Professional Documents
Culture Documents
Computers 2010
Living in a Digital World
Objectives Overview
Page 558
Discovering Computers 2010: Living in a Digital World Chapter 11 7
Video: Attack of the Mobile
Viruses
CLICK TO START
Page 559
Discovering Computers 2010: Living in a Digital World Chapter 11 10
Figure 11-3
Internet and Network Attacks
Page 561
Discovering Computers 2010: Living in a Digital World Chapter 11 12
Figure 11-6
Internet and Network Attacks
Page 564
Discovering Computers 2010: Living in a Digital World Chapter 11 15
Unauthorized Access and Use
Page 564
Discovering Computers 2010: Living in a Digital World Chapter 11 16
Unauthorized Access and Use
• Organizations take
several measures
to help prevent
unauthorized
access and use
– Acceptable use
policy
– Disable file and
printer sharing
– Firewalls
– Intrusion
detection
software
Page 565
Discovering Computers 2010: Living in a Digital World Chapter 11 17
Figure 11-10
Unauthorized Access and Use
Page 569
Discovering Computers 2010: Living in a Digital World Chapter 11 20
Hardware Theft and
Vandalism
Page 570
Discovering Computers 2010: Living in a Digital World Chapter 11 21
Hardware Theft and
Vandalism
• To help reduce the of chances of theft,
companies and schools use a variety
of security measures
Page 571
Discovering Computers 2010: Living in a Digital World Chapter 11 23
Software Theft
Page 571
Discovering Computers 2010: Living in a Digital World Chapter 11 24
Software Theft
• Copying, loaning,
borrowing,
renting, or
distributing
software can be a
violation of
copyright law
• Some software
requires product
activation to
Click to view Web
Link,
click Chapter 11,
function fully
Click Web
Link from left
navigation,
then click Business
Software
Pages 571 – 572 Alliance Discovering Computers 2010: Living in a Digital World Chapter 11
below Chapter 11 25
Figure 11-16
Information Theft
Page 573
Discovering Computers 2010: Living in a Digital World Chapter 11 27
Figure 11-18
Information Theft
Page 577
Discovering Computers 2010: Living in a Digital World Chapter 11 33
Backing Up – The Ultimate
Safeguard
• Two categories of • Three-generation
backups: backup policy
– Full backup
– Selective backup
Page 577
Discovering Computers 2010: Living in a Digital World Chapter 11 34
Wireless Security
Page 578
Discovering Computers 2010: Living in a Digital World Chapter 11 36
Health Concerns of Computer
Use
• The widespread
use of computers
has led to health
concerns
– Repetitive
strain injury
(RSI)
– Carpal tunnel
syndrome
(CTS)
– Computer
vision
Page 579
syndrome
Discovering Computers 2010: Living in a Digital World Chapter 11 37
Figure 11-24
Health Concerns of Computer
Use
Page 580
Discovering Computers 2010: Living in a Digital World Chapter 11 38
Figure 11-25
Health Concerns of Computer
Use
• Ergonomics is an
applied science
devoted to
incorporating
comfort,
efficiency, and
safety into the
design of items in
the workplace
Page 580
Discovering Computers 2010: Living in a Digital World Chapter 11 39
Figure 11-26
Health Concerns of Computer
Use
• Computer addiction occurs when the
computer consumes someone’s entire
social life
• Symptoms of users include:
Page 581
Discovering Computers 2010: Living in a Digital World Chapter 11 40
Ethics and Society
• Computer ethics
are the moral
guidelines that
govern the use of
computers and
information
systems
• Information
accuracy is a
concern
– Not all
Pages 581 – 582
information on 2010: Living in a Digital World Chapter 11
Discovering Computers 41
Figure 11-28
Ethics and Society
Page 583
Discovering Computers 2010: Living in a Digital World Chapter 11 43
Figure 11-29
Ethics and Society
Page 584
Discovering Computers 2010: Living in a Digital World Chapter 11 45
Ethics and Society
Page 584
Discovering Computers 2010: Living in a Digital World Chapter 11 46
Figure 11-31
Ethics and Society
Page 586
Discovering Computers 2010: Living in a Digital World Chapter 11 49
Figure 11-33
Ethics and Society
• Spam is an
unsolicited e-mail
message or
newsgroup
posting
• E-mail filtering
blocks e-mail
messages from
designated
sources
• Anti-spam
programs
Page 587
attempt toDiscovering Computers 2010: Living in a Digital World Chapter 11 50
Figure 11-34
Ethics and Society
• Phishing is a scam
in which a
perpetrator sends
an official looking
e-mail message
that attempts to
obtain your
personal and
financial
information
• Pharming is a scam
where a
perpetrator
Pages 587 - 588
attempts
Discovering Computers 2010: Living to obtain
in a Digital World Chapter 11 51
Figure 11-35
Ethics and Society
• Content filtering is
the process of
restricting access
to certain material
on the Web
• Many businesses use
content filtering
• Internet Content
Rating Association
(ICRA)
• Web filtering
software restricts
access to specified
Web
Pages 590 – 591
sites Discovering Computers 2010: Living in a Digital World Chapter 11 54
Figure 11-37
Summary
Page 591
Discovering Computers 2010: Living in a Digital World Chapter 11 55
Discovering
Computers 2010
Living in a Digital World
C h a p te r 1 1 C o m p le te