0% found this document useful (0 votes)
65 views57 pages

Introduction To Computing - Module 8 - Computer Security, Ethics and Privacy

Download as pdf or txt
0% found this document useful (0 votes)
65 views57 pages

Introduction To Computing - Module 8 - Computer Security, Ethics and Privacy

Download as pdf or txt
Download as pdf or txt
You are on page 1/ 57

INTRODUCTION TO

COMPUTING
MODULE 8

COMPUTER SECURITY,
ETHICS AND PRIVACY
• To explain computer security risks, and briefly describe
the types of cybercrime perpetrators
• To describe various types of Internet and network attacks,
and identify ways to safeguard against these attacks
• To discuss techniques to prevent unauthorized computer
access and use
• To discuss ways to prevent health-related disorders and
injuries due to computer use
• To discuss issues related to information accuracy,
intellectual property rights, codes of conduct, and green
computing
What is a computer security risk?
• Action that causes loss of or damage to computer
system.
What are viruses, worms, and Trojan horses?
Virus is a Worm copies Trojan horse Payload
potentially itself hides within (destructive
repeatedly, or looks like event) that is
damaging delivered when
using up legitimate
computer resources you open file, run
program until
program and possibly infected program,
triggered or boot computer
shutting down
computer or with infected disk
Does not in disk drive
Can spread network replicate
and
itself on
damage
files other
computers
How can a virus spread through an e-mail message?
Step 1. Unscrupulous Step 2. They
programmers create a use the Internet
virus program. They to send the e-
hide the virus in a mail message
Word document and to thousands of
attach the Word users around
document to an e-mail the world.
message.
Step 3b. Other users do
Step 3a. not recognize the name of
Some users the sender of the e-mail
open the message. These users do
attachment not open the
and their e-mail message. Instead
computers they delete the e-mail
become message. These users’
infected with computers are not
the virus. infected with the virus.
How can you protect your system from a macro virus?
➢ Set macro security level in applications that allow you to write macros
such as in MS Word, MS Excel, etc.
➢ Macros are disabled by default
and notifications will show
when documents contain
macros.
▪ Macros can be a small
program, or script, that
automates common tasks.
These scripts are usually run
within other programs.
What is an antivirus
program?
➢ Identifies and
removes computer
viruses
➢ Most also protect
against worms and
Trojan horses
What is a virus
signature?
➢ Specific pattern of
virus code
▪ Also called virus
definition.
➢ Antivirus programs
look for virus
signatures
Records
information
How does an about program such
as file size and
antivirus program creation
Uses
inoculate a information date Attempts
to detect if to remove
program file? virus tampers any detected
with file virus
Quarantines
infected
files that it
Keeps file cannot
in separate
remove
area of hard disk
What are some tips for preventing virus, worm, and Trojan horse
infections?
Never open an
Set the macro e-mail attachment
Install an antivirus
security in programs unless you are
program on all your
so you can enable or expecting it and
computers
disable macros it is from a
trusted source

If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
What is a denial of service attack and back door?
A denial of service attack is an assault which
disrupts computer access to an Internet service
such as the Web or e-mail

A back door is a program or set of instructions


in a program that allow users to bypass
security controls when accessing a computer
resource
What is spoofing?
Makes a
network
or Internet
transmission appear legitimate
IP spoofing occurs when an intruder
computer fools a network into believing
its IP address is from a trusted source
Perpetrators of IP spoofing trick their
victims into interacting
with a phony Web site
What is a firewall?
➢ Security system consisting of hardware and/or
software that prevents unauthorized intrusion
What is a personal
firewall utility?
➢ Program that protects
personal computer and
its data from
unauthorized intrusions
➢ Monitors transmissions
to and from computer
➢ Informs you of attempted
intrusion
How can companies protect against hackers?
Intrusion detection software Access control defines
analyzes network traffic, who can access
assesses system computer & what
vulnerabilities, and identifies actions they can take
intrusions and suspicious
behavior

Audit trail records


access attempts
What are other ways to
protect your personal
computer?
➢ Disable file and
printer sharing on
Internet connection
What is a user name?
➢ Unique combination
of characters that
identifies user
➢ Password is private
combination of
characters
associated
with the user name
that allows access
to computer
resources
How can you make your password more secure?
➢ Longer passwords provide greater security
What is a possessed object?
➢ Item that you must carry
to gain access to
computer or facility
➢ Often used with
numeric password
called personal
identification
number (PIN)
What is a biometric device?
➢ Authenticates
person’s identity
using personal
characteristic
▪ Fingerprint, hand
geometry, voice,
signature, and iris
What are hardware theft and hardware vandalism?
➢ Hardware theft is act of stealing
computer equipment
▪ Cables sometimes used to lock
equipment
▪ Some notebook computers use
passwords, possessed objects, and
biometrics as security methods
▪ For PDAs and phones, you can
password-protect the device
➢ Hardware vandalism is act of defacing
or destroying computer equipment
What is software theft?
Act of stealing or Software piracy
illegally copying is illegal
software or duplication
intentionally of copyrighted
erasing software
programs
What is a license
agreement?
➢ Right to use software
➢ Single-user license
agreement allows user to
install software on one
computer, make backup
copy, and sell software
after removing from
computer
What are some other safeguards against software theft?
Product activation allows user to input product
identification number online or by phone and
receive unique installation identification
number

Business Software Alliance (BSA) promotes


better understanding of software piracy
problems
What is encryption?
➢ Safeguards against information theft
➢ Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
➢ Encryption key (formula) often uses more than one method
➢ To read the data, the recipient must decrypt, or decipher, the data
How can I encrypt the contents
of files and folders in Windows?
1. Locate the folder (or file) you wish to
encrypt.
2. Right-click on it and select Properties.
3. Navigate to the General tab and click
Advanced.
4. Move down to Compress or Encrypt
attributes.
5. Check the box next to Encrypt content to
secure data.
How do Web browsers provide secure data
transmission?

Secure site
Many Web browsers is Web site that uses
use encryption encryption to secure
data
Digital certificate is notice
that guarantees Web site is
legitimate
What is a certificate authority (CA)?
➢ Authorized person or
company that issues
and verifies digital
certificates
➢ Users apply for
digital certificate
from CA
What is Secure Sockets Layer (SSL)?
➢ Provides
encryption of all
data that passes
between client
and Internet
server
▪ Web addresses
beginning with
“https” indicate
secure
connections
What is a system failure?
Can cause loss of hardware,
software, or data
Prolonged malfunction
of computer

Caused by aging hardware,


natural disasters, or electrical
power disturbances
Overvoltage or
Noise—unwanted power surge—
electrical signal significant increase
in electrical power
Undervoltage—drop
in electrical supply
What is a surge protector?
➢ Protects computer and
equipment from electrical power
disturbances
➢ Uninterruptible power supply
(UPS) is surge protector that
provides power during power
loss
What is a backup?
Duplicate of file, program, or disk

Three-generation
Full backup Selective backup backup
all files in select which files preserves
computer to back up three copies of
important files

In case of system failure or corrupted files,


restore files by copying to original location
How can I ensure my wireless communication is secure?
➢ Secure your wireless access point (WAP)
➢ WAP should not broadcast your network name
➢ Enable Wired Equivalent Privacy or Wi-Fi Protected
Access (WPA)

WiFi networks around


Luneta and Manila City
Hall, mapped using
wardriving.
What are computer ethics?
Moral guidelines that govern use of computers and information
systems

Unauthorized use of
computers and Software theft Information accuracy
networks

Intellectual property
rights—rights to
which creators are Codes of conduct
entitled for their
work

Information privacy
What is an IT code of conduct?

➢ Written guideline that


helps determine
whether computer
action is ethical
➢ Employers can
distribute to
employees
What is information privacy?
Right of individuals and companies to
deny or restrict collection and use of
information about them

Difficult to maintain today


because data is stored online

Employee monitoring is using


computers to observe
employee computer use
Legal for employers to use
monitoring software
programs
What are some ways to safeguard personal information?
Fill in only necessary information Install a cookie manager Sign up for e-mail
on rebate, warranty, and to filter cookies filtering through your
registration forms Internet service provider or
Clear your history file when use an antispam program,
you are finished browsing such as Brightmail
Avoid shopping club
and buyer cards
Set up a free e-mail account;
Do not reply to spam
use this e-mail address for
for any reason
Inform merchants that you merchant forms
do not want them to distribute
your personal information
Turn off file and print sharing Surf the Web anonymously
on your Internet connection with a program such as
Freedom Web Secure or
Limit the amount of information through an anonymous
you provide to Web sites; fill Web site such as
in only required information Install a personal firewall Anonymizer.com
What is an electronic profile?
➢ Data collected when
you fill out form on
Web
➢ Merchants may sell
your electronic
profile
➢ Often you can
specify whether you
want personal
information
distributed
What is a cookie?
Set browser to
Some Web accept cookies,
Small file on
User sites sell, or prompt you to
preferences
your
trade accept cookies,
computer that
information or disable
contains data
stored in your cookies
about you
cookies
How
regularly
you visit Interests
Web sites and
browsing
habits
How do cookies work?
What are spyware, adware, and spam?
➢ Spyware is program
placed on computer
without user’s
knowledge
➢ Adware is a program
that displays online
advertisements
➢ Spam is unsolicited
e-mail message sent
to many recipients
How can you control spam?

E-mail filtering
Service that
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources

Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
What is phishing?

Scam in which a perpetrator


sends an official looking
e-mail that attempts
to obtain your personal and
financial information
What privacy laws have been enacted?
What privacy laws have been enacted? (cont’d)
What is content filtering?
➢ Process of restricting
access to certain material
➢ Internet Content Rating
Association (ICRA)
provides rating system of
Web content
➢ Web filtering software
restricts access to
specified sites
What is computer forensics?
➢ Also called digital forensics, network forensics, or
cyber-forensics
➢ Discovery, collection, and analysis of evidence
found on computers and networks
➢ Computer forensic analysts must have knowledge
of the law, technical experience, communication
skills, and willingness to learn
What are some health concerns of computer use?
Computer vision syndrome
(CVS)—eye and vision
problems Carpal tunnel syndrome
(CTS)—inflammation of
nerve that connects forearm
to palm
Repetitive strain injury (RSI)

Tendonitis—inflammation of
tendon due to repeated
motion
Computer addiction—when
computer consumes entire
social life
What precautions can prevent tendonitis or carpal tunnel
syndrome?
➢ Spread fingers apart for
several seconds while
keeping wrists straight
➢ Gently push back fingers
and then thumb
➢ Dangle arms loosely at
sides and then shake
arms and hands
How can you ease eyestrain when working at the
computer?
What is ergonomics?
➢ Applied science devoted to comfort, efficiency, and
safety in workplace elbows at 90° and
keyboard arms and hands
height: 23” to parallel to floor
28”

adjustable
backrest

adjustable seat

adjustable height
chair with 5 legs
for stability

feet flat on floor


What is green computing?
➢ Reducing electricity and environmental waste
while using computer
• Docter, Q., Dulaney, E., & Skandier, T. (2016). CompTIA
+ Complete Study Guide (3rd Edition)
• Meyers, M. (2016). All In One CompTIA A+ Certification.
Mc Graw Hill.
• Pearson. (2016). Introduction to Computers and
Information Technology. Upper Saddle River, NJ:
Pearson.
• Tavani, H. T. (2016). Ethics and Technology. Wiley.
• White, R. (2015). How Computer Work: The Evolution of
Technology. IN: Que.

You might also like