Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Security, Ethics and Privacy Chapter 11.

Similar presentations


Presentation on theme: "Computer Security, Ethics and Privacy Chapter 11."— Presentation transcript:

1 Computer Security, Ethics and Privacy Chapter 11

2 Computer Security Risk Computer Crime Computer Crime CyberCrime CyberCrime Hacker Hacker Cracker Cracker Script Kiddie Script Kiddie Cyberextortionist Cyberextortionist Cyberterrist Cyberterrist

3 Internet Attacks Computer viruses Computer viruses Computer program that affects the way a computer works without permission or knowledge of the owner Computer program that affects the way a computer works without permission or knowledge of the owner Can damage files and system software Can damage files and system software Computer worms Computer worms Copies itself repeatedly, causing a network to clog and go down Copies itself repeatedly, causing a network to clog and go down Trojan Horses Trojan Horses Hides within a legitimate program Hides within a legitimate program Condition or action triggers the Trojan horse Condition or action triggers the Trojan horse Does not replicate itself Does not replicate itself

4 How Should Virus Authors Be Punished?????

5 How long is an Unprotected Computer safe from Intruders? A – 10 minutes A – 10 minutes B – 20 minutes B – 20 minutes C – 30 minutes C – 30 minutes D – 5 minutes D – 5 minutes

6 How to Safeguard Yourself Only use trusted sources Only use trusted sources Use Anti-Virus programs Use Anti-Virus programs McAfee McAfee Norton Norton AVG AVG Kapersky Kapersky Spyware Blocker Spyware Blocker

7 Virus Terminology Virus Signature Virus Signature Virus Definition Virus Definition Inoculate Inoculate Quarantine Quarantine Virus Hoax Virus Hoax

8 Denial of Service Attacks Designed to overload a server until it crashes Designed to overload a server until it crashes Examples???? Examples????

9 Back Doors Bypassing Security systems already in place Bypassing Security systems already in place Usually install a program or modify one to meet their needs Usually install a program or modify one to meet their needs Spoofing – transmission appears to be harmless Spoofing – transmission appears to be harmless

10 Firewalls Hardware and/or software Hardware and/or software Use controls and passwords Use controls and passwords

11 Passwords The last word in passwords! The last word in passwords! Check out Chart on page 567 Check out Chart on page 567 PINs PINs Biometric Devices Biometric Devices

12 Hardware Theft and Vandalism Backup Backup

13 Software Theft Apple vs Microsoft Apple vs Microsoft

14 Safeguards Against Software Theft Restricting who can load software Restricting who can load software Use or loose the license agreement Use or loose the license agreement

15 What NOT to DO! Install the software on a network, such as a school computer lab Install the software on a network, such as a school computer lab Give copies to friends and family while continuing to use the software Give copies to friends and family while continuing to use the software Export the software Export the software Rent or lease the software Rent or lease the software


Download ppt "Computer Security, Ethics and Privacy Chapter 11."

Similar presentations


Ads by Google