Presentation is loading. Please wait.

Presentation is loading. Please wait.

Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security.

Similar presentations


Presentation on theme: "Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security."— Presentation transcript:

1 Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security

2 © 2006 Prentice-Hall, Inc.Slide 2 Chapter 10 Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future. “Blind faith in modern technology can be foolish, and in many cases, dangerous.” (Beekman)

3 © 2006 Prentice-Hall, Inc.Slide 3 Threats to Computer Data (p 360-369) Physical theft - w hat may get stolen? Identity theft – how does it happen? ‘Malware’ (viruses, spyware etc.) Who originates this? How does it spread? What harm does it do? ‘Hacking’ – what is it? why should we care? What is a DDoS attack? How might you be guilty of facilitating one? "ANY MATERIAL DOWNLOADED THROUGH GOOGLE IS DONE AT YOUR OWN RISK... YOU WILL BE RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS" http://pages.google.com/#ready

4 © 2006 Prentice-Hall, Inc.Slide 4 More Threats to Computer Data (p 382-383) Computer Failure Which is more serious, hardware or software ‘bugs’? is ‘bug-free’ software possible? ‘The bigger the system, the bigger the problem’ – so what? Reading of discarded media how? how big a problem? solution? ‘UBF’ Problems such as? What can we do? Which is the most serious cause of data loss So what?

5 © 2006 Prentice-Hall, Inc.Slide 5 What can be done? (p 369- 376) Physical Security how? what does it not protect us from? how Passwords how do we choose? remember? Still need encryption – why?why? Identity theft – what can we do? (p 363) Use PayPal vs credit card httpS – not enough! Why not? What else can we check? Other ideas? Firewalls what do they do? do you need one in a desktop PC at school? at work? at home? in a laptop? how do you ensure it is active in your computer?

6 © 2006 Prentice-Hall, Inc.Slide 6 What can be done? (p 369- 376) Surge protectors & UPS - why? costs? Virus protection Updates vital – why? How can I check currency? Windows Update Ensure this is Automatic, or DIY! (or use Mac/linux!) Other ideas (p 378, plus research!) There is no 100% secure system – so? Be careful where you visit/download and… Backup!

7 In-class Activity Open the screen that tells you whether your virus protection is up-to-date Take screen shot Paste to Word, and explain why keeping this up-to-date is vital. What would you do if this is out of date? Reply to thread for ‘In-class discussion - Week 10’, and attach the Word document. (bonus if you remember that Word format is not the best choice!) Slide 7

8 © 2006 Prentice-Hall, Inc.Slide 8 Chapter 10 Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future.

9 © 2006 Prentice-Hall, Inc.Slide 9 Focus on Backup (p376) When do we backup? Just before data loss! Time triggered – how can we schedule in Windows? Change triggered – why is this better? What do we back up? whole drive? – why not? ’My Documents’ (be sure to put all your data there) What about e-mail address book? IE Favorites? and what else? What if I lose the entire drive? “80% of PC’s are inadequately backed up - The only cure for this kind of stupidity is a disaster.” (W.D. Riley, data security administrator, NCRI)

10 © 2006 Prentice-Hall, Inc.Slide 10 Focus on Backup How do we backup data? Auto (Recycle bin) – why is this not enough? Windows Backup Program vs Drag & Drop Windows Backup Program Cloud computing – how does this solve the backup problem? Any cons? Where do we backup to? USB key/CD/DVD – pros & cons? Copy to external hard drive – cost? where do we keep it? N drive at school – pros? cons? Advanced solutions RAID – can actually do on home computer – see Dell site Web-based backup services – such as? Don’t forget to practice restore! (Why?)restore

11 © 2006 Prentice-Hall, Inc.Slide 11 Chapter 10 Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future.

12 © 2006 Prentice-Hall, Inc.Slide 12 Security-related Issues for the Future. (p377-390) “The delicate balance” between security & privacy examples? what can we do to affect the ‘balance’? Will Computers Be Democratic? What does Lech Walesa say? Who was he? Examples of this in action? Is it always true? is this always a good thing? Will the Global Village Be a Community? What did Davis and Davidson say? What is threatening this openness today? What do you foresee? What can we do?


Download ppt "Slide 1 Tomorrow’s Technology and You Chapter 10 Computer Security."

Similar presentations


Ads by Google