Chapter 11 - Discovering Computers 2010 Living in a Digital...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Discovering Computers 2010 Living in a Digital World Objectives Overview {3F29F98E-6E68-408E-A364-1DFF77488C25} {F9022B54-68C2-4973-9A00-460029290542} {4F4FE104-8FA0-47F1-9676-0459D867AFB5} {70DD0736-1409-431D-A9C5-90B681E23B60} {8CDC2BDE-5158-40D9-A44C-A397F0A05910} {A388F99D-FDF0-4B89-B3E8-D7682433D2E6} urity risks, andthe ways softwareand identify ways to safeguard software pi ntf unauthorizedbriefly describe the safeguards against hardware theft and v o Internet and network attacks, and use of how protect perpetratorsand exp Explain computer Identify types cybercrime against against the access manufacturers encryption works, Discuss • See Discovering Computers 2010: 22 Objectives Overview {995DB24F-C1ED-4B8D-8E31-65408741B8E0} {D106D101-98E2-4ADD-B050-08FB6FD9C7E3} {FCB4C511-18F6-4437-8C87-28A18F0F17C2} {16D3F1AD-B3AE-4A85-9897-A1B29176AB2F} {1090CE08-A355-4028-B7C1-69AA2B964F4E} {8AA2BA87-2AEB-4FEA-9ED5-97FDA9D298B3} evices prevent health-relatedcomputersand Discuss duecomputingwireless c ays to available that protect risksof conduct,injuries issues surrounding info tellectual property the options availablefromand green computer resources Explain rights, codes and safeguards associated with Identify disorders for backing up to computer use system failure • See Discovering Computers 2010: 33 Computer Security Risks {016BE9FC-B03C-463C-AF76-FEC9A3C1DDFD} {D6F66265-290A-40C6-A8B2-1527F235AD3E} {70D9D193-47DC-4467-8C1E-D5EE0B54D11C} {8FEB0643-81F9-47EE-8A23-2BD1DC4F8CD8} {F6F8771C-8772-464D-BE71-BECA64292DD4} {EF90AC36-563D-4C0B-96D1-4D3AD525B531} {5696BB17-424C-46CE-BA14-CAAA916CB861} thical Employees Script Kiddies Hackers Cyberterrorists Cyberextortionists Spie Crackers Corporate • • A Page Discovering Computers 2010: 44 Computer Security Risks • Page Discovering Computers 2010: 55 Internet and Network Attacks • • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11 Infor Page Discovering Computers 2010: 66 Internet and Network Attacks meone from a remote locationworks fullnetwork ltering the way the computer to take or control possibly shutting down the computer {2F6D94AA-DE4D-4D8D-BBEB-737274405267} {92B03977-7B97-4C3A-97FE-5875E663116C} Worm {DAD9A21D-23E6-4547-997C-949295048F26} Trojan Horse {75E2B1C2-7C83-4C71-AE02-1B8A55598D73} Rootkit Computer Virus {99313B84-829D-4E2D-8983-17CE0CCA3F5B} ous program that hides within or looks like a legitimate program • Page Discovering Computers 2010: 77 Video: Attack of the Mobile Viruses CLICK TO START Discovering Computers 2010: 88 Internet and Network Attacks {38FBBEE2-4BD4-4DAD-B4A2-F2D8D407EE69} {7390CD3D-7F2D-4164-AADA-CC8B2975B775} {9D685592-F490-4D90-888B-5D97A1B4CC35} {5C4D1B0A-DF76-4D70-95F8-4B97FE6144DD} {4C43977C-319D-463A-8A11-BEC420C45423} {DE4525BF-16B7-4AB1-AE77-01ADA5983942} {2B6A7658-8FF6-4E8E-9F76-3BBA78B1F0AA} {76C9B584-6A6D-4B0D-B2F7-874B043B2348} {6F77428A-FB8D-45F0-B337-9802CFF30AC1} {1A7DE8ED-E7A4-4A38-88BC-72FFF859640A} {4B90A95C-363B-4011-BEA4-DD1DC53C9C38} s dobecome corrupted Screen displaysSystem properties or imagedoes filess ailable memory is less than expected much slower than usual les not work programs and filesrunsOperating system shuts down unexpect Existing Operating system disappear Music or unusual sound plays randomly properly unusual Unknownchange Operating programs or not message system • Page An Discovering Computers 2010: 99 Internet and Network Attacks • Page Discovering Computers 2010: 10 10 Internet and Network Attacks • • Users Page Discovering Computers 2010: 11 11 Internet and Network Attacks • Page Discovering Computers 2010: 12 12 Internet and Network Attacks • • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click DoS Attacks below Chapter 11 A Page Discovering Computers 2010: 13 13 Internet and Network Attacks Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Firewalls below Chapter 11 • Page A Discovering Computers 2010: 14 14 Internet and Network Attacks m vulnerabilities uthorized intrusions or security breaches ious behavior patterns {B063F1B7-0C30-4DD8-88F3-D3C9E4D20C46} {21C0A68A-33BB-4ABA-B401-20E380EFD379} Intrusion detection software {7868AFC6-6AE1-4E55-A280-88977229DB45} Honeypot {06433E97-8196-454B-90F7-E1D41C0D42C1} Analyzes all network traffic Vulnerable computer that is set up to entice an intruder • Page Discovering Computers 2010: 15 15 Unauthorized Access and Use {3DED217B-A318-4592-8029-50D66D5EB51E} {50EB3447-78BC-4133-A20A-1438776838F5} f a computer or Unauthorized access isor possiblya computer or network its data for unapproved the use of illegal activities • Page Discovering Computers 2010: 16 16 Unauthorized Access and Use • Page Orga Discovering Computers 2010: 17 17 Unauthorized Access and Use • Page Acce Discovering Computers 2010: 18 18 Unauthorized Access and Use • • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Biometric Devices below Chapter 11 A Page Discovering Computers 2010: 19 19 Unauthorized Access and Use {4205E0C0-5518-4FE7-9487-D4114931CE69} {8742A9A6-8541-4CFF-B793-85FE98503E0E} {8D57D5BC-A845-4D34-B4C2-54EBDA115297} {FB0A3824-B2C7-4191-B5F3-E67582FBF58D} {3894292E-BF2C-4C3A-A40F-072251C76294} ion security Military intelligence enforcement departments Law Criminal prosecutors Insurance agencies • • Page Discovering Computers 2010: 20 20 Hardware Theft and Vandalism {FDF97B65-294A-4800-B50F-6D7AB5A28EB4} {6DC4F983-1E06-4A80-9DB9-2A825D0E4734} m is the act of defacing orHardware theft is theequipment destroying computer act of stealing computer e • Page Discovering Computers 2010: 21 21 Hardware Theft and Vandalism {61149069-137D-4949-BCB5-C4E9522E6C21} {F4B8A590-1D0C-445B-BEC1-BD7B2D179318} {0CF6C2AC-35AB-49EE-A250-85B555CACDE3} {0364B16C-50C0-4D9E-B344-31B9466F58A2} {4042F0C2-9CBF-40A6-867C-0D02309C2FA4} sessed objects, andsystems lock equipment AlarmCables to Real time location system controls biometrics Physical access Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click RTLS below Chapter 11 • Page To Discovering Computers 2010: 22 22 Software Theft {372E08D3-4B8A-408D-9EAA-A8039AD67AAA} {1E380033-6527-4EC5-9855-EB4A175832DD} {48EF15F2-EB11-41BA-B426-F65795C610D4} {4B7ED587-CC9F-48D8-8CFF-817741309E4C} Illegally copies a program erases programs Intentionally Steals software media and/or activates a Illegally registers • • Page Discovering Computers 2010: 23 23 Software Theft eare on continuing to use the software e the software while a network software {8419C809-BA7F-4490-8FB6-CE9BD00D6B1E} {A49D5273-4C91-4480-87A0-B7A0DCCA0688} Permitted to {0101E626-B088-4BF4-8270-E830D042FF1D} Not permitted to {3DD8282B-CB79-4D00-B24E-74120895B68F} {07C77C41-F709-477C-9593-E4007E887A21} ake one copy of theInstall the software on one from your computer before g software Remove the software computer • • A Page Discovering Computers 2010: 24 24 Software Theft • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11 Page Copyi Discovering Computers 2010: 25 25 Information Theft • • Page Discovering Computers 2010: 26 26 Information Theft • Page Discovering Computers 2010: 27 27 Information Theft • Page A Discovering Computers 2010: 28 28 Information Theft {CC6A4F6B-514E-4B07-B19D-7E7774849BBD} {72220EAF-25C6-44A1-AB40-B84D6D3418C5} {1402AE8E-3739-44AA-A964-1149E467C24B} {8975DAE9-9122-4642-9F94-67B5BF402386} Digital Certificates Security (TLS) Transport Layer Secure HTTP • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11 Page Popul Discovering Computers 2010: VPN 29 29 Information Theft • Page Discovering Computers 2010: 30 30 System Failure • Page A Discovering Computers 2010: 31 31 System Failure • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Surge Protectors below Chapter 11 Page Two Discovering Computers 2010: 32 32 Backing Up – The Ultimate Safeguard Cloud Storage • Page A Discovering Computers 2010: 33 33 Backing Up – The Ultimate Safeguard {BE0444FC-57EE-4307-B583-265448FB388E} {2F3494B5-A5C8-4A4F-B27C-E972685E94AE} {551DD10D-755D-4F8E-8C77-3EA8D4275339} Child Grandparent Parent • Page Thre Two Discovering Computers 2010: 34 34 Wireless Security • • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click War Driving below Chapter 11 Wirele Page Discovering Computers 2010: 35 35 Wireless Security {5D9D80F9-685C-4D9E-9D6E-29DA6604686D} {9225F212-00AB-4516-BCFB-C745A4BDBFFC} {8B9D1A09-8687-4FF1-8045-D0458314D115} {537DD0AE-F86E-49B0-A687-0C59D64639A2} ss access point should not broadcast UseSSID or WPA2 security standards Configure a WAP so that only certainthe default SSID it Change devices can access an WPA • Page In Discovering Computers 2010: 36 36 Health Concerns of Computer Use • Page The Discovering Computers 2010: 37 37 Health Concerns of Computer Use • Page Discovering Computers 2010: 38 38 Health Concerns of Computer Use • • Ergon Page Discovering Computers 2010: 39 39 Health Concerns of Computer Use {4F98CA2B-D3F7-46A7-AE72-8223889539E3} {1A79A563-B343-4697-B44C-9231C376BA6B} {C58CF508-7F8F-466D-A01A-5CB89D8CD2C7} {E2FEC5F2-5A2F-4F71-9E17-5AC398A2FDDF} {376E645D-9A89-47F7-A206-79C889110113} {8B174CE0-A74D-4D5D-A1E6-5B7A81F3ABA3} o stopProblems at work or schoolthe computerwhen notCraves computer tim computerOverjoy when at activity NeglectsIrritable and friends the computer family at • • Page Discovering Computers 2010: 40 40 Ethics and Society • • Page Discovering Computers 2010: 41 41 Ethics and Society {DB1986F8-D4D1-44B5-90D8-582D17462FA2} {F08B092C-0A9D-4044-AD83-EAF7FF22B620} code areconduct isto writtencreators are entitled for their work ghts of the rights a which guideline that helps determine whether a spec {69AF196F-824A-491B-AD9A-3327A0BB2454} ight protects any tangible form of expression • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11 Page Discovering Computers 2010: 42 42 Ethics and Society • Page Discovering Computers 2010: 43 43 Ethics and Society • • Page Discovering Computers 2010: 44 44 Ethics and Society • • Page Discovering Computers 2010: 45 45 Ethics and Society • Page Discovering Computers 2010: 46 46 Ethics and Society • Page Whe Discovering Computers 2010: 47 47 Ethics and Society {755E1B00-33DA-4383-8E42-E89A9C4782B4} {482F9010-3F9B-4CC2-BB4D-DCFCD9946C1F} {2D23FCF3-DA31-4C64-95E0-46D8E43AA66F} {FCEAC508-40DA-40F5-9472-1BE45A9F606A} {14267D42-FA58-4C45-B23D-5BE98A53830A} Store users’ Target advertisements Allow for personalizationusers vi passwords Assist with online shopping how often Track • • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Cookies below Chapter 11 A Page Discovering Computers 2010: 48 48 Ethics and Society • Page Discovering Computers 2010: 49 49 Ethics and Society • • Page Discovering Computers 2010: 50 50 Ethics and Society • • Page Discovering Computers 2010: 51 51 Ethics and Society • Page The Discovering Computers 2010: 52 52 Ethics and Society {A6DA31B8-A182-4DC2-9CDE-7823C358F756} {3AC75245-3344-4BC8-A5C5-726A0A608448} ring is defined as gaining record, and review anor obtaining confidential in of computers to observe, unauthorized access employee’s use of a compu • Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Social Engineering below Chapter 11 Page Discovering Computers 2010: 53 53 Ethics and Society • • Page Discovering Computers 2010: 54 54 Summary {AB3C3CCF-5390-49C0-84F1-3066C184E841} {346513A8-8A58-469E-A19C-AB81AA2DC7D7} {AB9098A9-5F17-476C-AE3C-C3D64612AE42} {4BE61A80-F514-4E80-B78E-1A2FBAB1DD95} security risks and safeguards issues and preventions computerof conduct, gr ing information accuracy, intellectual property rights, codes risks and the Computer-related health Potential • Page Discovering Computers 2010: 55 55 Discovering Computers 2010 Living in a Digital World Chapter 11 Complete ...
View Full Document

This note was uploaded on 06/08/2011 for the course COMPUTER CGS2100 taught by Professor Sanders during the Spring '09 term at Florida State College.

Ask a homework question - tutors are online