chap11 - Computer Science Department(CSD Centre for...

Info icon This preview shows pages 1–4. Sign up to view the full content.

FOSEE , MULTIMEDIA UNIVERSITY (436821-T) MELAKA CAMPUS, JALAN AYER KEROH LAMA, 75450 MELAKA, MALAYSIA. Tel 606 252 3594 Fax 606 231 8799 URL: Computer Science Department (CSD) Centre for Foundation Studies and Extension Education (FOSEE) PCA 0015 Computer Applications Foundation in Engineering ONLINE NOTES Chapter 11 Security
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

PCA0015 Computer Applications Chapter 11 Objectives: Upon completion of this topic, the students should be able to: Identify the various types of security risks that can threaten computers. Describe ways to safeguard a computer. Discuss techniques to prevent unauthorized computer access and use Describe how a computer virus works and the steps to prevent viruses. Discuss issues surrounding information privacy. 11.1 Computer Security & Privacy Comp. Security Risk - any event or action that could cause a loss of or damage to computer equipment/ hardware, software, data and information, or processing capabilities e.g. virus, hackers, disk crash, piracy, unauthorized access. Computer Crime - any illegal act involving a computer. Cybercrime – online or Internet-based illegal acts. Hackers (Cracker) - associated with people who try to break or access into computer system illegally with the intent of stealing or corrupting its data or simply for a challenge. o Usually they break into systems by connecting to the system via a modem and logging in as a user. Table below summarize the content of this chapter. Threats Safeguards Virus Antivirus Unauthorized Access/Use and Information Theft Username and Password User Identification / Authentication Possessed Objects e.g. cards Biometric Devices - fingerprints, facial features, voice, retinal patterns Encryption Software Piracy Business Software Alliance End User License Agreement System Failure Backup, Surge Protector, UPS Hackers Firewalls CSD Lecturer 2/12
Image of page 2
PCA0015 Computer Applications Chapter 11 11.2 Software Piracy Software piracy - an illegal duplication of copyrighted software. o When you purchased software, you do not own it. Instead you become a licensed user and you are bound to the End-User License Agreement (EULA) also known as Single-User License Agreement . o Usually it states users are permitted to: install to one computer only and make one copy for backup – users can either give or sell the software only if they removed the software from their computer first. Network/Site License gives the buyer the right to install on multiple computers at a single site. It is cheaper compared to purchasing individual license for each computer. Software piracy is a serious offence because it increases the chance of viruses, reduces your ability to receive technical support and drives up the price of software for all users.
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern