chap11 - Computer Science Department (CSD) Centre for...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
FOSEE , MULTIMEDIA UNIVERSITY (436821-T) MELAKA CAMPUS, JALAN AYER KEROH LAMA, 75450 MELAKA, MALAYSIA. Tel 606 252 3594 Fax 606 231 8799 URL: http://fosee.mmu.edu.my/~csd/ Computer Science Department (CSD) Centre for Foundation Studies and Extension Education (FOSEE) PCA 0015 Computer Applications Foundation in Engineering ONLINE NOTES Chapter 11 Security
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
PCA0015 Computer Applications Chapter 11 Objectives: Upon completion of this topic, the students should be able to: Identify the various types of security risks that can threaten computers. Describe ways to safeguard a computer. Discuss techniques to prevent unauthorized computer access and use Describe how a computer virus works and the steps to prevent viruses. Discuss issues surrounding information privacy. Comp. Security Risk - any event or action that could cause a loss of or damage to computer equipment/ hardware, software, data and information, or processing capabilities e.g. virus, hackers, disk crash, piracy, unauthorized access. Computer Crime - any illegal act involving a computer. Cybercrime – online or Internet-based illegal acts. Hackers (Cracker) - associated with people who try to break or access into computer system illegally with the intent of stealing or corrupting its data or simply for a challenge. o Usually they break into systems by connecting to the system via a modem and logging in as a user. Table below summarize the content of this chapter. Threats Safeguards Virus Antivirus Unauthorized Access/Use and Information Theft Username and Password User Identification / Authentication Possessed Objects e.g. cards Biometric Devices - fingerprints, facial features, voice, retinal patterns Encryption Software Piracy Business Software Alliance End User License Agreement System Failure Backup, Surge Protector, UPS Hackers Firewalls CSD Lecturer 2/12
Background image of page 2
PCA0015 Computer Applications Chapter 11 11.2 Software Piracy Software piracy - an illegal duplication of copyrighted software. o When you purchased software, you do not own it. Instead you become a licensed user and you are bound to the End-User License Agreement (EULA) also known as Single-User License Agreement . o Usually it states users are permitted to: install to one computer only and make one copy for backup – users can either give or sell the software only if they removed the software from their computer first. Network/Site License gives the buyer the right to install on multiple computers at a single site. It is cheaper compared to purchasing individual license for each computer. Software piracy is a serious offence because it increases the chance of viruses, reduces your ability to receive technical support and drives up the price of software for all users. Business Software Alliance
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 06/16/2011 for the course ENGR 101 taught by Professor Ahmed during the Summer '11 term at Multimedia University, Cyberjaya.

Page1 / 12

chap11 - Computer Science Department (CSD) Centre for...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online