Ethics, Computer Crime, and Security: Unit - 5
Ethics, Computer Crime, and Security: Unit - 5
Information accessibility
Deals with what information a person has the right to obtain about others and how the information can be used
Computer Crime
Computer Crime
Computer Crime
Computer Security
Recommended Safeguards Implement a security plan to prevent break-ins Have a plan if break-ins do occur Make backups! Only allow access to key employees Change passwords frequently Keep stored information secure Use antivirus software Use biometrics for access to computing resources Hire trustworthy employees
Authentication: Verifying the authenticity of users ensuring people are who they say they are.
Ensuring that the parties in a transaction are who they say they are and cannot deny that transaction took place
Technical Countermeasures
Encryption/decryption: Using an algorithm (cipher) to make a plain text unreadable to anyone that does not have a key SSL
Technical Countermeasures
Virtual Private Networks (VPNs) Allow strong protection for data communications Cheaper than private networks, but do not provide 100% end-to-end security
Internet Security
Firewall hardware and software designed to keep unauthorized users out of network systems
Encryption the process of encoding messages before they enter the network or airwaves, then decoding them at the receiving end of the transfer
Computer Security
Both sender and recipient use the same key Key management can be a problem A private key and a public key
Certificate authority
A trusted middleman verifies that a Web site is a trusted site (provides public keys to trusted partners) Secure socket layers (SSL)
Computer Security