0% found this document useful (0 votes)
8 views

Chapter 2 - Manage Computing Securely & Etchically (3)

Uploaded by

nishes181
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views

Chapter 2 - Manage Computing Securely & Etchically (3)

Uploaded by

nishes181
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Computer Security Risks

• A computer security risk is any event or action that could


cause a loss of or damage to computer hardware,
software, data, information, or processing capability

3
Internet and Network Attacks

• Information transmitted over networks has a higher


degree of security risk than information kept on an
organization’s premises

4
Internet and Network Attacks

• An infected computer has one or more of the


following symptoms:

Operating system Screen displays


Files become Existing programs
runs much slower unusual message
corrupted and files disappear
than usual or image

Unknown
Programs or files Operating system
programs or files Operating system
do not work shuts down
mysteriously does not start up
properly unexpectedly
appear

5
Internet and Network Attacks

6
Internet and
Network
Attacks
Users can take
several
precautions to
protect their
home and
work
computers and
mobile devices
from these
malicious
infections
7
Internet and Network Attacks

• A firewall is hardware and/or software that


protects a network’s resources from intrusion

8
Unauthorized Access and Use

Unauthorized access is Unauthorized use is the


the use of a computer or use of a computer or its
network without data for unapproved or
permission possibly illegal activities

9
Unauthorized Access and Use

• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software

10
Unauthorized Access and Use

• Access controls define who can access a


computer, when they can access it, and what
actions they can take
– Two-phase processes called identification and
authentication
• User name
• Password

11
Unauthorized Access and Use

• A possessed object is any • A biometric device


item that you must carry to authenticates a person’s
gain access to a computer identity by translating a
or computer facility personal characteristic into
– Often are used in a digital code that is
combination with a personal compared with a digital
identification number (PIN) code in a computer

12
Hardware Theft and Vandalism

Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment

13
Hardware Theft and Vandalism

• To help reduce the of chances of theft, companies


and schools use a variety of security measures
Cables to lock
Physical access controls Alarm systems
equipment

Real time location Passwords, possessed


system objects, and biometrics

14
Software Theft

• Software theft occurs when someone:

Steals software Intentionally


media erases programs

Illegally
Illegally copies a registers and/or
program activates a
program
15
Software Theft

• A single-user license agreement typically contains the


following conditions:
Permitted to
• Install the software on one computer
• Make one copy of the software
• Remove the software from your computer before giving it away or selling it

Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
16
Software Theft

• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully

17
Information Theft

• Information theft occurs when someone steals


personal or confidential information
• Encryption is a process of converting readable
data into unreadable characters to prevent
unauthorized access

18
System Failure

• A system failure is the prolonged malfunction of a


computer
• A variety of factors can lead to system failure,
including:
– Aging hardware
– Natural disasters
– Electrical power problems
• Noise, undervoltages, and overvoltages
– Errors in computer programs
19
System Failure

• Two ways to protect from system failures caused


by electrical power variations include surge
protectors and uninterruptable power supplies
(UPS)

20
Backing Up – The Ultimate Safeguard

• A backup is a duplicate of a file, program, or disk


that can be used if the original is lost, damaged,
or destroyed
– To back up a file means to make a copy of it
• Offsite backups are stored in a location separate
from the computer site
Cloud
Storage

21
Health Concerns of Computer Use

22
Health Concerns of Computer Use

Ergonomics is an
applied science
devoted to
incorporating
comfort, efficiency,
and safety into the
design of items in
the workplace

23
Discovering Computers 2012: Chapter 11 24
Health Concerns of Computer Use

• Computer addiction occurs when the computer


consumes someone’s entire social life
• Symptoms of users include:
Craves Overjoyed Unable to stop
computer when at the computer
time computer activity

Irritable when Neglects Problems at


not at the family and work or
computer friends school
25
Ethics and Society

• Computer ethics are


the moral guidelines
that govern the use of
computers and
information systems
• Information accuracy is
a concern
– Not all information on
the Web is correct

26
Ethics and Society

Intellectual property rights are the rights to


which creators are entitled for their work

• A copyright protects any tangible form of expression

An IT code of conduct is a written guideline


that helps determine whether a specific
computer action is ethical or unethical

27
Ethics and Society

28
Ethics and Society

• Green computing involves reducing the electricity


and environmental waste while using a computer

29
Summary

Potential computer risks Computer-related health


and safeguards issues and preventions

Ethical issues surrounding


information accuracy,
intellectual property
rights, codes of conduct,
and green computing

30

You might also like