CMPTR2_CH06 - CMPTR2 Chapter 6 Computer Network and...

Info icon This preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon
CMPTR2 Chapter 6 Computer, Network, and Internet Security and Privacy
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Learning Objectives LO6.1: Explain network and Internet security concerns LO6.2: Identify and protect against unauthorized access and use LO6.3: Identify and protect against computer sabotage LO6.4: Identify and protect against online theft, online fraud, and other dot cons LO6.5: Describe and protect against cyberstalking and other personal safety concerns LO6.6: Assess personal computer security and identify precautions LO6.7: Identify privacy concerns LO6.8: Discuss current security and privacy legislation CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 2
LO6.1: Understanding Security Concerns Computer crime —or cybercrime —includes any illegal act involving a computer. Cybercrime is a multibillion-dollar business that is often conducted by seasoned criminals. All computer users should be aware of the security concerns surrounding computer, network, and Internet use, and they should take appropriate precautions. CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
LO6.2: Unauthorized Access and Unauthorized Use Topics Covered: Hacking War Driving and Wi-FI Piggybacking Interception of Communications Protecting Against Unauthorized Access and Unauthorized Use CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 4
Hacking Hacking refers to the act of breaking into a computer or network. The increased number of systems controlled by computers and are connected to the Internet, along with the continually improving abilities of hackers and the increasing availability of sets of tools that allow hackers to access a system, has led to an increased risk of cyberterrorism —where terrorists launch attacks via the Internet. CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
War Driving and Wi-Fi Piggybacking War driving involves driving in a car with a portable computer looking for unsecured Wi-Fi networks to connect to. Wi-Fi piggybacking refers to accessing someone else’s unsecured Wi-Fi network without authorization CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 6
Interception of Communications Some criminals gain unauthorized access to data, files, email messages, VoIP calls, and other content as it is being sent over the Internet. A new trend is criminals intercepting credit and debit card information during the card verification process; that is, intercepting the data from a card in real time as a purchase is being authorized. CMPTR2 Chapter 6: Computer, Network, and Internet Security and Privacy
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Protecting Against Unauthorized Access and Unauthorized Use Part 1 Specific types of access control systems include the following: Possessed knowledge access system Possessed object access system Biometric access system Another way to control access to a computer or network is to use a firewall Firewall A collection of hardware and/or software that
Image of page 8
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern