Discovering Computers 2012: Your Interactive Guide To The Digital World
Discovering Computers 2012: Your Interactive Guide To The Digital World
Computers 2012
Your Interactive Guide
to the Digital World
Objectives Overview
Unethical
Cyberextortionists Cyberterrorists
Employees
Computer
Worm Trojan Horse Rootkit
Virus
Affects a Copies itself A malicious Program that
computer repeatedly, program that hides in a
negatively by using up hides within computer
altering the resources or looks like and allows
way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
Organizations take
several measures to
help prevent
unauthorized access
and use
Acceptable use policy
Disable file and printer
sharing
Firewalls
Intrusion detection
software
Information
Insurance
security
agencies
departments
Page 569 Discovering Computers 2012: Chapter 11 19
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Illegally
Illegally copies a registers and/or
program activates a
program
Page 571 Discovering Computers 2012: Chapter 11 22
Software Theft
Not permitted to
Install the software on a network
Give copies to friends or colleagues while continuing to use the software
Export the software
Rent or lease the software
Page 571 Discovering Computers 2012: Chapter 11 23
Software Theft
Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
Some software requires
product activation to
function fully
Parent
Child
Configure a WAP
so that only Use WPA or WPA2
certain devices can security standards
access it
Page 578 Discovering Computers 2012: Chapter 11 35
Health Concerns of Computer Use
Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
Track how
Target
often users
advertisements
visit a site
Pages 585 586 Discovering Computers 2012: Chapter 11 47
Ethics and Society
Spam is an unsolicited
e-mail message or
newsgroup posting
E-mail filtering blocks
e-mail messages from
designated sources
Anti-spam programs
attempt to remove
spam before it reaches
your inbox
Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
Pharming is a scam
where a perpetrator
attempts to obtain your
personal and financial
information via spoofing