Download presentation
Presentation is loading. Please wait.
Published byBrianne Gilbert Modified over 9 years ago
1
IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security, Privacy, and Ethics
2
Computer Security Risks A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
3
Computer Security Risks Cybercrime Online or internet based illegal acts An FBI top 10 priority
4
Viruses, Worms, Trojan Horses Virus A potentially damaging computer program
5
Viruses, Worms, Trojan Horses Worm A program that copies itself to create some type of problem for the infected computer or network
6
Viruses, Worms, Trojan Horses Trojan Horse A program that hides within a legitimate program. Activates on some trigger.
7
Viruses, Worms, Trojan Horses Virus Symptoms: Unusual Screen Messages Music or Sounds play randomly Memory is reduced Programs disappear Files are corrupted Programs do not work correctly Unknown programs appear System properties change
8
Viruses, Worms, Trojan Horses How do we get these? Opening an infected file Running an infected program Booting an infected computer with a disk that is infected Opening infected E-mail messages
9
Viruses, Worms, Trojan Horses There are over 90,000 known viruses, etc. 6 - 10 new viruses, etc are discovered each day
10
Viruses, Worms, Trojan Horses Getting rid of viruses, etc. Avast! Anti-Virus http://www.avast.com
11
Viruses, Worms, Trojan Horses Preventing Viruses, etc: Page 562
12
Unauthorized Access Using a computer or network without permission Cracker = illegally accesses a computer network Hacker = Same as cracker, but more elite status
13
Unauthorized Access Firewall One way to prevent hacking or cracking. It is a combination of hardware and software that blocks unwanted attacks from your computer or network
14
Unauthorized Access
15
Usernames and Passwords Username = UserID or identification Password = private combination of characters to allow access
16
Unauthorized Access Passwords
17
Biometric Devices Physical biometric systems measure a unique physical trait, such as the fingerprint or blood vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs his or her name.
18
Unauthorized Access Biometric Devices
19
Unauthorized Access Biometric Devices
20
Theft Prevent Hardware Theft Physical location Physical security Regular visual inspection
21
Theft Prevent Software Theft License Agreements Activation Schemes Regular System Scans
22
Theft Prevent Information Theft Encryption & Decryption
23
Theft
24
Theft Two Types of Encryption: In private-key encryption, the sender and receiver of information share a secret--a key that is used for both encryption and decryption. In public-key encryption, two different mathematically related keys (a key pair) are used to encrypt and decrypt data. Information encrypted with one key may only be decrypted by using the other half of the key pair.
25
Theft PGP (Pretty Good Privacy) Encryption Software http://www.pgp.com
26
System Failure Noise = any unwanted signal mixed with normal voltage input to the computer Under voltage = electrical supply drops Over voltage = Power Surge
27
System Failure Safeguards Surge Protector (Minimum Protection) UPS – Uninterruptible Power Supply (Best Protection) APC 750VA UPS = $ 90.00
28
Backup The Ultimate Safeguard Making copies of your important files
29
Internet Security Risks Denial of Service Attacks (DoS Attack) An assault on computer networks to disrupt service
30
Internet Security Risks Internet Transactions Digital Certificates SSL (Secure Sockets Layer) SET (Secure Electronics Transactions) Digital Signatures
31
Ethics and Society Computer Ethics Page 578
32
Ethics and Society Information Accuracy Everything you see on the internet may not be accurate. You have to learn to judge or discern what is correct and what is not Remember what your parents used to say: “Just because it is on TV or radio or in a newspaper doesn’t mean it is true!” Also “Would you jump off a bridge if your friends did?”
33
Ethics and Society Intellectual Property Rights Rights of the creator to their own work(s) Copyright – Automatically given when you create something, doesn’t have to be registered to be upheld in court
34
Ethics and Society IT Code of Conduct Page 580
35
Ethics and Society Information Privacy Your right to deny or restrict the use of your personal information Page 581
36
Ethics and Society Cookies A small text file that a web server stores on your computer
37
Ethics and Society Spyware A program placed on your computer without your knowledge that secretly collects information about you. Adaware SE Spybot
38
Ethics and Society Spam Unsolicited E-mail 4 out of 5 messages are spam today
39
Ethics and Society Employee Monitoring Using a computer to observe, record and review an employee’s use of a computer.
40
Ethics and Society Content Filtering Restricting access to certain material on the web
41
Health Concerns RSI – Repetitive Strain Injury CTS – Carpal Tunnel Syndrome CVS – Computer Vision Syndrome Blindness recently reported as related to Short-Sightedness and long-term computer monitor use
42
Health Concerns Computer Addiction When computers consume someone’s entire social life
43
Health Concerns IAD – Internet Addiction Disorder When using the internet consumes someone’s entire social life but feels social to the addict as they interact with others via the internet
44
Health Concerns Symptoms of both disorders: Craves Computer Time Overjoyed when at computer Unable to stop computer activity Irritable when not at a computer Neglects family and friends Problems at work or school
45
Chapter 11 Questions?
46
Assignment 07 At Issue 11-2 on page 568 Answer the questions as presented and defend your opinion. Show references as well.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.