Chapter 10 - Discovering Computers Fundamentals 2010...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Objectives Overview {F9022B54-68C2-4973-9A00-460029290542} {30F67D94-5D4C-4863-97BD-6AE7259942E2} {7F713013-A8D4-484C-A53A-2EFE1EB7238D} {7C9AD736-DB5A-4D0E-B946-7622A6BC4679} safeguard Explainthese attacks, including and software theft unauthorized c dentify safeguards the ways toDiscuss techniques to and intrusioninformatio against against hardware theft firewalls prevent and detection protect against vandalism • See Discovering Computers 22 Objectives Overview {D106D101-98E2-4ADD-B050-08FB6FD9C7E3} {AD9FFE0A-58F6-42D3-92AF-7CBD7471ACBF} {7052F27B-5611-4B94-9CB4-562B798BCB26} {C8767A2A-1E1D-4BC9-8602-E621E492CDBE} ailable that protectsurroundingfrom system failure with wireless communic Discuss issues risks and safeguards prevent health-related disorders an Identify computers ways to associated Discuss information privacy • See Discovering Computers 33 Computer Security Risks {016BE9FC-B03C-463C-AF76-FEC9A3C1DDFD} {D6F66265-290A-40C6-A8B2-1527F235AD3E} {70D9D193-47DC-4467-8C1E-D5EE0B54D11C} {8FEB0643-81F9-47EE-8A23-2BD1DC4F8CD8} {F6F8771C-8772-464D-BE71-BECA64292DD4} {EF90AC36-563D-4C0B-96D1-4D3AD525B531} {5696BB17-424C-46CE-BA14-CAAA916CB861} thical Employees Script Kiddies Hackers Cyberterrorists Cyberextortionists Spie Crackers Corporate • • A Page Discovering Computers 44 Computer Security Risks • Page Discovering Computers 55 Internet and Network Attacks meone from a remote locationworks fullnetwork ltering the way the computer to take or control possibly shutting down the computer {2F6D94AA-DE4D-4D8D-BBEB-737274405267} {92B03977-7B97-4C3A-97FE-5875E663116C} {DAD9A21D-23E6-4547-997C-949295048F26} {75E2B1C2-7C83-4C71-AE02-1B8A55598D73} Worm Trojan Horse {99313B84-829D-4E2D-8983-17CE0CCA3F5B} Rootkit Computer Virus ous program that hides within or looks like a legitimate program • Infor Page Discovering Computers 66 Video: Attack of the Mobile Viruses CLICK TO START Discovering Computers 77 Internet and Network Attacks {38FBBEE2-4BD4-4DAD-B4A2-F2D8D407EE69} {7390CD3D-7F2D-4164-AADA-CC8B2975B775} {9D685592-F490-4D90-888B-5D97A1B4CC35} {5C4D1B0A-DF76-4D70-95F8-4B97FE6144DD} {4C43977C-319D-463A-8A11-BEC420C45423} {DE4525BF-16B7-4AB1-AE77-01ADA5983942} {2B6A7658-8FF6-4E8E-9F76-3BBA78B1F0AA} {76C9B584-6A6D-4B0D-B2F7-874B043B2348} {6F77428A-FB8D-45F0-B337-9802CFF30AC1} {1A7DE8ED-E7A4-4A38-88BC-72FFF859640A} {4B90A95C-363B-4011-BEA4-DD1DC53C9C38} s dobecome corrupted Screen displaysSystem properties or imagedoes filess ailable memory is less than expected much slower than usual les not work programs and filesrunsOperating system shuts down unexpect Existing Operating system disappear Music or unusual sound plays randomly properly unusual Unknownchange Operating programs or not message system • Page An Discovering Computers 88 Internet and Network Attacks • Page Discovering Computers 99 Internet and Network Attacks • • Users Page Discovering Computers 10 10 Internet and Network Attacks • Page Discovering Computers 11 11 Internet and Network Attacks • • A Page Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click DoS Attacks below Chapter 10 Discovering Computers 12 12 Internet and Network Attacks • Page A Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Firewalls below Chapter 10 Discovering Computers 13 13 Internet and Network Attacks m vulnerabilities uthorized intrusions or security breaches ious behavior patterns {B063F1B7-0C30-4DD8-88F3-D3C9E4D20C46} Intrusion detection software {7868AFC6-6AE1-4E55-A280-88977229DB45} Analyzes all network traffic Discovering Computers 14 14 • Page Unauthorized Access and Use {3DED217B-A318-4592-8029-50D66D5EB51E} {50EB3447-78BC-4133-A20A-1438776838F5} f a computer or Unauthorized access isor possiblya computer or network its data for unapproved the use of illegal activities • Page Discovering Computers 15 15 Unauthorized Access and Use • Page Acce Discovering Computers 16 16 Unauthorized Access and Use • • A Page Discovering Computers 17 17 Unauthorized Access and Use {4205E0C0-5518-4FE7-9487-D4114931CE69} {8742A9A6-8541-4CFF-B793-85FE98503E0E} {8D57D5BC-A845-4D34-B4C2-54EBDA115297} {FB0A3824-B2C7-4191-B5F3-E67582FBF58D} {3894292E-BF2C-4C3A-A40F-072251C76294} ion security Military intelligence enforcement departments Law Criminal prosecutors Insurance agencies • • Page Discovering Computers 18 18 Hardware Theft and Vandalism {FDF97B65-294A-4800-B50F-6D7AB5A28EB4} {6DC4F983-1E06-4A80-9DB9-2A825D0E4734} m is the act of defacing orHardware theft is theequipment destroying computer act of stealing computer e • Page Discovering Computers 19 19 Hardware Theft and Vandalism {61149069-137D-4949-BCB5-C4E9522E6C21} {F4B8A590-1D0C-445B-BEC1-BD7B2D179318} {0CF6C2AC-35AB-49EE-A250-85B555CACDE3} {0364B16C-50C0-4D9E-B344-31B9466F58A2} {4042F0C2-9CBF-40A6-867C-0D02309C2FA4} sessed objects, andsystems lock equipment AlarmCables to Real time location system controls biometrics Physical access • Page To Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click RTLS below Chapter 10 Discovering Computers 20 20 Software Theft {372E08D3-4B8A-408D-9EAA-A8039AD67AAA} {1E380033-6527-4EC5-9855-EB4A175832DD} {4B7ED587-CC9F-48D8-8CFF-817741309E4C} {48EF15F2-EB11-41BA-B426-F65795C610D4} Illegally copies a program erases programs Intentionally Illegally registers and/or activates software media Steals a program • • Page Discovering Computers 21 21 Software Theft eare on continuing to use the software e the software while a network software {8419C809-BA7F-4490-8FB6-CE9BD00D6B1E} {A49D5273-4C91-4480-87A0-B7A0DCCA0688} Permitted to {0101E626-B088-4BF4-8270-E830D042FF1D} {3DD8282B-CB79-4D00-B24E-74120895B68F} Not permitted to {07C77C41-F709-477C-9593-E4007E887A21} ake one copy of theInstall the software on one from your computer before g software Remove the software computer • • A Page Discovering Computers 22 22 Software Theft • Page Copyi Discovering Computers 23 23 Information Theft • • Page Discovering Computers 24 24 Information Theft • Page A Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Digital Certificates below Chapter 10 Discovering Computers 25 25 Information Theft • Page Discovering Computers 26 26 System Failure • Page A Discovering Computers 27 27 System Failure • Page Two Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Surge Protectors below Chapter 10 Discovering Computers 28 28 Backing Up – The Ultimate Safeguard Cloud Storage • Page A Discovering Computers 29 29 Backing Up – The Ultimate Safeguard {BE0444FC-57EE-4307-B583-265448FB388E} {2F3494B5-A5C8-4A4F-B27C-E972685E94AE} {551DD10D-755D-4F8E-8C77-3EA8D4275339} Child Grandparent Parent • Page Thre Two Discovering Computers 30 30 Wireless Security {5D9D80F9-685C-4D9E-9D6E-29DA6604686D} {9225F212-00AB-4516-BCFB-C745A4BDBFFC} {8B9D1A09-8687-4FF1-8045-D0458314D115} {537DD0AE-F86E-49B0-A687-0C59D64639A2} s point should notso that onlyan SSID devices Use accessor WPA2 security s onfigure a WAP broadcast certain Change thecan WPA it default SSID • • Wirele Page Discovering Computers 31 31 Health Concerns of Computer Use • Page The Discovering Computers 32 32 Health Concerns of Computer Use • Page Discovering Computers 33 33 Health Concerns of Computer Use • • Ergon Page Discovering Computers 34 34 Health Concerns of Computer Use {4F98CA2B-D3F7-46A7-AE72-8223889539E3} {1A79A563-B343-4697-B44C-9231C376BA6B} {C58CF508-7F8F-466D-A01A-5CB89D8CD2C7} {E2FEC5F2-5A2F-4F71-9E17-5AC398A2FDDF} {376E645D-9A89-47F7-A206-79C889110113} {8B174CE0-A74D-4D5D-A1E6-5B7A81F3ABA3} o stopProblems at work or schoolthe computerwhen notCraves computer tim computerOverjoy when at activity NeglectsIrritable and friends the computer family at • • Page Discovering Computers 35 35 Ethics and Society • • Page Discovering Computers 36 36 Ethics and Society {DB1986F8-D4D1-44B5-90D8-582D17462FA2} {F08B092C-0A9D-4044-AD83-EAF7FF22B620} lghts aremanagementwhich creators are entitled for their workdistribution o rights the rights to is a strategy designed to prevent illegal {69AF196F-824A-491B-AD9A-3327A0BB2454} ight protects any tangible form of expression • Page Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Digital Rights Management below Chapter 10 Discovering Computers 37 37 Ethics and Society • • Page Discovering Computers 38 38 Ethics and Society • • Page Discovering Computers 39 39 Ethics and Society • Page Discovering Computers 40 40 Ethics and Society • Page Whe Discovering Computers 41 41 Ethics and Society {755E1B00-33DA-4383-8E42-E89A9C4782B4} {482F9010-3F9B-4CC2-BB4D-DCFCD9946C1F} {2D23FCF3-DA31-4C64-95E0-46D8E43AA66F} {FCEAC508-40DA-40F5-9472-1BE45A9F606A} {14267D42-FA58-4C45-B23D-5BE98A53830A} Store users’ Target advertisements Allow for personalizationusers vi passwords Assist with online shopping how often Track Click to view Web Link, click Chapter 10, Click Web Link from left navigation, then click Cookies below Chapter 10 • • A Page Discovering Computers 42 42 Ethics and Society • Page Discovering Computers 43 43 Ethics and Society • • Page Discovering Computers 44 44 Ethics and Society • • Page Discovering Computers 45 45 Ethics and Society • Page The Discovering Computers 46 46 Ethics and Society {A6DA31B8-A182-4DC2-9CDE-7823C358F756} {3AC75245-3344-4BC8-A5C5-726A0A608448} ring is defined as gaining record, and review anor obtaining confidential in of computers to observe, unauthorized access employee’s use of a compu • Page Discovering Computers 47 47 Ethics and Society • • Page Discovering Computers 48 48 Summary {AB3C3CCF-5390-49C0-84F1-3066C184E841} {346513A8-8A58-469E-A19C-AB81AA2DC7D7} {AB9098A9-5F17-476C-AE3C-C3D64612AE42} {4BE61A80-F514-4E80-B78E-1A2FBAB1DD95} security risks and safeguards issues and preventions computerof conduct, gr ing information accuracy, intellectual property rights, codes risks and the Computer-related health Potential • Page Discovering Computers 49 49 Discovering Computers Fundamentals, 2010 Edition Living in a Digital World Chapter 10 Complete ...
View Full Document

This note was uploaded on 11/20/2010 for the course CSIS 182 taught by Professor Mike during the Spring '10 term at Grossmont.

Ask a homework question - tutors are online