Upload
amie-harrison
View
227
Download
4
Embed Size (px)
Citation preview
Computer Security,Computer Security,Ethics and PrivacyEthics and Privacy
Chapter 11Chapter 11
Computer Security RiskComputer Security Risk
Computer CrimeComputer Crime CyberCrimeCyberCrime HackerHacker CrackerCracker Script KiddieScript Kiddie CyberextortionistCyberextortionist CyberterristCyberterrist
Internet AttacksInternet Attacks
Computer virusesComputer viruses Computer program that affects the way a Computer program that affects the way a
computer works without permission or computer works without permission or knowledge of the ownerknowledge of the owner
Can damage files and system softwareCan damage files and system software Computer wormsComputer worms
Copies itself repeatedly, causing a network to Copies itself repeatedly, causing a network to clog and go downclog and go down
Trojan HorsesTrojan Horses Hides within a legitimate programHides within a legitimate program Condition or action triggers the Trojan horseCondition or action triggers the Trojan horse Does not replicate itselfDoes not replicate itself
How Should Virus Authors Be How Should Virus Authors Be Punished?????Punished?????
How long is an Unprotected How long is an Unprotected Computer safe from Intruders?Computer safe from Intruders?
A – 10 minutesA – 10 minutes B – 20 minutesB – 20 minutes C – 30 minutesC – 30 minutes D – 5 minutesD – 5 minutes
How to Safeguard YourselfHow to Safeguard Yourself
Only use trusted sourcesOnly use trusted sources Use Anti-Virus programsUse Anti-Virus programs
McAfeeMcAfee NortonNorton AVGAVG KaperskyKapersky
Spyware BlockerSpyware Blocker
Virus TerminologyVirus Terminology
Virus SignatureVirus Signature Virus DefinitionVirus Definition InoculateInoculate QuarantineQuarantine Virus HoaxVirus Hoax
Denial of Service AttacksDenial of Service Attacks
Designed to overload a server until it Designed to overload a server until it crashescrashes
Examples????Examples????
Back DoorsBack Doors
Bypassing Security systems already Bypassing Security systems already in placein place
Usually install a program or modify Usually install a program or modify one to meet their needsone to meet their needs
Spoofing – transmission appears to Spoofing – transmission appears to be harmlessbe harmless
FirewallsFirewalls
Hardware and/or softwareHardware and/or software Use controls and passwordsUse controls and passwords
PasswordsPasswords
The last word in passwords!The last word in passwords! Check out Chart on page 567Check out Chart on page 567 PINsPINs Biometric DevicesBiometric Devices
Hardware Theft and VandalismHardware Theft and Vandalism
BackupBackup BackupBackup BackupBackup
Software TheftSoftware Theft
Apple vs MicrosoftApple vs Microsoft
Safeguards Against Software TheftSafeguards Against Software Theft
Restricting who can load softwareRestricting who can load software Use or loose the license agreementUse or loose the license agreement
What NOT to DO!What NOT to DO!
Install the software on a network, Install the software on a network, such as a school computer labsuch as a school computer lab
Give copies to friends and family Give copies to friends and family while continuing to use the softwarewhile continuing to use the software
Export the softwareExport the software Rent or lease the softwareRent or lease the software