Introduction To Computing - Module 8 - Computer Security, Ethics and Privacy
Introduction To Computing - Module 8 - Computer Security, Ethics and Privacy
COMPUTING
MODULE 8
COMPUTER SECURITY,
ETHICS AND PRIVACY
• To explain computer security risks, and briefly describe
the types of cybercrime perpetrators
• To describe various types of Internet and network attacks,
and identify ways to safeguard against these attacks
• To discuss techniques to prevent unauthorized computer
access and use
• To discuss ways to prevent health-related disorders and
injuries due to computer use
• To discuss issues related to information accuracy,
intellectual property rights, codes of conduct, and green
computing
What is a computer security risk?
• Action that causes loss of or damage to computer
system.
What are viruses, worms, and Trojan horses?
Virus is a Worm copies Trojan horse Payload
potentially itself hides within (destructive
repeatedly, or looks like event) that is
damaging delivered when
using up legitimate
computer resources you open file, run
program until
program and possibly infected program,
triggered or boot computer
shutting down
computer or with infected disk
Does not in disk drive
Can spread network replicate
and
itself on
damage
files other
computers
How can a virus spread through an e-mail message?
Step 1. Unscrupulous Step 2. They
programmers create a use the Internet
virus program. They to send the e-
hide the virus in a mail message
Word document and to thousands of
attach the Word users around
document to an e-mail the world.
message.
Step 3b. Other users do
Step 3a. not recognize the name of
Some users the sender of the e-mail
open the message. These users do
attachment not open the
and their e-mail message. Instead
computers they delete the e-mail
become message. These users’
infected with computers are not
the virus. infected with the virus.
How can you protect your system from a macro virus?
➢ Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.
➢ Macros are disabled by default
and notifications will show
when documents contain
macros.
▪ Macros can be a small
program, or script, that
automates common tasks.
These scripts are usually run
within other programs.
What is an antivirus
program?
➢ Identifies and
removes computer
viruses
➢ Most also protect
against worms and
Trojan horses
What is a virus
signature?
➢ Specific pattern of
virus code
▪ Also called virus
definition.
➢ Antivirus programs
look for virus
signatures
Records
information
How does an about program such
as file size and
antivirus program creation
Uses
inoculate a information date Attempts
to detect if to remove
program file? virus tampers any detected
with file virus
Quarantines
infected
files that it
Keeps file cannot
in separate
remove
area of hard disk
What are some tips for preventing virus, worm, and Trojan horse
infections?
Never open an
Set the macro e-mail attachment
Install an antivirus
security in programs unless you are
program on all your
so you can enable or expecting it and
computers
disable macros it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
What is a denial of service attack and back door?
A denial of service attack is an assault which
disrupts computer access to an Internet service
such as the Web or e-mail
Secure site
Many Web browsers is Web site that uses
use encryption encryption to secure
data
Digital certificate is notice
that guarantees Web site is
legitimate
What is a certificate authority (CA)?
➢ Authorized person or
company that issues
and verifies digital
certificates
➢ Users apply for
digital certificate
from CA
What is Secure Sockets Layer (SSL)?
➢ Provides
encryption of all
data that passes
between client
and Internet
server
▪ Web addresses
beginning with
“https” indicate
secure
connections
What is a system failure?
Can cause loss of hardware,
software, or data
Prolonged malfunction
of computer
Three-generation
Full backup Selective backup backup
all files in select which files preserves
computer to back up three copies of
important files
Unauthorized use of
computers and Software theft Information accuracy
networks
Intellectual property
rights—rights to
which creators are Codes of conduct
entitled for their
work
Information privacy
What is an IT code of conduct?
E-mail filtering
Service that
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources
Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
What is phishing?
Tendonitis—inflammation of
tendon due to repeated
motion
Computer addiction—when
computer consumes entire
social life
What precautions can prevent tendonitis or carpal tunnel
syndrome?
➢ Spread fingers apart for
several seconds while
keeping wrists straight
➢ Gently push back fingers
and then thumb
➢ Dangle arms loosely at
sides and then shake
arms and hands
How can you ease eyestrain when working at the
computer?
What is ergonomics?
➢ Applied science devoted to comfort, efficiency, and
safety in workplace elbows at 90° and
keyboard arms and hands
height: 23” to parallel to floor
28”
adjustable
backrest
adjustable seat
adjustable height
chair with 5 legs
for stability