0% found this document useful (0 votes)
8 views51 pages

Chap 10

Uploaded by

muhammadans2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views51 pages

Chap 10

Uploaded by

muhammadans2008
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 51

Computer

Applications
Mohib Ullah Khan

mohibkhan483@gmail.com
1
Book
2  Discovering Computers Fundamentals by Shelly,
Cashman 4th Edition
 Introduction to Computers by Peter Norton, 6th
International Edition
Discovering Computers 2008
Fundamentals
Fourth Edition

Chapter 10
Computer
Security, Ethics,
and Privacy
Chapter 10 Objectives
Identify
Identifyways
waystotosafeguard
safeguardagainst
againstcomputer
computer
viruses,
viruses,worms,
worms,Trojan
Trojanhorses,
horses,botnets,
botnets, Discuss
Discussthe
thetypes
typesof
ofdevices
devicesavailable
availablethat
that
denial
denialof
ofservice
serviceattacks,
attacks,back
backdoors,
doors,and
and protect
protectcomputers
computersfrom
fromsystem
systemfailure
failure
spoofing
spoofing
Identify
Identifyrisks
risksand
andsafeguards
safeguardsassociated
associatedwith
with
Discuss
Discusstechniques
techniquesto
toprevent
preventunauthorized
unauthorized wireless communications
wireless communications
computer
computeraccess
accessand
anduse
use
Discuss
Discussissues
issuessurrounding
surroundinginformation
information
Identify
Identifysafeguards
safeguardsagainst
againsthardware
hardwaretheft
theft privacy
privacy
and
andvandalism
vandalism
Discuss
Discussways
waystotoprevent
preventhealth-related
health-related
Explain
Explainthe
theways
waystotoprotect
protectagainst
againstsoftware
software disorders
disordersand
andinjuries
injuriesdue
dueto
tocomputer
computeruse
use
theft
theftand
andinformation
informationtheft
theft
Computer Security Risks
What is a computer security risk?

 Event or action that causes loss of or damage to


computer system
Internet and Network
Attacks
What are viruses, worms, and Trojan horses?

Virus is a Worm copies Trojan horse hides


potentially itself repeatedly, within
damaging using up or looks like
resources
computer legitimate
and possibly
program shutting down program until
computer or triggered
network
Does not
Can spread
replicate
and
itself on
damage
other
files
computers
Internet and Network
Attacks
How can a virus spread through an e-mail message?

Step 1. Unscrupulous Step 2. They


programmers create a virus use the Internet to
program. They hide the send the e-mail
virus in a Word document message to
and attach the Word thousands of users
document to an e-mail around the world.
message.

Step 3b. Other users do not


recognize the name of the
Step 3a. Some sender of the e-mail message.
users open the These users do not open the
attachment and e-mail message -- instead they
their computers immediately delete the e-mail
become infected message. These users’
with the virus. computers are not infected
with the virus.
Internet and Network
Attacks
How can you protect your system from a macro virus?

 Macros are instructions saved in an application,


such as word processing or spreadsheet program
 Set macro security level so that warning displays
that document contains macro
 Set macro security level in applications that allow
you to write macros
Internet and Network
Attacks
What is an antivirus program?

 Identifies and removes computer viruses


 Most also protect against worms and Trojan
horses
Internet and Network
Attacks
What is a virus signature?
 Specific pattern of virus code
 Also called virus definition
 Antivirus programs
look for virus
signatures
Internet and Network
Attacks
What are some tips for preventing virus, worm,
and Trojan horse infections?

Never open an
Set the macro security e-mail attachment
Install an antivirus
in programs so you unless you are
program on all of
can enable or disable expecting it and
your computers
macros it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
Internet and Network
Attacks
What happens if an antivirus program identifies an infected file?

Attempts Quarantines
to remove
any detected infected
virus files that it
cannot Keeps file in
remove separate area of
hard disk
Internet and Network
Attacks
What are a denial of service attack, back door and spoofing?

A denial of service attack is an assault which


disrupts computer access to an Internet service
such as the Web or e-mail

A back door is a program or set of instructions


in a program that allow users to bypass
security controls when accessing a computer
resource

Spoofing is a technique intruders use to make


their network or Internet transmission
appear legitimate to a victim computer or
network
Internet and Network
Attacks
What is spoofing?

Makes a
network
or Internet
Transmission appear legitimate
IP spoofing occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source
Internet and Network
Attacks
What is a firewall?
 Security system consisting of hardware and/or
software that prevents unauthorized network access
Internet and Network
Attacks
What is a personal firewall utility?

 Program that protects personal computer and its data


from unauthorized intrusions
 Monitors transmissions to and from computer
 Informs you of attempted intrusion
Internet and Network
Attacks
How can companies protect against hackers?

Intrusion detection software


analyzes network traffic, assesses
system vulnerabilities, and identifies
intrusions and suspicious behavior
Unauthorized Access and

Use
What is a user name?
Unique combination of characters that identifies user
 Password is private
combination of
characters associated
with the user name
that allows access
to certain computer
resources
Unauthorized Access and
Use
How can you make your password more secure?
 Longer passwords provide greater security
Unauthorized Access and
What is aUse
possessed object?

 Item that you must carry to gain access to


computer or facility
 Often used with numeric password called personal
identification number (PIN)
Unauthorized Access and
Use
What is a biometric device?

 Authenticates person’s
identity using personal
characteristic
 Fingerprint, hand geometry,
voice, signature, and iris
Hardware Theft and
What are hardware theft and hardware vandalism?

Vandalism
Hardware theft is act of stealing
computer equipment
 Cables sometimes used to lock
equipment
 Some notebook computers use
passwords, possessed objects, and
biometrics as security methods
 For PDAs and smart phones, you
can password-protect the device
 Hardware vandalism is act of
defacing or destroying computer
equipment
Software Theft
What is software theft?

Act of stealing or Software piracy


illegally copying is illegal
software or duplication
intentionally of copyrighted
erasing software
programs
Software Theft
What is a license agreement?

 Right to use software


 Single-user license agreement allows user to install software
on one computer, make backup copy, and sell software after
removing from computer
Software Theft
What is product activation?

Product activation allows user to input product


identification number online or by phone and
receive unique installation identification number
Information Theft
What is encryption?

 Safeguards against information theft


 Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
 Encryption key (formula) often uses more than one method
 To read the data, the recipient must decrypt, or decipher, the data
Information Theft
What are methods for securing e-mail messages?

Digital signature
Pretty Good is encrypted
Privacy (PGP) code attached to
is popular e-mail message
e-mail encryption to verify identity
program of sender

Freeware for
personal, non-
commercial use
Information Theft
How do Web browsers provide secure data
transmission?

Secure site
Many Web browsers
is Web site that uses
use encryption
encryption to secure data

Digital certificate is notice that


guarantees Web site is legitimate
Information Theft
What is a certificate authority (CA)?

 Authorized person or company that issues


and verifies digital certificates
 Users apply for digital certificate from CA
System Failure

What is a system failure?

Can cause loss of hardware,


Prolonged malfunction
software, data, or
of computer
information

Caused by aging hardware,


natural disasters, or electrical
power disturbances
System Failure
What is a surge protector?
 Protects computer and
equipment from electrical power
disturbances
 Uninterruptible power supply
(UPS) is surge protector that
provides power during power loss
Backing Up — The
Ultimate Safeguard
What is a backup?

Duplicate of file, program, or disk

Three-generation
Three-generation
Full
Fullbackup
backup Selective
Selectivebackup
backup backup
backup
all
allfiles
filesinin select
selectwhich
whichfiles
files preserves
preserves
computer
computer totoback
backup
up three
threecopies
copiesofof
important
importantfiles
files

In case of system failure or corrupted files,


restore files by copying to original location Next
Wireless Security
How can I ensure my wireless communication is secure?

 Secure your wireless access point (WAP)


 WAP should not broadcast your network name
 Enable Wired Equivalent Privacy (WEP) or Wi-Fi
Protected Access (WPA)
 802.11i conforms to the government’s security
standards and uses more sophisticated encryption
than both WPA and WEP
Ethics and Society
What are computer ethics?

Moral guidelines that govern use of computers and information systems

Unauthorized
Unauthorized use
use of
of
computers
computers and
and Software
Software theft
theft Information
Information accuracy
accuracy
networks
networks

Intellectual
Intellectual property
property
rights—rights
rights—rights toto which
which Information
Information privacy
privacy
creators
creators are
are entitled
entitled for
for
their
their work
work

Next
Information Privacy
What is information privacy?

Right of individuals and


companies to restrict collection
and use of information about them

Difficult to maintain today


because data is stored online

Employee monitoring is using


computers to observe employee
computer use

Legal for employers to use


monitoring software programs
Information Privacy
What are some ways to safeguard personal information?
Fill in only the necessary
Install a cookie manager Sign up for e-mail
information
to filter cookies filtering through your
on rebate, warranty, and
registration forms Internet service provider or
Clear your history file when use an antispam program,
you are finished browsing such as Brightmail
Avoid shopping club
and buyers cards
Set up a free e-mail account;
Do not reply to spam
use this e-mail address for
for any reason
Inform merchants that you merchant forms
do not want them to distribute
your personal information
Turn off file and print sharing Surf the Web anonymously
on your Internet connection with a program such as
Freedom Web Secure or
Limit the amount of information through an anonymous
you provide to Web sites; fill Web site such as
in only required information Install a personal firewall Anonymizer.com
Information Privacy
What is an electronic profile?
 Data collected when you fill out form on Web
 Merchants sell your electronic profile
 Often you can specify whether you want personal
information distributed
Information Privacy
What is a cookie?

Set browser to
Some Web sites
User Small file on accept cookies,
sell or trade
preferences your computer prompt you to
information
that contains accept cookies,
stored in your
data about you or disable
cookies
cookies
How
regularly
you visit Interests
Web sites and
browsing
habits
Information Privacy
How do cookies work?
Information Privacy
What are spyware, adware, and spam?
 Spyware is program
placed on computer
without user’s
knowledge
 Adware is a program
that displays online
advertisements
 Spam is unsolicited
e-mail message sent
to many recipients
Information Privacy
How can you control spam?

E-mail filtering
Service that
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources

Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
Information Privacy
What is phishing?

Scam in which a perpetrator


sends an official looking
e-mail that attempts
to obtain your personal
information
Information Privacy
What privacy laws have been enacted?
Information Privacy
What privacy laws have been enacted? (cont’d)

p. 383 Fig. 10-20 Next


Information Privacy
What is content filtering?
 Process of restricting access to certain material
 Internet Content Rating
Association (ICRA)
provides rating system
of Web content
 Web filtering software
restricts access to
specified sites
Health Concerns of Computer
Use
What are some health concerns of computer use?

Computer vision syndrome


(CVS)—eye and vision
problems
Carpal
Carpal tunnel
tunnel syndrome
syndrome (CTS)
(CTS)
—inflammation
—inflammation ofof nerve
nerve that
that
connects
connects fore
fore arm
arm to
to palm
palm

Repetitive strain injury (RSI)

Tendonitis—inflammation
Tendonitis—inflammation ofof
tendon
tendon due
due to
to repeated
repeated motion
motion
Computer addiction—when
computer consumes entire
social life
Health Concerns of Computer
Use
What precautions can prevent tendonitis or carpal tunnel syndrome?

 Take frequent breaks during computer session


 Use wrist rest
 Exercise hands and arms
 Minimize number of times you switch
between mouse and keyboard
Health Concerns of Computer
Use
How can you ease eyestrain when working at the computer?
Health Concerns of Computer
Use
What is ergonomics?
 Applied science devoted to comfort, efficiency, and
safety in workplace
elbows at 90°
keyboard and arms and
height: 23” hands parallel
to 28” to floor

adjustable
height chair
with 4 or 5 legs
for stability

feet flat on floor


Health Concerns of Computer
WhatUse
is green computing?
 Reducing electricity and environmental waste while
using computer
Summary of Computers and Society, Security, Privacy, and
Ethics

Potential
Potentialcomputer
computerrisks
risks
Ethical
Ethicalissues
issuessurrounding
surroundinginformation
information
accuracy,
accuracy,intellectual
intellectualproperty
propertyrights,
rights,
and
andinformation
informationprivacy
privacy
Safeguards
Safeguardsthat
thatschools,
schools,
business,
business,and
andindividuals
individualscan
can
implement
implement to minimize theserisks
to minimize these risks
Computer-related
Computer-relatedhealth
healthissues,
issues,
their
theirpreventions,
preventions,and
andways
waystoto
keep the environment healthy
keep the environment healthy
Wireless
Wirelesssecurity
securityrisks
risksand
andsafeguards
safeguards

Chapter 10 Complete

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy