Computer Security, Ethics and Privacy
Computer Security, Ethics and Privacy
Chapter 11 Objectives
Describe the types of computer security risks Discuss the types of devices available that protect computers from system failure
Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and spoofing
Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary
Next
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11 p. 556 - 558 Fig. 11-1
Next
p. 558
Next
programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message.
the Internet to send the e-mail message to thousands of users around the world.
users open the attachment and their computers become infected with the virus.
recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users computers are not infected with the virus.
Next
Set macro security level in applications that allow you to write macros At medium security level, warning displays that document contains macro
Macros are instructions saved in an application, such as word processing or spreadsheet program
Next
Identifies and removes computer viruses Most also protect against worms and Trojan horses
Next
Next
Never open an e-mail attachment unless you are expecting it and it is from a trusted source
p. 562
Next
A back door is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource
p. 562
Next
IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source
Perpetrators of IP spoofing trick their victims into interacting with a phony Web site
p. 563
Next
Security system consisting of hardware and/or software that prevents unauthorized intrusion
Next
Program that protects personal computer and its data from unauthorized intrusions Monitors transmissions to and from computer Informs you of attempted intrusion
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Personal Firewall Software below Chapter 11
Next
p. 564 - 565
Next
low quality
(click to start)
high quality
(click to start)
Next
Next
Unique combination of characters that identifies user Password is private combination of characters associated with the user name that allows access to computer resources
Next
Next
Item that you must carry to gain access to computer or facility Often used with numeric password called personal identification number (PIN)
Next
Next
Video: ID Security
Smile, Big Brother wants your iris scan
low quality
(click to start)
high quality
(click to start)
Next
Next
Software Theft
What is software theft?
Act of stealing or illegally copying software or intentionally erasing programs Software piracy is illegal duplication of copyrighted software
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Software Piracy below Chapter 11
p. 570
Next
Software Theft
What is a license agreement?
Right to use software Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
Next
Software Theft
What are some other safeguards against software theft?
Product activation allows user to input product identification number online or by phone and receive unique installation identification number
Business Software Alliance (BSA) promotes better understanding of software piracy problems
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Business Software Alliance below Chapter 11 p. 571
Next
Information Theft
What is encryption?
Safeguards against information theft Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Encryption below Chapter 11
Next
Information Theft
How can I encrypt the contents of files and folders in WindowsXP?
Next
p. 573
Next
Authorized person or company that issues and verifies digital certificates Users apply for digital certificate from CA
Next
Provides encryption of all data that passes between client and Internet server
Web addresses beginning with https indicate secure connections
Next
System Failure
What is a system failure?
System Failure
What is a surge protector?
Protects computer and equipment from electrical power disturbances Uninterruptible power supply (UPS) is surge protector that provides power during power loss
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Uninterruptible Power Supply below Chapter 11
Next
In case of system failure or corrupted files, restore files by copying to original location
p. 576
Next
Wireless Security
How can I ensure my wireless communication is secure?
Secure your wireless access point (WAP) WAP should not broadcast your network name Enable Wired Equivalent Privacy or Wi-Fi Protected Access (WPA)
Next
Software theft
Information accuracy
Intellectual property rightsrights to which creators are entitled for their work
Codes of conduct
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Digital Rights Management below Chapter 11 p. 578 - 579
Information privacy
Next
Written guideline that helps determine whether computer action is ethical Employers can distribute to employees
Next
Information Privacy
What is information privacy?
Right of individuals and companies to deny or restrict collection and use of information about them Difficult to maintain today because data is stored online Employee monitoring is using computers to observe employee computer use
Legal for employers to use monitoring software programs
Next
Information Privacy
What are some ways to safeguard personal information?
Fill in only necessary information on rebate, warranty, and registration forms Install a cookie manager to filter cookies Clear your history file when you are finished browsing Set up a free e-mail account; use this e-mail address for merchant forms Sign up for e-mail filtering through your Internet service provider or use an antispam program, such as Brightmail
Inform merchants that you do not want them to distribute your personal information
Turn off file and print sharing on your Internet connection Limit the amount of information you provide to Web sites; fill in only required information
Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com
p. 581
Next
Information Privacy
What is an electronic profile?
Data collected when you fill out form on Web Merchants sell your electronic profile Often you can specify whether you want personal information distributed
Next
Information Privacy
What is a cookie?
Some Web sites sell or trade information stored in your cookies
User preferences
Set browser to accept cookies, prompt you to accept cookies, or disable cookies
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Cookies below Chapter 11
p. 582
Next
Information Privacy
How do cookies work?
Next
Information Privacy
What are spyware, adware, and spam?
Spyware is program placed on computer without users knowledge Adware is a program that displays online advertisements Spam is unsolicited e-mail message sent to many recipients
Next
Information Privacy
How can you control spam?
E-mail filtering
Collects spam in central location that you can view any time
Anti-spam program
Attempts to remove spam
Sometimes removes valid e-mail messages
p. 584
Next
Information Privacy
What is phishing?
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information
p. 584
Next
Information Privacy
What privacy laws have been enacted?
Next
Information Privacy
What privacy laws have been enacted? (contd)
Next
Information Privacy
What is content filtering?
Process of restricting access to certain material Internet Content Rating Association (ICRA) provides rating system of Web content Web filtering software restricts access to specified sites
Next
Information Privacy
What is computer forensics?
Also called digital forensics, network forensics, or cyberforensics Discovery, collection, and analysis of evidence found on computers and networks Computer forensic analysts must have knowledge of the law, technical experience, communication skills, and willingness to learn
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Forensics below Chapter 11 p. 587
Next
p. 587 - 588
Next
Spread fingers apart for several seconds while keeping wrists straight Gently push back fingers and then thumb Dangle arms loosely at sides and then shake arms and hands
Next
Next
adjustable backrest
Next
Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Green Computing below Chapter 11 p. 590 Fig. 11-35
Next
Potential computer risks Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy
Safeguards that schools, business, and individuals can implement to minimize these risks
Computer-related health issues, their preventions, and ways to keep the environment healthy Wireless security risks and safeguards
Chapter 11 Complete