Your Interactive Guide
to the Digital World
Discovering
Objectives Overview
Defie the term,
computer security
risks, aid briefy
describe the types
of cybercrime
perpetrators
Defie the term,
computer security
risks, aid briefy
describe the types
of cybercrime
perpetrators
Describe various
types of Iiteriet
aid ietwork
attacks, aid
ideitify ways to
safeguard agaiist
these attacks
Describe various
types of Iiteriet
aid ietwork
attacks, aid
ideitify ways to
safeguard agaiist
these attacks
Discuss techiiques
to preveit
uiauthorized
computer access
aid use
Discuss techiiques
to preveit
uiauthorized
computer access
aid use
Ideitify safeguards
agaiist hardware
theft aid
vaidalism
Ideitify safeguards
agaiist hardware
theft aid
vaidalism
Explaii the ways
software
maiufacturers
protect agaiist
software piracy
Explaii the ways
software
maiufacturers
protect agaiist
software piracy
Discuss how
eicryptioi works,
aid explaii why it
is iecessary
Discuss how
eicryptioi works,
aid explaii why it
is iecessary
Discoveriig Computers 2012: Chapter 11 2
See Page 555
Objectives Overview
Discuss the types of
devices available
that protect
computers from
system failure
Discuss the types of
devices available
that protect
computers from
system failure
Explaii the optiois
available for
backiig up
computer resources
Explaii the optiois
available for
backiig up
computer resources
Ideitify risks aid
safeguards
associated with
wireless
commuiicatiois
Ideitify risks aid
safeguards
associated with
wireless
commuiicatiois
Discuss ways to
preveit
health-related disorders
aid iijuries due to
computer use
Discuss ways to
preveit
health-related disorders
aid iijuries due to
computer use
Recogiize issues
related to
iiformatioi
accuracy,
iitellectual property
rights, codes of
coiduct, aid greei
computiig
Recogiize issues
related to
iiformatioi
accuracy,
iitellectual property
rights, codes of
coiduct, aid greei
computiig
Discuss issues
surrouidiig
iiformatioi privacy
Discuss issues
surrouidiig
iiformatioi privacy
Discoveriig Computers 2012: Chapter 11 3
See Page 555
Computer Security Risks
•
A
computer security risk
is aiy eveit or
actioi that could cause a loss of or damage to
computer hardware, software, data,
iiformatioi, or processiig capability
•
A
cybercrime
is ai oiliie or Iiteriet-based
illegal act
Discoveriig Computers 2012: Chapter 11 4
Pages 556 - 557
Hackers
Hackers
Crackers
Crackers
Script
Kiddies
Script
Kiddies
Corporate
Corporate
Spies
Spies
Uiethical
Employees
Uiethical
Computer Security Risks
Discoveriig Computers 2012: Chapter 11 5 Pages 556 – 557
Internet and Network Attacks
•
Iiformatioi traismitted over ietworks has a
higher degree of security risk thai
iiformatioi kept oi ai orgaiizatioi’s
premises
•
Ai
online security service
is a Web site that
evaluates your computer to check for Iiteriet
aid e-mail vulierabilities
Discoveriig Computers 2012: Chapter 11 6 Page 558
Internet and Network Attacks
Computer
Virus
Computer
Virus
•
Afects a
computer
iegatively
by
alteriig
the way
the
computer
works
•
Afects a
computer
iegatively
by
alteriig
the way
the
computer
works
Worm
Worm
•
Copies
itself
repeatedl
y, usiig
up
resources
aid
possibly
shuttiig
dowi the
computer
or
ietwork
•
Copies
itself
repeatedl
y, usiig
up
resources
aid
possibly
shuttiig
dowi the
computer
or
ietwork
Trojan
Horse
Trojan
Horse
•
A
malicious
program
that hides
withii or
looks like
a
legitimate
program
•
A
malicious
program
that hides
withii or
looks like
a
legitimate
program
Rootkit
Rootkit
•
Program
that hides
ii a
computer
aid allows
someoie
from a
remote
locatioi to
take full
coitrol
•
Program
that hides
ii a
computer
aid allows
someoie
from a
remote
locatioi to
take full
coitrol
Discoveriig Computers 2012: Chapter 11 7
Video: Attack of the Mobile
Viruses
Discoveriig Computers 2012: Chapter 11 8
Internet and Network Attacks
•
Ai iifected computer has oie or more
of the followiig symptoms:
Discoveriig Computers 2012: Chapter 11 9
Internet and Network Attacks
Discoveriig Computers 2012: Chapter 11 10 Page 559
Internet and Network Attacks
Discoveriig Computers 2012: Chapter 11 11 Page 561
Internet and Network Attacks
•
Users cai take
several precautiois
to protect their
home aid work
computers aid
mobile devices
from these
malicious
iifectiois
Discoveriig Computers 2012: Chapter 11 12 Page 560 – 561
Internet and Network Attacks
•
A
botnet
is a group of compromised computers
coiiected to a ietwork
–
A compromised computer is kiowi as a
zombie
•
A
denial of service attack
(
DoS attack
) disrupts
computer access to Iiteriet services
–
Distributed DoS (DDoS)
•
A
back door
is a program or set of iistructiois ii a
program that allow users to bypass security coitrols
•
Spoofng
is a techiique iitruders use to make their
ietwork or Iiteriet traismissioi appear legitimate
Discoveriig Computers 2012: Chapter 11 13
Internet and Network Attacks
•
A frewall is hardware aid/or software
that protects a ietwork’s resources from
iitrusioi
Discoveriig Computers 2012: Chapter 11 14 Pages 563 - 564
Internet and Network Attacks
Discoveriig Computers 2012: Chapter 11 15
Unauthorized Access and Use
Discoveriig Computers 2012: Chapter 11 16
Unauthorized Access and Use
•
Orgaiizatiois take
several measures to
help preveit
uiauthorized access
aid use
–
Acceptable use policy
–
Disable fle aid
priiter shariig
–
Firewalls
–
Iitrusioi detectioi
software
Discoveriig Computers 2012: Chapter 11 17 Page 565
Unauthorized Access and Use
•
Access coitrols defie who cai access a
computer, whei they cai access it, aid
what actiois they cai take
–
Two-phase processes called ideitifcatioi
aid autheiticatioi
–
User name
–
Password
–
Passphrase
–
CAPTCHA
Discoveriig Computers 2012: Chapter 11 18 Pages 565 – 567
Unauthorized Access and Use
•
A possessed object is
aiy item that you
must carry to gaii
access to a computer
or computer facility
–
Oftei are used ii
combiiatioi with a
personal
identifcation number
(
PIN
)
•
A
biometric device
autheiticates a
persoi’s ideitity by
traislatiig a persoial
characteristic iito a
digital code that is
compared with a
digital code ii a
computer
Discoveriig Computers 2012: Chapter 11 19 Page 568
Unauthorized Access and Use
•
Digital forensics is the discovery,
collectioi, aid aialysis of evideice
fouid oi computers aid ietworks
•
Maiy areas use digital foreisics
Discoveriig Computers 2012: Chapter 11 20
Hardware Theft and
Vandalism
Discoveriig Computers 2012: Chapter 11 21
Hardware Theft and
Vandalism
•
To help reduce the of chaices of theft,
compaiies aid schools use a variety of
security measures
Discoveriig Computers 2012: Chapter 11 22 Page 570
Software Theft
•
Software theft occurs whei someoie:
Discoveriig Computers 2012: Chapter 11 23
Software Theft
•
A siigle-user
license agreement
typically
coitaiis the followiig coiditiois:
Discoveriig Computers 2012: Chapter 11 24
Software Theft
•
Copyiig, loaiiig,
borrowiig, reitiig,
or distributiig
software cai be a
violatioi of
copyright law
•
Some software
requires
product
activation
to
fuictioi fully
Discoveriig Computers 2012: Chapter 11 25 Pages 571 – 572
Information Theft
•
Information theft occurs whei
someoie steals persoial or coifdeitial
iiformatioi
•
Encryption
is a process of coivertiig
readable data iito uireadable
characters to preveit uiauthorized
access
Discoveriig Computers 2012: Chapter 11 26 Pages 572 - 573
Information Theft
Discoveriig Computers 2012: Chapter 11 27 Page 573
Information Theft
•
A digital signature is ai eicrypted
code that a persoi, Web site, or
orgaiizatioi attaches to ai electroiic
message to verify the ideitity of the
seider
–
Oftei used to eisure that ai impostor is iot
participatiig ii ai Iiteriet traisactioi
•
Web browsers aid Web sites use
eicryptioi techiiques
Discoveriig Computers 2012: Chapter 11 28
Information Theft
•
Popular security techiiques iiclude
Discoveriig Computers 2012: Chapter 11 29
Information Theft
Discoveriig Computers 2012: Chapter 11 30 Pages 574 - 575
System Failure
•
A system failure is the proloiged
malfuictioi of a computer
•
A variety of factors cai lead to system
failure, iicludiig:
–
Agiig hardware
–
Natural disasters
–
Electrical power problems
•
Noise
,
undervoltages
, aid
overvoltages
–
Errors ii computer programs
Discoveriig Computers 2012: Chapter 11 31
System Failure
•
Two ways to protect from system
failures caused by electrical power
variatiois iiclude surge protectors
aid uninterruptable power supplies
(UPS)
Discoveriig Computers 2012: Chapter 11 32 Page 576
Backing Up – The Ultimate
Safeguard
•
A backup is a duplicate of a fle,
program, or disk that cai be used if the
origiial is lost, damaged, or destroyed
–
To
back up
a fle meais to make a copy of
it
•
Ofsite backups are stored ii a locatioi
separate from the computer site
Discoveriig Computers 2012: Chapter 11 33
Page 577
Backing Up – The Ultimate
Safeguard
•
Two categories of
backups:
–
Full backup
–
Selective backup
•
Three-geieratioi
backup policy
Discoveriig Computers 2012: Chapter 11 34
Wireless Security
•
Wireless access poses additioial security risks
–
About 80 perceit of wireless ietworks have io
security protectioi
•
War driviig allows iidividuals to detect
wireless ietworks while driviig a vehicle
through the area
Discoveriig Computers 2012: Chapter 11 35 Page 578
Wireless Security
•
Ii additioial to usiig frewalls, some
safeguards improve security of wireless
ietworks:
Discoveriig Computers 2012: Chapter 11 36
Health Concerns of Computer
Use
•
The widespread
use of computers
has led to health
coiceris
–
Repetitive strain
injury
(
RSI
)
•
Teidoiitis
•
Carpal tuiiel
syidrome (CTS)
–
Computer vision
syndrome
(CVS)
Discoveriig Computers 2012: Chapter 11 37 Page 579
Health Concerns of Computer
Use
Discoveriig Computers 2012: Chapter 11 38 Page 580
Health Concerns of Computer
Use
•
Ergoiomics is ai
applied scieice
devoted to
iicorporatiig
comfort, efcieicy,
aid safety iito the
desigi of items ii
the workplace
Discoveriig Computers 2012: Chapter 11 39 Page 580
Health Concerns of Computer
Use
•
Computer addiction occurs whei the
computer coisumes someoie’s eitire
social life
•
Symptoms of users iiclude:
Discoveriig Computers 2012: Chapter 11 40
Ethics and Society
•
Computer ethics
are the moral
guideliies that
goveri the use of
computers aid
iiformatioi
systems
•
Iiformatioi
accuracy is a
coiceri
–
Not all iiformatioi
oi the Web is
correct
Discoveriig Computers 2012: Chapter 11 41 Pages 581 – 582
Ethics and Society
Discoveriig Computers 2012: Chapter 11 42
Ethics and Society
Discoveriig Computers 2012: Chapter 11 43 Page 583
Ethics and Society
•
Green computing iivolves reduciig
the electricity aid eiviroimeital waste
while usiig a computer
Discoveriig Computers 2012: Chapter 11 44 Pages 583 – 584
Ethics and Society
•
Information privacy refers to the right
of iidividuals aid compaiies to deiy or
restrict the collectioi aid use of
iiformatioi about them
•
Huge databases store data oiliie
•
It is importait to safeguard your
iiformatioi
Discoveriig Computers 2012: Chapter 11 45
Ethics and Society
Discoveriig Computers 2012: Chapter 11 46 Page 584
Ethics and Society
•
Whei you fll out a
form, the merchait
that receives the
form usually eiters
it iito a database
•
Maiy compaiies
today allow people
to specify whether
they wait their
persoial
iiformatioi
distributed
Discoveriig Computers 2012: Chapter 11 47 Page 585Ethics and Society
•
A
cookie
is a small text fle that a Web server
stores oi your computer
•
Web sites use cookies for a variety of reasois:
Discoveriig Computers 2012: Chapter 11 48
Ethics and Society
Discoveriig Computers 2012: Chapter 11 49 Page 586
Ethics and Society
•
Spam
is ai uisolicited
e-mail message or
iewsgroup postiig
•
E-mail fltering
blocks
e-mail messages from
desigiated sources
•
Anti-spam programs
attempt to remove
spam before it reaches
your iibox
Discoveriig Computers 2012: Chapter 11 50 Page 587
Ethics and Society
•
Phishing
is a scam ii
which a perpetrator
seids ai ofcial lookiig
e-mail message that
attempts to obtaii your
persoial aid fiaicial
iiformatioi
•
Pharming
is a scam
where a perpetrator
attempts to obtaii your
persoial aid fiaicial
iiformatioi via spoofig
Discoveriig Computers 2012: Chapter 11 51 Pages 587 - 588
Ethics and Society
•
The coiceri about privacy has led to
the eiactmeit of federal aid state laws
regardiig the storage aid disclosure of
persoial data
–
See Figure 11-36 oi page 589 for a listiig
of major U.S. goverimeit laws coiceriiig
privacy
•
The 1970
Fair Credit Reporting Act
limits the rights of others viewiig a
credit report to oily those with a
legitimate busiiess ieed
Discoveriig Computers 2012: Chapter 11 52Ethics and Society
Discoveriig Computers 2012: Chapter 11 53
Ethics and Society
•
Content fltering
is the
process of restrictiig
access to certaii
material oi the Web
•
Maiy busiiesses use
coiteit flteriig
•
Iiteriet Coiteit Ratiig
Associatioi (ICRA)
•
Web fltering
software
restricts
access to specifed Web
sites
Discoveriig Computers 2012: Chapter 11 54 Pages 590 – 591
Summary
Discoveriig Computers 2012: Chapter 11 55
Your Interactive Guide
to the Digital World
Discovering
Computers 2012