• Tidak ada hasil yang ditemukan

Chapter 11 Chapter 11 Chapter 11 Chapter 11 Computer Security, Computer Security, Computer Security, Computer Security, Ethics and Privacy Ethics and Privacy Ethics and Privacy Ethics and Privacy

N/A
N/A
Protected

Academic year: 2023

Membagikan "Chapter 11 Chapter 11 Chapter 11 Chapter 11 Computer Security, Computer Security, Computer Security, Computer Security, Ethics and Privacy Ethics and Privacy Ethics and Privacy Ethics and Privacy"

Copied!
3
0
0

Teks penuh

(1)

1 Discovering Computers 2008

Chapter 11 Chapter 11 Chapter 11 Chapter 11 Computer Security, Computer Security, Computer Security, Computer Security, Ethics and Privacy Ethics and Privacy Ethics and Privacy Ethics and Privacy

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

What are viruses, worms, and Trojan horses?

p. 558 Next

Virus Virusis a potentially damaging computer program

Worm Wormcopies itself repeatedly,

using up resources and possibly shutting down

computer or network

Trojan horse Trojan horsehides

within or looks like

legitimate program until

triggered

Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive Can spread

and damage

files

Does not replicate itself on other computers

Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks

How can a virus spread through an e-mail message?

p. 559 Fig. 11-2 Next

Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message.

Step 2. They use the Internet to send the e-mail message to thousands of users around the world.

Step 3b. Other users do not recognize the name of the sender of the e-mail message.

These users do not open the e-mail message. Instead they delete the e-mail message.

These users’ computers are not infected with the virus.

Step 3a. Some users open the attachment and their computers become infected with the virus.

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

Video: Attack of the Mobile Viruses

Next

CLICK TO START

Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks

How can you protect your system from a macro virus?

p. 560 Fig. 11-3 Next

Set macro security level in applications that allow you to write macros

Set security level so that warning displays that document contains macro

Macrosare instructions saved in an application, such as word processing or spreadsheet program

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

What is an antivirus program?

p. 560 - 561 Fig. 11-4 Next

Identifies and removes computer viruses

Most also protect against worms and Trojan horses

(2)

2

Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks

What is a virus signature?

p. 561 Fig. 11-5 Next

Specific pattern of virus code Also called virus definition Antivirus programs

look for virus signatures

Keeps file in separate area of hard disk

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

How does an antivirus program inoculatea program file?

p. 561 Next

Records Records information information about program such about program such as file size and as file size and creation creation date

date Attempts Attempts to remove to remove any detected any detected

virus virus Uses

Uses information information to detect if to detect if virus tampers virus tampers with file with file

Quarantines Quarantines infected infected files that it files that it cannot cannot remove remove

Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks

What are some tips for preventing virus, worm, and Trojan horse infections?

p. 562 Next

Install a personal firewall program If the antivirus

program flags an e-mail attachment as infected, delete the attachment

immediately Never start a computer with removable media

inserted

Never open an e-mail attachment

unless you are expecting it and

it is from a trusted source Install an antivirus

program on all of your computers

Check all downloaded programs for viruses, worms, or Trojan horses

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Virus Hoaxes below Chapter 11

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

What are a denial of service attack,back door and spoofing?

p. 562 and 563 Next

A denial of service attackis an assault which disrupts computer access to an Internet service

such as the Web or e-mail

A back dooris a program or set of instructions in a program that allow users to bypass security controls when accessing a computer

resource Spoofingis a technique intruders use to make

their network or Internet transmission appear legitimate to a victim computer or

network

Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks Internet and Network Attacks

What is a firewall?

p. 563 Fig. 11-7 Next

Security system consisting of hardware and/or software that prevents unauthorized intrusion

Internet and Network Attacks Internet and Network AttacksInternet and Network Attacks Internet and Network Attacks

What is a personal firewall?

p. 564 Fig. 11-8 Next

Program that protects personal computer and its data from unauthorized intrusions

Monitors transmissions to and from computer

Informs you of attempted intrusion

Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Personal Firewall Software below Chapter 11

(3)

3

Unauthorized Access and Use Unauthorized Access and Use Unauthorized Access and Use Unauthorized Access and Use

How can companies protect against hackers?

p. 564 - 565 Next

Intrusion detection software Intrusion detection software analyzes network traffic, assesses analyzes network traffic, assesses system vulnerabilities, and identifies system vulnerabilities, and identifies intrusions and suspicious behavior intrusions and suspicious behavior

Access control defines who Access control defines who can access computer and can access computer and what actions they can take what actions they can take

Audit trail

Audit trail records access records access attempts attempts

Unauthorized Access and Use Unauthorized Access and UseUnauthorized Access and Use Unauthorized Access and Use

What are other ways to protect your personal computer?

p. 565 Fig. 11-9 Next

Disable file and printer sharing on Internet connection

Unauthorized Access and Use Unauthorized Access and Use Unauthorized Access and Use Unauthorized Access and Use

What is a user name?

p. 566 Fig. 11-10 Next

Unique combination of characters that identifies user

Passwordis private combination of characters associated with the user name that allows access to computer resources

Referensi

Dokumen terkait

falciparum 2300 strain that was synchronized in the control group, treated by artemisinin exposure at IC50 concentration and observed every 12 hours, from 0 to 48 hours showed normal