Chapter 2 - Manage Computing Securely & Etchically (3)
Chapter 2 - Manage Computing Securely & Etchically (3)
3
Internet and Network Attacks
4
Internet and Network Attacks
Unknown
Programs or files Operating system
programs or files Operating system
do not work shuts down
mysteriously does not start up
properly unexpectedly
appear
5
Internet and Network Attacks
6
Internet and
Network
Attacks
Users can take
several
precautions to
protect their
home and
work
computers and
mobile devices
from these
malicious
infections
7
Internet and Network Attacks
8
Unauthorized Access and Use
9
Unauthorized Access and Use
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
10
Unauthorized Access and Use
11
Unauthorized Access and Use
12
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
13
Hardware Theft and Vandalism
14
Software Theft
Illegally
Illegally copies a registers and/or
program activates a
program
15
Software Theft
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
16
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
17
Information Theft
18
System Failure
20
Backing Up – The Ultimate Safeguard
21
Health Concerns of Computer Use
22
Health Concerns of Computer Use
Ergonomics is an
applied science
devoted to
incorporating
comfort, efficiency,
and safety into the
design of items in
the workplace
23
Discovering Computers 2012: Chapter 11 24
Health Concerns of Computer Use
26
Ethics and Society
27
Ethics and Society
28
Ethics and Society
29
Summary
30