Chapter11 - Chapter 11 Computers and Society, Security,...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
Chapter 11  Computers and  Society, Security,  Privacy, and Ethics
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, and Trojan horses Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect from system failure Explain the options available for backing up computer resources Identify safeguards that protect against Internet security risks Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
Background image of page 2
Computer Security Risks What is a computer security risk ? p. 568 Fig. 11-1 Next Action that causes loss of or damage to computer system
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Viruses, Worms, and Trojan Horses What are viruses , worms , and Trojan horses ? p. 569 Next Virus Virus is a potentially damaging computer program Worm Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse Trojan horse hides within or looks like legitimate program until triggered Payload Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive Can spread and damage files Does not replicate itself on other computers
Background image of page 4
Computer Viruses, Worms, and Trojan Horses How can a virus spread through an e-mail message? p. 570 Fig. 11-2 Next Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message. Step 2. They use the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a. Some users open the attachment and their computers become infected with the virus.
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Computer Viruses, Worms, and Trojan Horses How can you protect your system from a macro virus? p. 571 Fig. 11-3 Next Set macro security level in applications that allow you to write macros At medium security level, warning displays that document contains macro Macros are instructions saved in an application, such as word processing or spreadsheet program
Background image of page 6
What is an antivirus program ? p. 571 Fig. 11-4
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/21/2009 for the course CHEM 130 taught by Professor Kia during the Spring '09 term at Abraham Baldwin Agricultural College.

Page1 / 54

Chapter11 - Chapter 11 Computers and Society, Security,...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online