IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security,...
-
Upload
brianne-gilbert -
Category
Documents
-
view
221 -
download
1
Transcript of IT 10103 Introduction to Information Technology CHAPTER 11 – Computers and Society, Security,...
IT 10103 IT 10103 Introduction to Information TechnologyIntroduction to Information Technology
CHAPTER 11 – Computers and Society, Security, CHAPTER 11 – Computers and Society, Security, Privacy, and EthicsPrivacy, and Ethics
Computer Security RisksComputer Security Risks
A computer security risk is any event or A computer security risk is any event or action that could cause a loss of or damage action that could cause a loss of or damage
to computer hardware, software, data, to computer hardware, software, data, information, or processing capability.information, or processing capability.
Computer Security RisksComputer Security Risks
CybercrimeCybercrimeOnline or internet based illegal actsOnline or internet based illegal acts
An FBI top 10 priorityAn FBI top 10 priority
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses
VirusVirusA potentially damaging computer programA potentially damaging computer program
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses
WormWormA program that copies itself to create some A program that copies itself to create some type of problem for the infected computer or type of problem for the infected computer or
networknetwork
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan Horses
Trojan HorseTrojan HorseA program that hides within a legitimate A program that hides within a legitimate
program. Activates on some trigger.program. Activates on some trigger.
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesVirus Symptoms:Virus Symptoms:
Unusual Screen MessagesUnusual Screen MessagesMusic or Sounds play randomlyMusic or Sounds play randomly
Memory is reducedMemory is reducedPrograms disappearPrograms disappearFiles are corruptedFiles are corrupted
Programs do not work correctlyPrograms do not work correctlyUnknown programs appearUnknown programs appearSystem properties changeSystem properties change
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesHow do we get these?How do we get these?
Opening an infected fileOpening an infected fileRunning an infected programRunning an infected program
Booting an infected computer with a disk Booting an infected computer with a disk that is infectedthat is infected
Opening infected E-mail messagesOpening infected E-mail messages
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesThere are over 90,000 known viruses, etc.There are over 90,000 known viruses, etc.
6 - 10 new viruses, etc 6 - 10 new viruses, etc are discovered each dayare discovered each day
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesGetting rid of viruses, etc.Getting rid of viruses, etc.
Avast! Anti-Virus http://www.avast.com
Viruses, Worms, Trojan HorsesViruses, Worms, Trojan HorsesPreventing Viruses, etc:Preventing Viruses, etc:
Page 562Page 562
Unauthorized AccessUnauthorized AccessUsing a computer or network without Using a computer or network without
permissionpermissionCracker = illegally accesses a computer Cracker = illegally accesses a computer
networknetworkHacker = Same as cracker, but more elite Hacker = Same as cracker, but more elite
statusstatus
Unauthorized AccessUnauthorized AccessFirewallFirewall
One way to prevent hacking or cracking.One way to prevent hacking or cracking.It is a combination of hardware and It is a combination of hardware and
software that blocks unwanted attacks from software that blocks unwanted attacks from your computer or networkyour computer or network
Unauthorized AccessUnauthorized Access
Unauthorized AccessUnauthorized AccessUsernames and PasswordsUsernames and Passwords
Username = UserID or identificationUsername = UserID or identificationPassword = private combination of Password = private combination of
characters to allow accesscharacters to allow access
Unauthorized AccessUnauthorized AccessPasswordsPasswords
Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices
Physical biometric systems measure a unique Physical biometric systems measure a unique physical trait, such as the fingerprint or blood physical trait, such as the fingerprint or blood
vessel pattern of the retina, whereas behavioral vessel pattern of the retina, whereas behavioral biometric systems measure a unique behavioral biometric systems measure a unique behavioral attribute, such as the way a person talks or signs attribute, such as the way a person talks or signs
his or her name. his or her name.
Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices
Unauthorized AccessUnauthorized AccessBiometric DevicesBiometric Devices
TheftTheftPrevent Hardware TheftPrevent Hardware Theft
Physical locationPhysical locationPhysical securityPhysical security
Regular visual inspectionRegular visual inspection
TheftTheftPrevent Software TheftPrevent Software Theft
License AgreementsLicense AgreementsActivation SchemesActivation Schemes
Regular System ScansRegular System Scans
TheftTheftPrevent Information TheftPrevent Information TheftEncryption & DecryptionEncryption & Decryption
TheftTheftEncryption & DecryptionEncryption & Decryption
TheftTheftTwo Types of Encryption:Two Types of Encryption:
In In private-key encryptionprivate-key encryption, the sender and receiver , the sender and receiver of information share a secret--a key that is used of information share a secret--a key that is used
for both encryption and decryption. for both encryption and decryption.
In In public-key encryptionpublic-key encryption, two different , two different mathematically related keys (a key pair) are used mathematically related keys (a key pair) are used
to encrypt and decrypt data. Information to encrypt and decrypt data. Information encrypted with one key may only be decrypted by encrypted with one key may only be decrypted by
using the other half of the key pair. using the other half of the key pair.
TheftTheftPGP (Pretty Good Privacy) PGP (Pretty Good Privacy) Encryption SoftwareEncryption Software
http://www.pgp.comhttp://www.pgp.com
System FailureSystem FailureNoise = any unwanted signal mixed with Noise = any unwanted signal mixed with
normal voltage input to the computernormal voltage input to the computerUnder voltage = electrical supply dropsUnder voltage = electrical supply drops
Over voltage = Power SurgeOver voltage = Power Surge
System FailureSystem FailureSafeguardsSafeguards
Surge Protector (Minimum Protection)Surge Protector (Minimum Protection)UPS – Uninterruptible Power Supply (Best UPS – Uninterruptible Power Supply (Best
Protection)Protection)
APC 750VA UPS = $ 90.00
BackupBackupThe Ultimate SafeguardThe Ultimate Safeguard
Making copies of your important filesMaking copies of your important files
Internet Security RisksInternet Security RisksDenial of Service Attacks (DoS Attack)Denial of Service Attacks (DoS Attack)
An assault on computer networks to disrupt An assault on computer networks to disrupt serviceservice
Internet Security RisksInternet Security RisksInternet TransactionsInternet Transactions
Digital CertificatesDigital CertificatesSSL (Secure Sockets Layer)SSL (Secure Sockets Layer)
SET (Secure Electronics Transactions)SET (Secure Electronics Transactions)Digital SignaturesDigital Signatures
Ethics and SocietyEthics and SocietyComputer EthicsComputer Ethics
Page 578Page 578
Ethics and SocietyEthics and SocietyInformation AccuracyInformation Accuracy
Everything you see on the internet may not Everything you see on the internet may not be accurate. You have to learn to judge or be accurate. You have to learn to judge or
discern what is correct and what is notdiscern what is correct and what is notRemember what your parents used to say:Remember what your parents used to say:
““Just because it is on TV or radio or in a Just because it is on TV or radio or in a newspaper doesn’t mean it is true!”newspaper doesn’t mean it is true!”
Also “Would you jump off a bridge if your Also “Would you jump off a bridge if your friends did?”friends did?”
Ethics and SocietyEthics and SocietyIntellectual Property RightsIntellectual Property Rights
Rights of the creator to their own work(s)Rights of the creator to their own work(s)Copyright – Automatically given when you Copyright – Automatically given when you
create something, doesn’t have to be create something, doesn’t have to be registered to be upheld in courtregistered to be upheld in court
Ethics and SocietyEthics and SocietyIT Code of ConductIT Code of Conduct
Page 580Page 580
Ethics and SocietyEthics and SocietyInformation PrivacyInformation Privacy
Your right to deny or restrict the use of your Your right to deny or restrict the use of your personal informationpersonal information
Page 581Page 581
Ethics and SocietyEthics and SocietyCookiesCookies
A small text file that a web server stores on A small text file that a web server stores on your computeryour computer
Ethics and SocietyEthics and SocietySpywareSpyware
A program placed on your computer without A program placed on your computer without your knowledge that secretly collects your knowledge that secretly collects
information about you.information about you.Adaware SEAdaware SE
SpybotSpybot
Ethics and SocietyEthics and SocietySpamSpam
Unsolicited E-mailUnsolicited E-mail4 out of 5 messages are spam today4 out of 5 messages are spam today
Ethics and SocietyEthics and SocietyEmployee MonitoringEmployee Monitoring
Using a computer to observe, record and Using a computer to observe, record and review an employee’s use of a computer.review an employee’s use of a computer.
Ethics and SocietyEthics and SocietyContent FilteringContent Filtering
Restricting access to certain material on the Restricting access to certain material on the webweb
Health ConcernsHealth ConcernsRSI – Repetitive Strain InjuryRSI – Repetitive Strain Injury
CTS – Carpal Tunnel SyndromeCTS – Carpal Tunnel SyndromeCVS – Computer Vision SyndromeCVS – Computer Vision Syndrome
Blindness recently reported as related to Blindness recently reported as related to Short-Sightedness and long-term computer Short-Sightedness and long-term computer
monitor usemonitor use
Health ConcernsHealth ConcernsComputer AddictionComputer Addiction
When computers consume someone’s When computers consume someone’s entire social lifeentire social life
Health ConcernsHealth ConcernsIAD – Internet Addiction DisorderIAD – Internet Addiction Disorder
When using the internet consumes When using the internet consumes someone’s entire social life but feels social someone’s entire social life but feels social to the addict as they interact with others via to the addict as they interact with others via
the internetthe internet
Health ConcernsHealth ConcernsSymptoms of both disorders:Symptoms of both disorders:
Craves Computer TimeCraves Computer TimeOverjoyed when at computerOverjoyed when at computer
Unable to stop computer activityUnable to stop computer activityIrritable when not at a computerIrritable when not at a computer
Neglects family and friendsNeglects family and friendsProblems at work or schoolProblems at work or school
Chapter 11Chapter 11Questions?Questions?
Chapter 11Chapter 11Assignment 07Assignment 07
At Issue 11-2 on page 568At Issue 11-2 on page 568
Answer the questions as presented and Answer the questions as presented and defend your opinion.defend your opinion.
Show references as well.Show references as well.