Docstoc

Computer Security_ Ethics and Privacy

Document Sample
Computer Security_ Ethics and Privacy Powered By Docstoc
					Computer Security,
Ethics and Privacy
     Chapter 11
        Computer Security Risk
   Computer Crime
   CyberCrime
   Hacker
   Cracker
   Script Kiddie
   Cyberextortionist
   Cyberterrist
                  Internet Attacks
   Computer viruses
       Computer program that affects the way a computer
        works without permission or knowledge of the owner
       Can damage files and system software
   Computer worms
       Copies itself repeatedly, causing a network to clog
        and go down
   Trojan Horses
       Hides within a legitimate program
       Condition or action triggers the Trojan horse
       Does not replicate itself
How Should Virus Authors Be
     Punished?????
      How long is an Unprotected
     Computer safe from Intruders?
   A – 10 minutes
   B – 20 minutes
   C – 30 minutes
   D – 5 minutes
        How to Safeguard Yourself
   Only use trusted sources
   Use Anti-Virus programs
       McAfee
       Norton
       AVG
       Kapersky
   Spyware Blocker
            Virus Terminology
   Virus Signature
   Virus Definition
   Inoculate
   Quarantine
   Virus Hoax
       Denial of Service Attacks
   Designed to overload a server until it
    crashes
   Examples????
                Back Doors
   Bypassing Security systems already in
    place
   Usually install a program or modify one to
    meet their needs
   Spoofing – transmission appears to be
    harmless
                 Firewalls
   Hardware and/or software
   Use controls and passwords
               Passwords
   The last word in passwords!
   Check out Chart on page 567
   PINs
   Biometric Devices
Hardware Theft and Vandalism
   Backup
   Backup
   Backup
              Software Theft
   Apple vs Microsoft
Safeguards Against Software Theft
   Restricting who can load software
   Use or loose the license agreement
            What NOT to DO!
   Install the software on a network, such as
    a school computer lab
   Give copies to friends and family while
    continuing to use the software
   Export the software
   Rent or lease the software

				
DOCUMENT INFO
Shared By:
Categories:
Tags:
Stats:
views:14
posted:1/13/2012
language:Latin
pages:15