chapter 11

56
Living in a Digital World Discovering Computers 2010

Upload: mohd-khairil-borhanudin

Post on 22-Jan-2015

1.981 views

Category:

Education


3 download

DESCRIPTION

 

TRANSCRIPT

  • 1. DiscoveringComputers 2010Living in a Digital World

2. Objectives OverviewDefine the term,Describe various types Discuss techniques tocomputer security risks, of Internet and network prevent unauthorizedand briefly describe the attacks, and identify computer access andtypes of cybercrimeways to safeguarduse perpetratorsagainst these attacks Explain the ways Identify safeguards Discuss how encryption software manufacturers against hardware theftworks, and explain whyprotect against and vandalismit is necessary software piracySee Page 555 Discovering Computers 2010: Living in a Digital World 2for Detailed Objectives Chapter 11 3. Objectives OverviewDiscuss the types ofIdentify risks andExplain the options devices available that safeguards associatedavailable for backing upprotect computers from with wirelesscomputer resources system failurecommunications Recognize issues relatedDiscuss ways to prevent to information accuracy, Discuss issueshealth-related disordersintellectual propertysurrounding informationand injuries due to rights, codes of conduct, privacy computer use and green computingSee Page 555 Discovering Computers 2010: Living in a Digital World3for Detailed Objectives Chapter 11 4. Computer Security Risks A computer security risk is any event or action that couldcause a loss of or damage to computer hardware,software, data, information, or processing capability A cybercrime is an online or Internet-based illegal act HackersCrackersScript KiddiesCorporate SpiesUnethicalCyberextortionistsCyberterrorists EmployeesPages 556 - 557 Discovering Computers 2010: Living in a Digital World 4 Chapter 11 5. Computer Security RisksPages 556 557 Discovering Computers 2010: Living in a Digital World 5Figure 11-1Chapter 11 6. Internet and Network Attacks Information transmitted over networks has a higherdegree of security risk than information kept on anorganizations premises An online security service is a Web site that evaluatesyour computer to check for Internet and e-mailvulnerabilitiesClick to view Web Link,click Chapter 11, Click WebLink from left navigation,then click ComputerEmergency Response TeamCoordination Center belowChapter 11Page 558Discovering Computers 2010: Living in a Digital World 6Figure 11-2Chapter 11 7. Internet and Network AttacksComputer WormTrojan HorseRootkitVirus Affects a Copies itself A malicious Program thatcomputerrepeatedly,program that hides in anegatively by using up hides within computeraltering theresourcesor looks likeand allowsway the and possibly a legitimate someonecomputershutting programfrom aworks down theremotecomputer or location tonetwork take fullcontrolPage 558Discovering Computers 2010: Living in a Digital World7 Chapter 11 8. Video: Attack of the Mobile Viruses CLICK TO STARTDiscovering Computers 2010: Living in a Digital World 8 Chapter 11 9. Internet and Network Attacks An infected computer has one or more of thefollowing symptoms:Operating systemAvailable memoryScreen displays Files becomeruns much slower is less thanunusual message corrupted than usual expected or imageUnknownMusic or unusualPrograms or filesExisting programsprograms or files sound playsdo not workand files disappearmysteriouslyrandomlyproperly appearOperating systemSystem propertiesOperating systemshuts down changedoes not start up unexpectedlyPages 558 - 559Discovering Computers 2010: Living in a Digital World 9Chapter 11 10. Internet and Network AttacksPage 559Discovering Computers 2010: Living in a Digital World 10Figure 11-3Chapter 11 11. Internet and Network Attacks Users can take severalprecautions to protecttheir home and workcomputers and mobiledevices from thesemalicious infectionsPage 560 561Discovering Computers 2010: Living in a Digital World 11Figure 11-7Chapter 11 12. Internet and Network AttacksPage 561Discovering Computers 2010: Living in a Digital World 12Figure 11-6Chapter 11 13. Internet and Network Attacks A botnet is a group of compromised computers connected to anetwork A compromised computer is known as a zombie A denial of service attack (DoS attack) disrupts computer access toInternet services Distributed DoS (DDoS) A back door is a program or set of instructions in a program thatallow users to bypass security controls Spoofing is a technique intruders use to make their network orInternet transmission appear legitimate Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click DoS Attacks below Chapter 11Pages 562 - 563Discovering Computers 2010: Living in a Digital World 13Chapter 11 14. Internet and Network Attacks A firewall is hardware and/or software thatprotects a networks resources from intrusion Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Firewalls below Chapter 11Pages 563 - 564Discovering Computers 2010: Living in a Digital World 14Figure 11-8 Chapter 11 15. Internet and Network Attacks Intrusion detection software Analyzes all network traffic Assesses system vulnerabilities Identifies any unauthorized intrusions Notifies network administrators of suspicious behaviorpatterns or security breaches Honeypot Vulnerable computer that is set up to entice an intruder tobreak into itPage 564 Discovering Computers 2010: Living in a Digital World 15Chapter 11 16. Unauthorized Access and UseUnauthorized access is Unauthorized use is the the use of a computer oruse of a computer or its network without data for unapproved orpermission possibly illegal activitiesPage 564 Discovering Computers 2010: Living in a Digital World 16Chapter 11 17. Unauthorized Access and Use Organizations takeseveral measures tohelp preventunauthorized accessand use Acceptable use policy Disable file and printer sharing Firewalls Intrusion detection softwarePage 565 Discovering Computers 2010: Living in a Digital World 17Figure 11-10Chapter 11 18. Unauthorized Access and Use Access controls define who can access acomputer, when they can access it, and whatactions they can take Two-phase processes called identification andauthentication User name Password CAPTCHAPages 565 566Discovering Computers 2010: Living in a Digital World 18Figure 11-11Chapter 11 19. Unauthorized Access and Use A possessed object is any A biometric deviceitem that you must carry toauthenticates a personsgain access to a computeridentity by translating aor computer facility personal characteristic into Often are used in a digital code that is combination with a personal compared with a digital identification number (PIN) code in a computer Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Biometric Devices below Chapter 11Page 568Discovering Computers 2010: Living in a Digital World 19Figure 11-14 Chapter 11 20. Unauthorized Access and Use Digital forensics is the discovery, collection, andanalysis of evidence found on computers andnetworks Many areas use digital forensics Law Criminal Military enforcement prosecutorsintelligence Information Insurance securityagencies departmentsPage 569 Discovering Computers 2010: Living in a Digital World 20Chapter 11 21. Hardware Theft and Vandalism Hardware vandalismHardware theft is the is the act of defacing act of stealingor destroyingcomputer equipment computer equipmentPage 570Discovering Computers 2010: Living in a Digital World 21 Chapter 11 22. Hardware Theft and Vandalism To help reduce the of chances of theft, companiesand schools use a variety of security measures Cables to lock Physical access controlsAlarm systemsequipmentReal time location Passwords, possessedsystemobjects, and biometrics Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click RTLS below Chapter 11Page 570 Discovering Computers 2010: Living in a Digital World22Figure 11-15Chapter 11 23. Software Theft Software theft occurs when someone: Steals softwareIntentionally mediaerases programs Illegally Illegally copies aregisters and/orprogram activates a programPage 571 Discovering Computers 2010: Living in a Digital World23Chapter 11 24. Software Theft A single-user license agreement typically contains thefollowing conditions:Permitted to Install the software on one computer Make one copy of the software Remove the software from your computer before giving it away or selling itNot permitted to Install the software on a network Give copies to friends or colleagues while continuing to use the software Export the software Rent or lease the softwarePage 571Discovering Computers 2010: Living in a Digital World 24 Chapter 11 25. Software Theft Copying, loaning,borrowing, renting, ordistributing softwarecan be a violation ofcopyright law Some software requiresproduct activation tofunction fully Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11Pages 571 572 Discovering Computers 2010: Living in a Digital World 25Figure 11-16 Chapter 11 26. Information Theft Information theft occurs when someone stealspersonal or confidential information Encryption is a process of converting readabledata into unreadable characters to preventunauthorized accessPages 572 - 573 Discovering Computers 2010: Living in a Digital World 26Figure 11-17 Chapter 11 27. Information TheftPage 573 Discovering Computers 2010: Living in a Digital World 27Figure 11-18Chapter 11 28. Information Theft A digital signature is an encrypted code that aperson, Web site, or organization attaches to anelectronic message to verify the identity of thesender Often used to ensure that an impostor is notparticipating in an Internet transaction Web browsers and Web sites use encryptiontechniquesPage 574 Discovering Computers 2010: Living in a Digital World 28Chapter 11 29. Information Theft Popular security techniques include Digital Transport Layer Certificates Security (TLS) Secure HTTP VPN Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Certificates below Chapter 11Pages 574 - 575Discovering Computers 2010: Living in a Digital World 29Chapter 11 30. Information TheftPages 574 - 575 Discovering Computers 2010: Living in a Digital World 30Figures 11-19 11-20Chapter 11 31. System Failure A system failure is the prolonged malfunction of acomputer A variety of factors can lead to system failure,including: Aging hardware Natural disasters Electrical power problems Noise, undervoltages, and overvoltages Errors in computer programsPage 575 Discovering Computers 2010: Living in a Digital World 31Chapter 11 32. System Failure Two ways to protect from system failures causedby electrical power variations include surgeprotectors and uninterruptable power supplies(UPS) Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Surge Protectors below Chapter 11Page 576 Discovering Computers 2010: Living in a Digital World 32Figures 11-21 11-22 Chapter 11 33. Backing Up The Ultimate Safeguard A backup is a duplicate of a file, program, or diskthat can be used if the original is lost, damaged,or destroyed To back up a file means to make a copy of it Offsite backups are stored in a location separatefrom the computer site CloudStoragePage 577Discovering Computers 2010: Living in a Digital World 33 Chapter 11 34. Backing Up The Ultimate Safeguard Two categories of Three-generationbackups: backup policy Full backup Grandparent Selective backup ParentChildPage 577Discovering Computers 2010: Living in a Digital World 34 Chapter 11 35. Wireless Security Wireless access poses additional security risks About 80 percent of wireless networks have no security protection War driving allows individuals to detect wirelessnetworks while driving a vehicle through the area Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click War Driving below Chapter 11Page 578 Discovering Computers 2010: Living in a Digital World 35Figure 11-23Chapter 11 36. Wireless Security In additional to using firewalls, some safeguardsimprove security of wireless networks: A wireless access Change the defaultpoint should not SSID broadcast an SSIDConfigure a WAP so that onlyUse WPA or WPA2 certain devices can security standards access itPage 578Discovering Computers 2010: Living in a Digital World 36 Chapter 11 37. Health Concerns of Computer Use The widespread use ofcomputers has led tohealth concerns Repetitive strain injury (RSI) Carpal tunnel syndrome (CTS) Computer vision syndrome (CVS)Page 579Discovering Computers 2010: Living in a Digital World 37Figure 11-24 Chapter 11 38. Health Concerns of Computer UsePage 580 Discovering Computers 2010: Living in a Digital World 38Figure 11-25Chapter 11 39. Health Concerns of Computer Use Ergonomics is anapplied science devotedto incorporatingcomfort, efficiency, andsafety into the design ofitems in the workplacePage 580 Discovering Computers 2010: Living in a Digital World 39Figure 11-26Chapter 11 40. Health Concerns of Computer Use Computer addiction occurs when the computerconsumes someones entire social life Symptoms of users include:CravesOverjoy when Unable to stop computerat thecomputer timecomputer activity Irritable whenNeglects Problems atnot at thefamily andwork orcomputerfriendsschoolPage 581Discovering Computers 2010: Living in a Digital World 40 Chapter 11 41. Ethics and Society Computer ethics arethe moral guidelinesthat govern the use ofcomputers andinformation systems Information accuracy isa concern Not all information on the Web is correctPages 581 582 Discovering Computers 2010: Living in a Digital World 41Figure 11-28 Chapter 11 42. Ethics and Society Intellectual property rights are the rights to which creators are entitled for their work A copyright protects any tangible form of expression An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11Page 582 Discovering Computers 2010: Living in a Digital World 42Chapter 11 43. Ethics and SocietyPage 583 Discovering Computers 2010: Living in a Digital World 43Figure 11-29Chapter 11 44. Ethics and Society Green computing involves reducing the electricityand environmental waste while using a computerPages 583 584 Discovering Computers 2010: Living in a Digital World 44Figure 11-30 Chapter 11 45. Ethics and Society Information privacy refers to the right ofindividuals and companies to deny or restrict thecollection and use of information about them Huge databases store data online It is important to safeguard your informationPage 584Discovering Computers 2010: Living in a Digital World 45 Chapter 11 46. Ethics and SocietyPage 584 Discovering Computers 2010: Living in a Digital World 46Figure 11-31Chapter 11 47. Ethics and Society When you fill out aform, the merchant thatreceives the formusually enters it into adatabase Many companies todayallow people to specifywhether they wanttheir personalinformation distributedPage 585Discovering Computers 2010: Living in a Digital World 47Figure 11-32 Chapter 11 48. Ethics and Society A cookie is a small text file that a Web server stores onyour computer Web sites use cookies for a variety of reasons: Assist withAllow for Store users online personalization passwordsshoppingTrack howTarget Click to view Web Link,often users click Chapter 11, Click Webadvertisements Link from left navigation, then click Cookiesvisit a site below Chapter 11Pages 585 586Discovering Computers 2010: Living in a Digital World 48Chapter 11 49. Ethics and SocietyPage 586 Discovering Computers 2010: Living in a Digital World 49Figure 11-33Chapter 11 50. Ethics and Society Spam is an unsolicitede-mail message ornewsgroup posting E-mail filtering blockse-mail messages fromdesignated sources Anti-spam programsattempt to removespam before it reachesyour inboxPage 587Discovering Computers 2010: Living in a Digital World 50Figure 11-34 Chapter 11 51. Ethics and Society Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofingPages 587 - 588 Discovering Computers 2010: Living in a Digital World 51Figure 11-35 Chapter 11 52. Ethics and Society The concern about privacy has led to theenactment of federal and state laws regarding thestorage and disclosure of personal data See Figure 11-36 on page 589 for a listing of major U.S.government laws concerning privacy The 1970 Fair Credit Reporting Act limits therights of others viewing a credit report to onlythose with a legitimate business needPage 588Discovering Computers 2010: Living in a Digital World 52 Chapter 11 53. Ethics and Society Social engineering is defined as gaining unauthorized access or obtaining confidential information by taking advantage of trust and naivety Employee monitoring involves the use of computers to observe, record, and review an employees use of a computer Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Social Engineering below Chapter 11Page 590 Discovering Computers 2010: Living in a Digital World 53Chapter 11 54. Ethics and Society Content filtering is theprocess of restrictingaccess to certain materialon the Web Many businesses usecontent filtering Internet Content RatingAssociation (ICRA) Web filtering softwarerestricts access tospecified Web sitesPages 590 591 Discovering Computers 2010: Living in a Digital World 54Figure 11-37 Chapter 11 55. Summary Potential computer risks andWireless security risks andthe safeguardssafeguards Ethical issues surrounding information accuracy,Computer-related health intellectual property rights, issues and preventions codes of conduct, greencomputing, and informationprivacyPage 591Discovering Computers 2010: Living in a Digital World 55 Chapter 11 56. DiscoveringComputers 2010Living in a Digital WorldChapter 11 Complete