• Tidak ada hasil yang ditemukan

See Page 555 for Detailed Objectives

N/A
N/A
Protected

Academic year: 2018

Membagikan "See Page 555 for Detailed Objectives"

Copied!
56
0
0

Teks penuh

(1)

Your Interactive Guide

to the Digital World

Discovering

(2)

Objectives Overview

Defie the term,

computer security

risks, aid briefy

describe the types

of cybercrime

perpetrators

Defie the term,

computer security

risks, aid briefy

describe the types

of cybercrime

perpetrators

Describe various

types of Iiteriet

aid ietwork

attacks, aid

ideitify ways to

safeguard agaiist

these attacks

Describe various

types of Iiteriet

aid ietwork

attacks, aid

ideitify ways to

safeguard agaiist

these attacks

Discuss techiiques

to preveit

uiauthorized

computer access

aid use

Discuss techiiques

to preveit

uiauthorized

computer access

aid use

Ideitify safeguards

agaiist hardware

theft aid

vaidalism

Ideitify safeguards

agaiist hardware

theft aid

vaidalism

Explaii the ways

software

maiufacturers

protect agaiist

software piracy

Explaii the ways

software

maiufacturers

protect agaiist

software piracy

Discuss how

eicryptioi works,

aid explaii why it

is iecessary

Discuss how

eicryptioi works,

aid explaii why it

is iecessary

Discoveriig Computers 2012: Chapter 11 2

See Page 555

(3)

Objectives Overview

Discuss the types of

devices available

that protect

computers from

system failure

Discuss the types of

devices available

that protect

computers from

system failure

Explaii the optiois

available for

backiig up

computer resources

Explaii the optiois

available for

backiig up

computer resources

Ideitify risks aid

safeguards

associated with

wireless

commuiicatiois

Ideitify risks aid

safeguards

associated with

wireless

commuiicatiois

Discuss ways to

preveit

health-related disorders

aid iijuries due to

computer use

Discuss ways to

preveit

health-related disorders

aid iijuries due to

computer use

Recogiize issues

related to

iiformatioi

accuracy,

iitellectual property

rights, codes of

coiduct, aid greei

computiig

Recogiize issues

related to

iiformatioi

accuracy,

iitellectual property

rights, codes of

coiduct, aid greei

computiig

Discuss issues

surrouidiig

iiformatioi privacy

Discuss issues

surrouidiig

iiformatioi privacy

Discoveriig Computers 2012: Chapter 11 3

See Page 555

(4)

Computer Security Risks

A

computer security risk

is aiy eveit or

actioi that could cause a loss of or damage to

computer hardware, software, data,

iiformatioi, or processiig capability

A

cybercrime

is ai oiliie or Iiteriet-based

illegal act

Discoveriig Computers 2012: Chapter 11 4

Pages 556 - 557

Hackers

Hackers

Crackers

Crackers

Script

Kiddies

Script

Kiddies

Corporate

Corporate

Spies

Spies

Uiethical

Employees

Uiethical

(5)

Computer Security Risks

Discoveriig Computers 2012: Chapter 11 5 Pages 556 – 557

(6)

Internet and Network Attacks

Iiformatioi traismitted over ietworks has a

higher degree of security risk thai

iiformatioi kept oi ai orgaiizatioi’s

premises

Ai

online security service

is a Web site that

evaluates your computer to check for Iiteriet

aid e-mail vulierabilities

Discoveriig Computers 2012: Chapter 11 6 Page 558

(7)

Internet and Network Attacks

Computer

Virus

Computer

Virus

Afects a

computer

iegatively

by

alteriig

the way

the

computer

works

Afects a

computer

iegatively

by

alteriig

the way

the

computer

works

Worm

Worm

Copies

itself

repeatedl

y, usiig

up

resources

aid

possibly

shuttiig

dowi the

computer

or

ietwork

Copies

itself

repeatedl

y, usiig

up

resources

aid

possibly

shuttiig

dowi the

computer

or

ietwork

Trojan

Horse

Trojan

Horse

A

malicious

program

that hides

withii or

looks like

a

legitimate

program

A

malicious

program

that hides

withii or

looks like

a

legitimate

program

Rootkit

Rootkit

Program

that hides

ii a

computer

aid allows

someoie

from a

remote

locatioi to

take full

coitrol

Program

that hides

ii a

computer

aid allows

someoie

from a

remote

locatioi to

take full

coitrol

Discoveriig Computers 2012: Chapter 11 7

(8)

Video: Attack of the Mobile

Viruses

Discoveriig Computers 2012: Chapter 11 8

(9)

Internet and Network Attacks

Ai iifected computer has oie or more

of the followiig symptoms:

Discoveriig Computers 2012: Chapter 11 9

(10)

Internet and Network Attacks

Discoveriig Computers 2012: Chapter 11 10 Page 559

(11)

Internet and Network Attacks

Discoveriig Computers 2012: Chapter 11 11 Page 561

(12)

Internet and Network Attacks

Users cai take

several precautiois

to protect their

home aid work

computers aid

mobile devices

from these

malicious

iifectiois

Discoveriig Computers 2012: Chapter 11 12 Page 560 – 561

(13)

Internet and Network Attacks

A

botnet

is a group of compromised computers

coiiected to a ietwork

A compromised computer is kiowi as a

zombie

A

denial of service attack

(

DoS attack

) disrupts

computer access to Iiteriet services

Distributed DoS (DDoS)

A

back door

is a program or set of iistructiois ii a

program that allow users to bypass security coitrols

Spoofng

is a techiique iitruders use to make their

ietwork or Iiteriet traismissioi appear legitimate

Discoveriig Computers 2012: Chapter 11 13

(14)

Internet and Network Attacks

A frewall is hardware aid/or software

that protects a ietwork’s resources from

iitrusioi

Discoveriig Computers 2012: Chapter 11 14 Pages 563 - 564

(15)

Internet and Network Attacks

Discoveriig Computers 2012: Chapter 11 15

(16)

Unauthorized Access and Use

Discoveriig Computers 2012: Chapter 11 16

(17)

Unauthorized Access and Use

Orgaiizatiois take

several measures to

help preveit

uiauthorized access

aid use

Acceptable use policy

Disable fle aid

priiter shariig

Firewalls

Iitrusioi detectioi

software

Discoveriig Computers 2012: Chapter 11 17 Page 565

(18)

Unauthorized Access and Use

Access coitrols defie who cai access a

computer, whei they cai access it, aid

what actiois they cai take

Two-phase processes called ideitifcatioi

aid autheiticatioi

User name

Password

Passphrase

CAPTCHA

Discoveriig Computers 2012: Chapter 11 18 Pages 565 – 567

(19)

Unauthorized Access and Use

A possessed object is

aiy item that you

must carry to gaii

access to a computer

or computer facility

Oftei are used ii

combiiatioi with a

personal

identifcation number

(

PIN

)

A

biometric device

autheiticates a

persoi’s ideitity by

traislatiig a persoial

characteristic iito a

digital code that is

compared with a

digital code ii a

computer

Discoveriig Computers 2012: Chapter 11 19 Page 568

(20)

Unauthorized Access and Use

Digital forensics is the discovery,

collectioi, aid aialysis of evideice

fouid oi computers aid ietworks

Maiy areas use digital foreisics

Discoveriig Computers 2012: Chapter 11 20

(21)

Hardware Theft and

Vandalism

Discoveriig Computers 2012: Chapter 11 21

(22)

Hardware Theft and

Vandalism

To help reduce the of chaices of theft,

compaiies aid schools use a variety of

security measures

Discoveriig Computers 2012: Chapter 11 22 Page 570

(23)

Software Theft

Software theft occurs whei someoie:

Discoveriig Computers 2012: Chapter 11 23

(24)

Software Theft

A siigle-user

license agreement

typically

coitaiis the followiig coiditiois:

Discoveriig Computers 2012: Chapter 11 24

(25)

Software Theft

Copyiig, loaiiig,

borrowiig, reitiig,

or distributiig

software cai be a

violatioi of

copyright law

Some software

requires

product

activation

to

fuictioi fully

Discoveriig Computers 2012: Chapter 11 25 Pages 571 – 572

(26)

Information Theft

Information theft occurs whei

someoie steals persoial or coifdeitial

iiformatioi

Encryption

is a process of coivertiig

readable data iito uireadable

characters to preveit uiauthorized

access

Discoveriig Computers 2012: Chapter 11 26 Pages 572 - 573

(27)

Information Theft

Discoveriig Computers 2012: Chapter 11 27 Page 573

(28)

Information Theft

A digital signature is ai eicrypted

code that a persoi, Web site, or

orgaiizatioi attaches to ai electroiic

message to verify the ideitity of the

seider

Oftei used to eisure that ai impostor is iot

participatiig ii ai Iiteriet traisactioi

Web browsers aid Web sites use

eicryptioi techiiques

Discoveriig Computers 2012: Chapter 11 28

(29)

Information Theft

Popular security techiiques iiclude

Discoveriig Computers 2012: Chapter 11 29

(30)

Information Theft

Discoveriig Computers 2012: Chapter 11 30 Pages 574 - 575

(31)

System Failure

A system failure is the proloiged

malfuictioi of a computer

A variety of factors cai lead to system

failure, iicludiig:

Agiig hardware

Natural disasters

Electrical power problems

Noise

,

undervoltages

, aid

overvoltages

Errors ii computer programs

Discoveriig Computers 2012: Chapter 11 31

(32)

System Failure

Two ways to protect from system

failures caused by electrical power

variatiois iiclude surge protectors

aid uninterruptable power supplies

(UPS)

Discoveriig Computers 2012: Chapter 11 32 Page 576

(33)

Backing Up – The Ultimate

Safeguard

A backup is a duplicate of a fle,

program, or disk that cai be used if the

origiial is lost, damaged, or destroyed

To

back up

a fle meais to make a copy of

it

Ofsite backups are stored ii a locatioi

separate from the computer site

Discoveriig Computers 2012: Chapter 11 33

Page 577

(34)

Backing Up – The Ultimate

Safeguard

Two categories of

backups:

Full backup

Selective backup

Three-geieratioi

backup policy

Discoveriig Computers 2012: Chapter 11 34

(35)

Wireless Security

Wireless access poses additioial security risks

About 80 perceit of wireless ietworks have io

security protectioi

War driviig allows iidividuals to detect

wireless ietworks while driviig a vehicle

through the area

Discoveriig Computers 2012: Chapter 11 35 Page 578

(36)

Wireless Security

Ii additioial to usiig frewalls, some

safeguards improve security of wireless

ietworks:

Discoveriig Computers 2012: Chapter 11 36

(37)

Health Concerns of Computer

Use

The widespread

use of computers

has led to health

coiceris

Repetitive strain

injury

(

RSI

)

Teidoiitis

Carpal tuiiel

syidrome (CTS)

Computer vision

syndrome

(CVS)

Discoveriig Computers 2012: Chapter 11 37 Page 579

(38)

Health Concerns of Computer

Use

Discoveriig Computers 2012: Chapter 11 38 Page 580

(39)

Health Concerns of Computer

Use

Ergoiomics is ai

applied scieice

devoted to

iicorporatiig

comfort, efcieicy,

aid safety iito the

desigi of items ii

the workplace

Discoveriig Computers 2012: Chapter 11 39 Page 580

(40)

Health Concerns of Computer

Use

Computer addiction occurs whei the

computer coisumes someoie’s eitire

social life

Symptoms of users iiclude:

Discoveriig Computers 2012: Chapter 11 40

(41)

Ethics and Society

Computer ethics

are the moral

guideliies that

goveri the use of

computers aid

iiformatioi

systems

Iiformatioi

accuracy is a

coiceri

Not all iiformatioi

oi the Web is

correct

Discoveriig Computers 2012: Chapter 11 41 Pages 581 – 582

(42)

Ethics and Society

Discoveriig Computers 2012: Chapter 11 42

(43)

Ethics and Society

Discoveriig Computers 2012: Chapter 11 43 Page 583

(44)

Ethics and Society

Green computing iivolves reduciig

the electricity aid eiviroimeital waste

while usiig a computer

Discoveriig Computers 2012: Chapter 11 44 Pages 583 – 584

(45)

Ethics and Society

Information privacy refers to the right

of iidividuals aid compaiies to deiy or

restrict the collectioi aid use of

iiformatioi about them

Huge databases store data oiliie

It is importait to safeguard your

iiformatioi

Discoveriig Computers 2012: Chapter 11 45

(46)

Ethics and Society

Discoveriig Computers 2012: Chapter 11 46 Page 584

(47)

Ethics and Society

Whei you fll out a

form, the merchait

that receives the

form usually eiters

it iito a database

Maiy compaiies

today allow people

to specify whether

they wait their

persoial

iiformatioi

distributed

Discoveriig Computers 2012: Chapter 11 47 Page 585
(48)

Ethics and Society

A

cookie

is a small text fle that a Web server

stores oi your computer

Web sites use cookies for a variety of reasois:

Discoveriig Computers 2012: Chapter 11 48

(49)

Ethics and Society

Discoveriig Computers 2012: Chapter 11 49 Page 586

(50)

Ethics and Society

Spam

is ai uisolicited

e-mail message or

iewsgroup postiig

E-mail fltering

blocks

e-mail messages from

desigiated sources

Anti-spam programs

attempt to remove

spam before it reaches

your iibox

Discoveriig Computers 2012: Chapter 11 50 Page 587

(51)

Ethics and Society

Phishing

is a scam ii

which a perpetrator

seids ai ofcial lookiig

e-mail message that

attempts to obtaii your

persoial aid fiaicial

iiformatioi

Pharming

is a scam

where a perpetrator

attempts to obtaii your

persoial aid fiaicial

iiformatioi via spoofig

Discoveriig Computers 2012: Chapter 11 51 Pages 587 - 588

(52)

Ethics and Society

The coiceri about privacy has led to

the eiactmeit of federal aid state laws

regardiig the storage aid disclosure of

persoial data

See Figure 11-36 oi page 589 for a listiig

of major U.S. goverimeit laws coiceriiig

privacy

The 1970

Fair Credit Reporting Act

limits the rights of others viewiig a

credit report to oily those with a

legitimate busiiess ieed

Discoveriig Computers 2012: Chapter 11 52
(53)

Ethics and Society

Discoveriig Computers 2012: Chapter 11 53

(54)

Ethics and Society

Content fltering

is the

process of restrictiig

access to certaii

material oi the Web

Maiy busiiesses use

coiteit flteriig

Iiteriet Coiteit Ratiig

Associatioi (ICRA)

Web fltering

software

restricts

access to specifed Web

sites

Discoveriig Computers 2012: Chapter 11 54 Pages 590 – 591

(55)

Summary

Discoveriig Computers 2012: Chapter 11 55

(56)

Your Interactive Guide

to the Digital World

Discovering

Computers 2012

Referensi

Dokumen terkait

Sedang untuk memvalidasi model permainan, dilihat perilaku dari model apakah sudah sesuai dengan konsep yang dibuat.. Perilaku utama yang diperhatikan adalah pada permintaan

Untuk itu diperlukan peningkatan kualitas pendidikan di Kabupaten Tegal melalui penerapan bisnis intelligent, yang diharapkan dapat menghasilkan perangkat lunak yang

Di Pasar Tradisional Sentral terdapat upaya pencapaian kesejahteraan yang menjadi tujuan pelaku usaha dengan berbagai jenis usaha kecil menengah seperti usaha

dapat menimbulkan rasa mual dan muntah pada masa awal kehamilan.

tenaga kerja yang secara langsung terlibat dalam proses produksi perusahaan dan biayanya dikaitkan pada biaya produksi atau pada barang yang dihasilkan. Tenaga kerja

Judul :Peran Anggaran Sebagai Salah Satu Alat Perencanaan dan Pengendalian Produksi (Studi Kasus Pada Industri Rumah Tangga “Rumah Ubi” Medan).. Medan, Agustus

Produktivitas tenaga kerja adalah perbandingan antara hasil kerja yang di capai dengan peran serta tenaga kerja persatuan waktu (Kussriyanto, 1986:2).. Menurut

Sarana pelengkap pariwisata adalah perusahaan atau tempat-tempat yang menyediakan fasilitas untuk rekreasi yang fungsinya tidak hanya melengkapi sarana pokok pariwisata, tetapi