theft – when someone obtains enough personal information about a person to be able to masquerade as the person for a variety of activities. Information used includes name, Social Security number, address, credit card offer forms, etc. Identity theft is growing and very expensive and inconvenient for the victim.
40
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 440 How Identify Theft Works Figure 4-14 Step 1: The thief obtains information about an individual. Step 2: The thief uses the information to make purchases, obtain credit cards, etc. Step 3: The victim eventually finds out.
41
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 441 Other Dot Cons Online auction fraud – occurs when a buyer pays for merchandise that is never delivered, or is delivered but is not as represented. Internet offer scams – a wide range of scams offered through Web sites or unsolicited e-mails, such as: ▪ Loan scams. ▪ Work-at-home cons. ▪ Pyramid schemes. ▪ Bogus credit card offers.
42
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 442 Other Dot Cons Spoofing or phishing – making it appear that an e- mail or a Web site originates from somewhere other than its actual source. ▪ E-mails and Web sites look legitimate, but all information sent goes to the thief. ▪ Information obtained is usually used for fraudulent activities. Figure 4-15
43
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 443 Protecting Against Online Theft, Fraud, and Other Dot Cons Protect your identifying information. Keep a close eye on bank statements, credit card bills, and your credit history. Before bidding on an auction idem, check out the feedback rating of the seller. Use a credit card or online payment service for online purchases.
44
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 444 Protecting Against Online Theft, Fraud, and Other Dot Cons Never respond to e-mail requests for updated information or click on a link in an unsolicited e-mail message. Only submit sensitive information (like credit card numbers) via a secure Web server. Can also use digital signatures and digital certificates.
45
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 445 Using Digital Signatures and Digital Certificates Digital signatures – used to verify the identity of the sender of a document. Digital certificates – a group of electronic data assigned to an individual or company to be used to: ▪ Encrypt files. ▪ Digitally sign files and e-mail messages. ▪ Verify the identity of a person or secure Web site. Digital certificates are issued by Certificate Authorities.
46
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 446 Example of Verifying a Digital Signature in an E-Mail Message Figure 4-17
47
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 447 Example of Viewing a Secure Web Page’s Digital Certificate Figure 4-17
48
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 448 Hardware Theft, Damage, and System Failure Hardware theft – occurs when hardware is stolen. Hardware damage ▪ Can occur accidentally when hardware is dropped, gotten wet, or exposed to static or a power surge. ▪ Can occur intentionally, such as by a burglar, vandal, or disgruntled employee. System failure – the complete malfunction of a computer system.
49
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 449 Protecting Against Hardware Theft, Damage, and System Failure Door and computer equipment locks can secure against theft. ▪ PCs can be secured with cable locks. ▪ Portable PCs should not be left unattended in cars, airports, hotels, and so forth. Expensive supplies and portable storage media should be locked up. Figure 4-19
50
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 450 Protecting Against Hardware Theft, Damage, and System Failure Data on portable PCs can be encrypted to secure it in case the PC is stolen. Some portable PCs and storage devices, such as USB flash memory drives and external hard drives, can be secured against unauthorized use with a biometric feature. Figure 4-20
51
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 451 Protecting Against Hardware Theft, Damage, and System Failure Surge suppressors – protect against damage due to power fluxuations. Uninterruptible power supplies (UPSs) – provide continuous power to a PC so it doesn’t shut off when the power goes off. Hardware should be protected against extreme temperatures, dust, static, and other things that might cause harm. Figure 4-21
52
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 452 Backups and Disaster Preparedness Creating a backup means making a duplicate copy of important files so that when a problem occurs, those files can be restored from the backup copy. A disaster recovery plan spells out what the organization will do to prepare for and recover from a disruptive event. Figure 4-22
53
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 453 Software Piracy Software piracy – the unauthorized copying of a computer program. ▪ Is illegal in the U.S. and many other, but not all, countries. ▪ Is a widespread global problem. When using software, you must follow the terms of the end-user license agreement (EULA). Figure 4-24
54
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 454 Digital Counterfeiting Digital counterfeiting – the process of creating copies of currency and other printed resources using computers and other types of digital equipment. Has increased as the quality of digital imaging equipment has improved. Is illegal in the U.S. and has serious consequences. Figure 4-25
55
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 455 Protecting Against Software Piracy and Counterfeiting Education, holograms, and other antipiracy tools. New U.S. currency designs. Digital counterfeiting prevention and detection features are built into some digital imaging products, such as copiers and scanners. Digital watermarks can be used with electronic resources.
56
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 456 Anticounterfeiting Measures Used with U.S. Currency Figure 4-26
57
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 457 Personal Safety Issues Cyberstalking – repeated threats or harassing behavior via e-mail or another Internet communications method. There is a variety of controversial and potentially objectionable material on the Internet, including pornography. ▪ Child pornography is illegal. ▪ PROTECT Act of 2003 prohibits virtual child pornography.
58
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 458 Protecting Against Cyberstalking and Other Personal Safety Issues Be cautious and discreet in online locations, such as chat rooms. ▪ Don’t reveal personal information. ▪ Use nonprovocative identifying names. ▪ Don’t respond to any online harassment. Stay in close touch with children as they explore the Internet. ▪ Children should not use PCs in their bedrooms.
59
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 459 Computer Security Legislation Some computer-security-related federal laws include: ▪ Identity Theft Penalty Act ▪ Fair and Accurate Credit Transactions Act (FACTA) ▪ Homeland Security Act ▪ USA Patriot Act (USAPA) ▪ Digital Millennium Copyright Act (DCMA) ▪ Identity Theft and Assumption Deterrence Act ▪ Computer Fraud and Abuse Act
60
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 460 Summary Why Be Concerned About Computer Security? Unauthorized Access and Use, and Computer Sabotage Online Theft, Fraud, and Other Dot Cons Hardware Theft, Damage, and System Failure
61
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Chapter 461 Summary (cont’d) Software Piracy and Digital Counterfeiting Personal Safety Issues Computer Security Legislation
62
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Next Class Front Page Tutorial 1 Chapter 162
63
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Questions? Chapter 163
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.