Chap 10
Chap 10
Applications
Mohib Ullah Khan
mohibkhan483@gmail.com
1
Book
2 Discovering Computers Fundamentals by Shelly,
Cashman 4th Edition
Introduction to Computers by Peter Norton, 6th
International Edition
Discovering Computers 2008
Fundamentals
Fourth Edition
Chapter 10
Computer
Security, Ethics,
and Privacy
Chapter 10 Objectives
Identify
Identifyways
waystotosafeguard
safeguardagainst
againstcomputer
computer
viruses,
viruses,worms,
worms,Trojan
Trojanhorses,
horses,botnets,
botnets, Discuss
Discussthe
thetypes
typesof
ofdevices
devicesavailable
availablethat
that
denial
denialof
ofservice
serviceattacks,
attacks,back
backdoors,
doors,and
and protect
protectcomputers
computersfrom
fromsystem
systemfailure
failure
spoofing
spoofing
Identify
Identifyrisks
risksand
andsafeguards
safeguardsassociated
associatedwith
with
Discuss
Discusstechniques
techniquesto
toprevent
preventunauthorized
unauthorized wireless communications
wireless communications
computer
computeraccess
accessand
anduse
use
Discuss
Discussissues
issuessurrounding
surroundinginformation
information
Identify
Identifysafeguards
safeguardsagainst
againsthardware
hardwaretheft
theft privacy
privacy
and
andvandalism
vandalism
Discuss
Discussways
waystotoprevent
preventhealth-related
health-related
Explain
Explainthe
theways
waystotoprotect
protectagainst
againstsoftware
software disorders
disordersand
andinjuries
injuriesdue
dueto
tocomputer
computeruse
use
theft
theftand
andinformation
informationtheft
theft
Computer Security Risks
What is a computer security risk?
Never open an
Set the macro security e-mail attachment
Install an antivirus
in programs so you unless you are
program on all of
can enable or disable expecting it and
your computers
macros it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
Internet and Network
Attacks
What happens if an antivirus program identifies an infected file?
Attempts Quarantines
to remove
any detected infected
virus files that it
cannot Keeps file in
remove separate area of
hard disk
Internet and Network
Attacks
What are a denial of service attack, back door and spoofing?
Makes a
network
or Internet
Transmission appear legitimate
IP spoofing occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source
Internet and Network
Attacks
What is a firewall?
Security system consisting of hardware and/or
software that prevents unauthorized network access
Internet and Network
Attacks
What is a personal firewall utility?
Authenticates person’s
identity using personal
characteristic
Fingerprint, hand geometry,
voice, signature, and iris
Hardware Theft and
What are hardware theft and hardware vandalism?
Vandalism
Hardware theft is act of stealing
computer equipment
Cables sometimes used to lock
equipment
Some notebook computers use
passwords, possessed objects, and
biometrics as security methods
For PDAs and smart phones, you
can password-protect the device
Hardware vandalism is act of
defacing or destroying computer
equipment
Software Theft
What is software theft?
Digital signature
Pretty Good is encrypted
Privacy (PGP) code attached to
is popular e-mail message
e-mail encryption to verify identity
program of sender
Freeware for
personal, non-
commercial use
Information Theft
How do Web browsers provide secure data
transmission?
Secure site
Many Web browsers
is Web site that uses
use encryption
encryption to secure data
Three-generation
Three-generation
Full
Fullbackup
backup Selective
Selectivebackup
backup backup
backup
all
allfiles
filesinin select
selectwhich
whichfiles
files preserves
preserves
computer
computer totoback
backup
up three
threecopies
copiesofof
important
importantfiles
files
Unauthorized
Unauthorized use
use of
of
computers
computers and
and Software
Software theft
theft Information
Information accuracy
accuracy
networks
networks
Intellectual
Intellectual property
property
rights—rights
rights—rights toto which
which Information
Information privacy
privacy
creators
creators are
are entitled
entitled for
for
their
their work
work
Next
Information Privacy
What is information privacy?
Set browser to
Some Web sites
User Small file on accept cookies,
sell or trade
preferences your computer prompt you to
information
that contains accept cookies,
stored in your
data about you or disable
cookies
cookies
How
regularly
you visit Interests
Web sites and
browsing
habits
Information Privacy
How do cookies work?
Information Privacy
What are spyware, adware, and spam?
Spyware is program
placed on computer
without user’s
knowledge
Adware is a program
that displays online
advertisements
Spam is unsolicited
e-mail message sent
to many recipients
Information Privacy
How can you control spam?
E-mail filtering
Service that
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources
Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
Information Privacy
What is phishing?
Tendonitis—inflammation
Tendonitis—inflammation ofof
tendon
tendon due
due to
to repeated
repeated motion
motion
Computer addiction—when
computer consumes entire
social life
Health Concerns of Computer
Use
What precautions can prevent tendonitis or carpal tunnel syndrome?
adjustable
height chair
with 4 or 5 legs
for stability
Potential
Potentialcomputer
computerrisks
risks
Ethical
Ethicalissues
issuessurrounding
surroundinginformation
information
accuracy,
accuracy,intellectual
intellectualproperty
propertyrights,
rights,
and
andinformation
informationprivacy
privacy
Safeguards
Safeguardsthat
thatschools,
schools,
business,
business,and
andindividuals
individualscan
can
implement
implement to minimize theserisks
to minimize these risks
Computer-related
Computer-relatedhealth
healthissues,
issues,
their
theirpreventions,
preventions,and
andways
waystoto
keep the environment healthy
keep the environment healthy
Wireless
Wirelesssecurity
securityrisks
risksand
andsafeguards
safeguards
Chapter 10 Complete