Professional Documents
Culture Documents
Computers 2011
Living in a Digital World
Objectives Overview
Define the term,
computer security
risks, and briefly
describe the types
of cybercrime
perpetrators
Describe various
types of Internet
and network
attacks, and
identify ways to
safeguard against
these attacks
Discuss techniques
to prevent
unauthorized
computer access
and use
Identify safeguards
against hardware
theft and
vandalism
Discuss how
encryption works,
and explain why it
is necessary
Objectives Overview
Discuss the types of
devices available
that protect
computers from
system failure
Discuss ways to
prevent healthrelated disorders
and injuries due to
computer use
Recognize issues
related to
information
accuracy,
intellectual property
rights, codes of
conduct, and green
computing
Discuss issues
surrounding
information privacy
Unethical
Employees
Pages 556 - 557
Cyberextortio
nists
Spies
Cyberterroris
ts
Page 558
Worm
Trojan
Horse
Copies
A
itself
malicious
repeatedl
program
y, using
that hides
up
within or
resources
looks like
and
a
possibly
legitimate
shutting
program
down the
computer
or
Discovering Computers 2011: Living in a
network
Digital World Chapter 11
Rootkit
Program
that hides
in a
computer
and allows
someone
from a
remote
location to
take full
control
7
CLICK TO START
Discovering Computers 2011: Living in a
Digital World Chapter 11
Available
memory is less
than expected
Existing
programs and
files disappear
System
properties
change
Pages 558 - 559
Files become
corrupted
Screen displays
unusual
message or
image
Programs or
files do not
work properly
Unknown
programs or
files
mysteriously
appear
Operating
system does
not start up
Operating
system shuts
down
unexpectedly
Page 559
Figure 11-3
10
Page 561
Figure 11-6
11
12
13
14
Honeypot
Vulnerable computer that is set up to entice an
intruder to break into it
Page 564
15
Unauthorized
access is the use
of a computer or
network without
permission
Page 564
Unauthorized use
is the use of a
computer or its
data for
unapproved or
possibly illegal
activities
16
17
18
A biometric device
authenticates a
persons identity by
translating a personal
characteristic into a
digital code that is
compared with a
digital code in a
computer
19
Criminal
prosecutors
Insurance
agencies
Page 569
Military
intelligence
Information
security
departments
20
Hardware theft
is the act of
stealing
computer
equipment
Page 570
Hardware
vandalism is the
act of defacing or
destroying
computer
equipment
21
Alarm systems
Cables to lock
equipment
Passwords,
possessed objects,
and biometrics
22
Software Theft
Software theft occurs when someone:
Page 571
Steals
software
media
Intentionally
erases
programs
Illegally
copies a
program
Illegally
registers
and/or
activates a
program
23
Software Theft
A single-user license agreement typically
contains the following conditions:
Permitted to
Install the software on one computer
Make one copy of the software
Remove the software from your computer before giving it away
or selling it
Not permitted to
Page 571
24
Software Theft
Copying, loaning,
borrowing, renting,
or distributing
software can be a
violation of
copyright law
Some software
requires product
activation to
function fully
Click to view Web Link,
click Chapter 11, Click Web
Link from left navigation,
then click Business Software
Alliance below Chapter 11
25
Information Theft
Information theft occurs when
someone steals personal or confidential
information
Encryption is a process of converting
readable data into unreadable
characters to prevent unauthorized
access
26
Information Theft
Page 573
Figure 11-18
27
Information Theft
A digital signature is an encrypted
code that a person, Web site, or
organization attaches to an electronic
message to verify the identity of the
sender
Often used to ensure that an impostor is not
participating in an Internet transaction
28
Information Theft
Popular security techniques include
Transport
Digital
Layer
Certificate
Security
s
(TLS)
Secure HTTP
VPN
29
Information Theft
30
System Failure
A system failure is the prolonged
malfunction of a computer
A variety of factors can lead to system
failure, including:
Aging hardware
Natural disasters
Electrical power problems
Noise, undervoltages, and overvoltages
31
System Failure
Two ways to protect from system
failures caused by electrical power
variations include surge protectors
and uninterruptable power supplies
(UPS)
32
33
Three-generation
backup policy
Grandpar
ent
Parent
Child
Page 577
34
Wireless Security
Wireless access poses additional security risks
About 80 percent of wireless networks have no
security protection
35
Wireless Security
In additional to using firewalls, some
safeguards improve security of wireless
A wireless
networks:
access point
should not
broadcast an
SSID
Configure a
WAP so that
only certain
devices can
access it
Page 578
Change the
default SSID
Use WPA or
WPA2 security
standards
36
Computer vision
syndrome (CVS)
Page 579
Figure 11-24
37
Page 580
Figure 11-25
38
Page 580
Figure 11-26
39
when at the
computer
stop
computer
activity
Irritable
when not at
the
computer
Neglects
family and
friends
Problems at
work or
school
Page 581
40
41
Page 582
42
Page 583
Figure 11-29
43
44
Page 584
45
Page 584
Figure 11-31
46
Page 585
Figure 11-32
47
Store users
passwords
Track how
often users
visit a site
Assist with
online
shopping
Target
advertiseme
nts
48
Page 586
Figure 11-33
49
50
51
52
Page 590
53
54
Summary
Page 591
Potential computer
risks and the
safeguards
Computer-related
health issues and
preventions
Ethical issues
surrounding
information accuracy,
intellectual property
rights, codes of
conduct, green
computing, and
information privacy
55
Discovering
Computers 2011
Living in a Digital World
Chapter 11 Complete