15
Computer Security, Computer Security, Ethics and Privacy Ethics and Privacy Chapter 11 Chapter 11

Computer Security, Ethics and Privacy Chapter 11

Embed Size (px)

Citation preview

Page 1: Computer Security, Ethics and Privacy Chapter 11

Computer Security,Computer Security,Ethics and PrivacyEthics and Privacy

Chapter 11Chapter 11

Page 2: Computer Security, Ethics and Privacy Chapter 11

Computer Security RiskComputer Security Risk

Computer CrimeComputer Crime CyberCrimeCyberCrime HackerHacker CrackerCracker Script KiddieScript Kiddie CyberextortionistCyberextortionist CyberterristCyberterrist

Page 3: Computer Security, Ethics and Privacy Chapter 11

Internet AttacksInternet Attacks

Computer virusesComputer viruses Computer program that affects the way a Computer program that affects the way a

computer works without permission or computer works without permission or knowledge of the ownerknowledge of the owner

Can damage files and system softwareCan damage files and system software Computer wormsComputer worms

Copies itself repeatedly, causing a network to Copies itself repeatedly, causing a network to clog and go downclog and go down

Trojan HorsesTrojan Horses Hides within a legitimate programHides within a legitimate program Condition or action triggers the Trojan horseCondition or action triggers the Trojan horse Does not replicate itselfDoes not replicate itself

Page 4: Computer Security, Ethics and Privacy Chapter 11

How Should Virus Authors Be How Should Virus Authors Be Punished?????Punished?????

Page 5: Computer Security, Ethics and Privacy Chapter 11

How long is an Unprotected How long is an Unprotected Computer safe from Intruders?Computer safe from Intruders?

A – 10 minutesA – 10 minutes B – 20 minutesB – 20 minutes C – 30 minutesC – 30 minutes D – 5 minutesD – 5 minutes

Page 6: Computer Security, Ethics and Privacy Chapter 11

How to Safeguard YourselfHow to Safeguard Yourself

Only use trusted sourcesOnly use trusted sources Use Anti-Virus programsUse Anti-Virus programs

McAfeeMcAfee NortonNorton AVGAVG KaperskyKapersky

Spyware BlockerSpyware Blocker

Page 7: Computer Security, Ethics and Privacy Chapter 11

Virus TerminologyVirus Terminology

Virus SignatureVirus Signature Virus DefinitionVirus Definition InoculateInoculate QuarantineQuarantine Virus HoaxVirus Hoax

Page 8: Computer Security, Ethics and Privacy Chapter 11

Denial of Service AttacksDenial of Service Attacks

Designed to overload a server until it Designed to overload a server until it crashescrashes

Examples????Examples????

Page 9: Computer Security, Ethics and Privacy Chapter 11

Back DoorsBack Doors

Bypassing Security systems already Bypassing Security systems already in placein place

Usually install a program or modify Usually install a program or modify one to meet their needsone to meet their needs

Spoofing – transmission appears to Spoofing – transmission appears to be harmlessbe harmless

Page 10: Computer Security, Ethics and Privacy Chapter 11

FirewallsFirewalls

Hardware and/or softwareHardware and/or software Use controls and passwordsUse controls and passwords

Page 11: Computer Security, Ethics and Privacy Chapter 11

PasswordsPasswords

The last word in passwords!The last word in passwords! Check out Chart on page 567Check out Chart on page 567 PINsPINs Biometric DevicesBiometric Devices

Page 12: Computer Security, Ethics and Privacy Chapter 11

Hardware Theft and VandalismHardware Theft and Vandalism

BackupBackup BackupBackup BackupBackup

Page 13: Computer Security, Ethics and Privacy Chapter 11

Software TheftSoftware Theft

Apple vs MicrosoftApple vs Microsoft

Page 14: Computer Security, Ethics and Privacy Chapter 11

Safeguards Against Software TheftSafeguards Against Software Theft

Restricting who can load softwareRestricting who can load software Use or loose the license agreementUse or loose the license agreement

Page 15: Computer Security, Ethics and Privacy Chapter 11

What NOT to DO!What NOT to DO!

Install the software on a network, Install the software on a network, such as a school computer labsuch as a school computer lab

Give copies to friends and family Give copies to friends and family while continuing to use the softwarewhile continuing to use the software

Export the softwareExport the software Rent or lease the softwareRent or lease the software