tomorrow’s technology and you chapter 10 computer security

12
Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security

Upload: melinda-rowe

Post on 31-Dec-2015

16 views

Category:

Documents


0 download

DESCRIPTION

Tomorrow’s Technology and You Chapter 10 Computer Security. “Blind faith in modern technology can be foolish, and in many cases, dangerous.” (Beekman). Chapter 10 Objectives. - PowerPoint PPT Presentation

TRANSCRIPT

Slide 1

Tomorrow’s Technology and You

Chapter 10Computer Security

© 2006 Prentice-Hall, Inc. Slide 2

Chapter 10Objectives

Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them

Describe computer backup methods and choose the best for your computer

Discuss security-related issues for the future.

“Blind faith in modern technology can be foolish, and in many cases, dangerous.”

(Beekman)

© 2006 Prentice-Hall, Inc. Slide 3

Threats to Computer Data (p 360-369)

Physical theft - what may get stolen?

Identity theft – how does it happen?‘Malware’ (viruses, spyware etc.)Who originates this?How does it spread?What harm does it do?

‘Hacking’ – what is it? why should we care?What is a DDoS attack? How might you be guilty of facilitating

one?

"ANY MATERIAL DOWNLOADED THROUGH GOOGLE IS DONE AT YOUR OWN RISK... YOU WILL BE RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS" http://pages.google.com/#ready

© 2006 Prentice-Hall, Inc. Slide 4

More Threats to Computer Data (p 382-383)

Computer FailureWhich is more serious, hardware or software ‘bugs’?is ‘bug-free’ software possible?‘The bigger the system, the bigger the problem’ – so what?

Reading of discarded mediahow? how big a problem? solution?

‘UBF’ Problemssuch as? What can we do?

Which is the most serious cause of data lossSo what?

© 2006 Prentice-Hall, Inc. Slide 5

What can be done? (p 369- 376)Physical Security

how? what does it not protect us from? Passwords

how do we choose? remember?Still need encryption – why?

Identity theft – what can we do? (p 363)Use PayPal vs credit cardhttpS – not enough! Why not? What else can we check?Other ideas?

Firewalls what do they do? do you need one in a desktop PC at school?

at work? at home? in a laptop?how do you ensure it is active in your computer?

© 2006 Prentice-Hall, Inc. Slide 6

What can be done? (p 369- 376)Surge protectors & UPS - why? costs?Virus protection

Updates vital – why? How can I check currency?

Windows UpdateEnsure this is Automatic, or DIY! (or use Mac/linux!)

Other ideas (p 378, plus research!)There is no 100% secure system – so?

Be careful where you visit/download and…Backup!

In-class Activity• Open the screen that tells you whether

your virus protection is up-to-date

• Take screen shot

• Paste to Word, and explain why keeping this up-to-date is vital. What would you do if this is out of date?

• Reply to thread for ‘In-class discussion - Week 10’, and attach the Word document. (bonus if you remember that Word format is not the best choice!)

Slide 7

© 2006 Prentice-Hall, Inc. Slide 8

Chapter 10Objectives

Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them

Describe computer backup methods and choose the best for your computer

Discuss security-related issues for the future.

© 2006 Prentice-Hall, Inc. Slide 9

Focus on Backup (p376)

When do we backup?Just before data loss!Time triggered – how can we schedule in Windows?Change triggered – why is this better?

What do we back up?whole drive? – why not?’My Documents’ (be sure to put all your data there)What about e-mail address book? IE Favorites?and what else?

What if I lose the entire drive?

“80% of PC’s are inadequately backed up - The only cure for this kind of stupidity is a disaster.” (W.D. Riley, data security administrator, NCRI)

© 2006 Prentice-Hall, Inc. Slide 10

Focus on BackupHow do we backup data?

Auto (Recycle bin) – why is this not enough?Windows Backup Program vs Drag & DropCloud computing – how does this solve the backup problem?

Any cons? Where do we backup to?

USB key/CD/DVD – pros & cons?Copy to external hard drive – cost? where do we keep it?N drive at school – pros? cons?

Advanced solutionsRAID – can actually do on home computer – see Dell siteWeb-based backup services – such as?

Don’t forget to practice restore! (Why?)

© 2006 Prentice-Hall, Inc. Slide 11

Chapter 10Objectives

Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them

Describe computer backup methods and choose the best for your computer

Discuss security-related issues for the future.

© 2006 Prentice-Hall, Inc. Slide 12

Security-related Issues for the Future.(p377-390)

“The delicate balance” between security & privacy examples? what can we do to affect the ‘balance’?

Will Computers Be Democratic?What does Lech Walesa say? Who was he?Examples of this in action? Is it always true? is this always a good thing?

Will the Global Village Be a Community?What did Davis and Davidson say?What is threatening this openness today?What do you foresee? What can we do?