ITM%20215%20Class%20%209%20Feb%2017

ITM%20215%20Class%20%209%20Feb%2017 - Click to edit Master...

Info iconThis preview shows pages 1–9. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Click to edit Master subtitle style ITM 215: Computer Applications in Computer Security, Ethics & Privacy Objectives Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways to protect against software theft and information theft Discuss the types of devices available that protect computers from system failure Identify risks and safeguards associated with wireless communications Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next 33 Computer Safeguards Firewalls Viruses and antivirus software NEXT SLIDE Computer Security Risks What is a computer security risk ? Next Event or action that causes loss of or damage to computer system Discovering Computers Computer Security Risks A 55 { 7 0 D 9 D 1 9 3 -4 7 D C -4 6 7 -8 C 1 E -D 5 E 0 B 5 4 D 1 C } Hackers { F 6 F 8 7 1 C -8 7 2 -4 6 4 D -B E 7 1 -B E C A 6 4 2 9 2 D D 4 } Crackers { D 6 F 6 2 6 5 -2 9 0 A -4 0 C 6 -A 8 B 2 -1 5 2 7 F 2 3 5 A D 3 E } Script Kiddies { 5 6 9 6 B 1 7 -4 2 4 C -4 6 C E -B A 1 4 -C A A 9 1 6 C B 8 6 1 } Corporate Sp { 0 1 6 B E 9 F C -B 0 3 C -4 6 3 C -A F 7 6 -F E C 9 A 3 C 1 D D F D } hical Employees { E F 9 0 A C 3 6 -5 6 3 D -4 C 0 B -9 6 D 1 -4 D 3 A D 5 2 5 B 5 3 1 } Cyberextortionists { 8 F E B 0 6 4 3 -8 1 F 9 -4 7 E-8 A 2 3 -2 B D 1 D C 4 F 8 C D 8 } Cyberterrorists Discovering Computers Internet and Network Attacks 66 Information transmitted over networks has a higher degree of security risk than information kept on an organizations premises { 7 5 E 2 B 1 C 2 -7 C 8 3 -4 C 7 1 -A E 0 2 -1 B 8 A 5 5 9 8 D 7 3 } Computer Virus altering the way the computer works { 2 F 6 D 9 4 A-D E 4 D -4 D 8 D -B E B -7 3 7 2 7 4 0 5 2 6 7 } Worm d possibly shutting down the computer or network { 9 2 B 0 3 9 7-7 B 9 7 -4 C 3 A -9 7 F E -5 8 7 5 E 6 3 1 6 C } Trojan Horse { 9 3 1 3 B 8 4 -8 2 9 D -4 E 2 D -8 9 8 3 -1 7 C E 0 C A 3 F 5 B } ious program that hides within or looks like a legitimate program { D A D 9 A 2 1 D -2 3 E 6 -4 5 4 7 -9 7 C -9 4 9 2 9 5 0 4 8 F 2 6 } Rootkit omeone from a remote location to take full control Internet and Network Attacks Next CLICK TO STA Discovering Computers Internet and Network Attacks An infected computer has one or more of the following symptoms: 88 { D E 4 5 2 5 B F -1 6 B 7 -4 A B 1 -A E 7-0 1 A D A 5 9 8 3 9 4 2 } Operating system runs much slower than usua { 9 D 6 8 5 9 2 -F 4 9 0 -4 D 9 0 -8 8 B -5 D 9 7 A 1 B 4 C 3 5 } Available memory is less than expected { 7 3 9 0 C D 3 D -7 F 2 D -4 1 6 4 -A D A -C 8 B 2 9 7 5 B 7 5 } Files become corrupted { 2 B 6 A 7 6 5 8 -8 F 6 -4 E 8 E -9 F 7 6 -3 B A 7 8 B 1 F 0 A } Screen displays unusual message or image { 4 C 4 3 9 7 C -3 1 9 D -4 6 3 A -8 A 1-B E C 4 2 0 C 4 5 4 2 3 } sic or unusual sound plays randomly...
View Full Document

Page1 / 57

ITM%20215%20Class%20%209%20Feb%2017 - Click to edit Master...

This preview shows document pages 1 - 9. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online