Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
14 views
Computer chapter no.6
Computer Security and Ethics, Chapter 6, grade 9
Uploaded by
Faisal khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer chapter no.6 For Later
Download
Save
Save Computer chapter no.6 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
14 views
Computer chapter no.6
Computer Security and Ethics, Chapter 6, grade 9
Uploaded by
Faisal khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
Download now
Download
Save Computer chapter no.6 For Later
Carousel Previous
Carousel Next
Save
Save Computer chapter no.6 For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 24
Search
Fullscreen
COMPUTER SECURITY AND ETHICS This is 10 periods Chapter including practical work. * Understand the importance of computer security * Define cybercrime, hacker and cracker * Differentiate between various types of attacks (virus, worm, adware, spyware, and Malware) + Understand how viruses spread * Know the common symptoms of attack by Vitus, worm, adware, spyware and malware * Understand how antivirus and anti-spyware software can protect computer from various types of attacks: * Differentiate between authentication and authorization + Differentiate between authorized access and unauthorized access * Describe authentication methodologies ‘© Describe the term multimodal authentication * Know that computer ethics are the moral guidelines that govern the use of computers and information systems + Describe computer ethics in information accuracy, information ownership, intellectual property rights, software piracy and information privacy UNIT INTRODUCTION Computer viruses and other types of harmful software often infect computer and damage computer hardware or software. Computer user must have knowledge about computer security to protect computer from malicious threats and keep it in good working condition. Computer technology should not be used to harm other people who use computers. This unit presents material about computer security and moral guidelines for ethical use of computer. . Scanned with CamScannerye v 6 He mpl Security and Ethics 159 ? 6.1 COMPUTER SECURITY computer security refers to protecting computer hardware, software and information stored ‘i computer from threats. of gt IMPORTANCE OF COMPUTER SECURITY Computer users often exchange information with each other or communicate over Internet. this can infect a user's computer with virus or other types of malicious software. Some users are aware of computer threats but many are unaware and do not know how to protect their computers. Computer security or safety is important for computer users to protect their computer from different threats. It is necessary to install security software such as firewall, antivirus and spyware on computers. 6.1.2 CYBER CRIME, HACKER AND CRACKER Cybercrime Cybercrime refers to any crime that is committed by means of computer and Internet technology by having unlawful access to others’ computers. Computer and Intemet have improved our lives in many ways but unfortunately, the same technology is also used by criminals to harm the sociely. More and more criminals are exploiting the convenience and anonymity of the Internet to commit various types of crimes Cybercrime now includes sativities that cross intemational borders and can be considered a global epidemic. It is a erious concer for governments all over the world as it continues to grow: Many governments have passed cybercrime bill that carry fines and prison sentences for cybercriminals. “The following are the commonly committed cybererimes. «Computers have been involved in crimes such as fraud, Kidnapping, murder and crimes elated with stealing money from bank and credit card company. «Criminals use internet to steal personal information of other users and commit various types of eybererimes. Personal information includes username, password, credit card number, bank account number, etc. «Downloading illegal software, music files and videos are also cybercrimes. Internet harassment or cyber bullying is also a serious crime committed by cybercriminals. Internet harassment includes sending threatening e-mail, spreading rumors or virus, making defamatory comments, sending pornography or other bad material. Making negative comments about an individual on Internet can damage reputation or cause physical or mental harm to the victim. Scanned with CamScanner160 6 Comput ty Hacker A person who illegally breaks into others’ computer systems is known as hacker Hack ng is a cybercrime. Hackers are computer experts who try to gain unauthorized access to computor systoms for stealing and corrupting information, Most of the hackers break into computers for financial benefits. They try to get credit cart details or bank account information so that they can steal money, Hackers have in-depth knowledge of network programming and can create tools and malicious software for others to break into networks and create problems. For example, a hacker develops software in which a dictionary file is loaded that contains all the dictionary words. When the software is run it tries all the dictionary words one by one as Password to hack a Computer. This method works if the user is having a simple password that exists in the dictionary, Cracker Cracker is a computer user who breaks into computer systems without permission using hacking tools for personal gain or damage and commits cybercrimes, Most of the crackers do not have professional computer skill to hack computer systems but they have knowledge about using hacking tools. Crackers break info computers and cause serious damage. They also break into’ Web Servers and replace the home page of a website with a page oftheir own design. These criminals are dangerous and harder to catch, For example, a cracker can install a key logger on another user’s computer through Internet. A key-logger is software which records every typed letter on the keyboard. When the user uses Facebook and enters the Facebook account detals, it wil get recorded in the cracker's computer. Now, he can easily hack the Facebook account. 6.1.3 MALWARE AND ITS TYPES thr Malware is malicious software. It comprises of a number of harmful software that are eats to all computer users. Malware is created for attack on privacy, spying, destruction and financial benefits. Most common types of malware are: ¢ Computer viruses « Worms ‘Spyware Adware Scanned with CamScannerG constr Seurty ad tes 461 aunuter ViTuses ‘Acomputer virus is a type of malware that spreads by inserting a copy of itself into another gram oF file. j, Most of the viruses are attached to executable files. ii, Viruses spread and infect other files when a computer user opens the infected program or file. iii, Viruses also spread when infected files are transferred from one computer to another through network, USB flash drive, CD/DVD or infected e-mail attachments. iv. Some viruses are not very harmful they are simply annoying while others can seriously damage the hardware, software or the information stored on the computer. \. Viruses can slow down the computer and some can even stop its operation. Examples of viruses are | Love You, MyDoom, etc. | Love You is an e-mail virus that infected computer when user opened an e-mail attachment named “| Love You". MyDoom Virus Detected ! oO lett Vato tecet Os dSuritveRALeeSergMepompbte Cab inetd Sieutost tevin ‘Hovenceelbe meta ec cette The cinta matters ove ate AUS VAL (GekteNove to AUS VAULT tonto se enone elcid etinriceldetna er a kia ta fesse Bam. places eles Wo rcoonepd you tlc tha Wove To VIUS VAULT” Fig.6-1 Detection of computer virus by antivirus software virus was discovered in 2004. It quickly infected about one million computers. Virus detection 1. is shown in Fig. Worms. ‘A worm is a malware that transmits itself over a network to infect other computers. FOR YOUR INFORMATION: The first computer virus named "Brain' was created by two Pakistani brothers, Basit Farooq Alvi and ‘Amjad Farooq Alvi in Lahore in | 1986. i, Worm can be harmful like a virus. Scanned with CamScannerNTS es Fig.6-2 Detection of worm by anitvirus software ads automatically rks and replicates it computer ni It can travel from computer to computer without any human action iii, It enters a computer through a weakness in the operating system of the computer. iv. Most of the worms cause some harm to the network such as slowing down communication by increasing network traffic. Code Red and Fizzer are examples of worms. Code Red worm broke out in July, 2001 and infected about 360,000 computers in a single day. Fizzer is a mass-mailing worm that captures a user's keystrokes and can allow the attacker access to infected computer. Fig.6- 2 shows detection of an e-mail worm by antivirus software. Spyware their activities on the computer. i. ii. Sirewano Alen ‘Spyware programs are developed to spy on computer users by gathering information about Spyware is developed for the personal benefit of the creator. It performs secret operations such as stealing password or banking PIN (Personal Identification Number) or other personal information about user. iii, It infects computers through installation of software form Internet. iv. It slows down the performance of infected computer. Most of the spyware is designed to be difficult to remove. Securty Wario! Warm Wis Ney detected cn your machine, ‘his wun is etiaded vin te tert cu eval nd Aetvax ortens wating unereteced mode every danger Taps Veus yom Attected Wve 2000, NT, Mt, XP, Veo, 7 Seeuy isk (0.6) & FRecemnendatens: Nie neoeasary to perfovm a ul eyctem gan, Fig.6-3 Detection of spyware by antivirus software For example, Flame is a spyware that was discovered in 2012. It attacks computers that use Microsoft Windows operating system. Itis known as one of the most sophisticated spyware used for the purpose of espionage. It can record screenshots, keyboard activities and network traffic. It also has the capability to turn on the computer microphone and record conversation over Skype. Detection of spyware by antivirus software is shown in Fig.6-3. Scanned with CamScanneryuter security and Ethics 2 Goo Securlty Suite yor adware jg a malware that attaches yf to free software on the Internet if infects computer when such satwer® is downloaded. sen Perfoming Scan
You might also like
Module 5-6
PDF
No ratings yet
Module 5-6
8 pages
Cyber-Security-2
PDF
No ratings yet
Cyber-Security-2
40 pages
IT Reviewer
PDF
No ratings yet
IT Reviewer
21 pages
The Set School Computer Class Vii Chapter:Cyber Security
PDF
100% (2)
The Set School Computer Class Vii Chapter:Cyber Security
9 pages
Imgtopdf 0501232113009
PDF
No ratings yet
Imgtopdf 0501232113009
27 pages
CS Virues
PDF
No ratings yet
CS Virues
31 pages
CYBERsecurity Module2
PDF
No ratings yet
CYBERsecurity Module2
20 pages
Computer Virus
PDF
No ratings yet
Computer Virus
10 pages
Cyber Crime
PDF
No ratings yet
Cyber Crime
10 pages
Category: Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
PDF
No ratings yet
Category: Asst. Prof. Nayna N Mistry (M.C.A, Net, Gset) Sutex Bank College of Computer Applications and Sciencepage 1
17 pages
CH 4
PDF
No ratings yet
CH 4
9 pages
Module 4 - Computer and Network Security
PDF
No ratings yet
Module 4 - Computer and Network Security
30 pages
Computer Security and Ethics
PDF
No ratings yet
Computer Security and Ethics
5 pages
Chap 6 Class 9 Comp
PDF
No ratings yet
Chap 6 Class 9 Comp
7 pages
Material6 GEL221
PDF
No ratings yet
Material6 GEL221
15 pages
Lesson 7 - IT Security Incidents
PDF
No ratings yet
Lesson 7 - IT Security Incidents
14 pages
1563881800unit 2 Malware and Its Types EDITS
PDF
No ratings yet
1563881800unit 2 Malware and Its Types EDITS
8 pages
COMP100 - Module 5
PDF
No ratings yet
COMP100 - Module 5
58 pages
Cyber Security
PDF
No ratings yet
Cyber Security
71 pages
Cyber Criime Cases and Effect Study
PDF
No ratings yet
Cyber Criime Cases and Effect Study
44 pages
Cyber Security
PDF
No ratings yet
Cyber Security
40 pages
Chapter 2- Computer Threat
PDF
No ratings yet
Chapter 2- Computer Threat
15 pages
Computing & Ethics
PDF
No ratings yet
Computing & Ethics
21 pages
Chapter 6 - Computer Hazard and Security (1)
PDF
No ratings yet
Chapter 6 - Computer Hazard and Security (1)
18 pages
d025e_241127_180520
PDF
No ratings yet
d025e_241127_180520
20 pages
Iis Micro Project
PDF
No ratings yet
Iis Micro Project
20 pages
Computer and Network Security
PDF
No ratings yet
Computer and Network Security
30 pages
Week 1 - 1st Sem Iaas311
PDF
No ratings yet
Week 1 - 1st Sem Iaas311
31 pages
Computer Security and Safety, Ethics, and Privacy
PDF
No ratings yet
Computer Security and Safety, Ethics, and Privacy
51 pages
Most Common Security Threats
PDF
No ratings yet
Most Common Security Threats
7 pages
Computer Security Risks: 2.1. Computer and Cyber Crimes
PDF
No ratings yet
Computer Security Risks: 2.1. Computer and Cyber Crimes
12 pages
Chapter 2 Part 1
PDF
No ratings yet
Chapter 2 Part 1
42 pages
Malicious Code (Sometimes Called Malware) Is A Type of Software Designed To Take Over or
PDF
No ratings yet
Malicious Code (Sometimes Called Malware) Is A Type of Software Designed To Take Over or
7 pages
CS Chapter 2 UP 1
PDF
No ratings yet
CS Chapter 2 UP 1
16 pages
Computer Security Issues
PDF
No ratings yet
Computer Security Issues
25 pages
2.3network Security
PDF
No ratings yet
2.3network Security
22 pages
Unit1 Computer Security
PDF
No ratings yet
Unit1 Computer Security
12 pages
Foundation of Information Technology: Fatima Attari R.N. 19 (A) I.T. Sem-III
PDF
No ratings yet
Foundation of Information Technology: Fatima Attari R.N. 19 (A) I.T. Sem-III
21 pages
Safety, System Security and Safe Computing
PDF
No ratings yet
Safety, System Security and Safe Computing
40 pages
Discovering Computers 2010: - Living in A Digital World
PDF
No ratings yet
Discovering Computers 2010: - Living in A Digital World
47 pages
Chapter 4 - Cyber-Attacks & Malwares
PDF
No ratings yet
Chapter 4 - Cyber-Attacks & Malwares
4 pages
Module 4 It
PDF
No ratings yet
Module 4 It
4 pages
Unit 3 Cyber Security
PDF
No ratings yet
Unit 3 Cyber Security
39 pages
Network and Security
PDF
No ratings yet
Network and Security
41 pages
Cybersecurity Prologue
PDF
No ratings yet
Cybersecurity Prologue
32 pages
M4 1B-C
PDF
No ratings yet
M4 1B-C
8 pages
Cyber Security Powerpoint
PDF
No ratings yet
Cyber Security Powerpoint
73 pages
Unit 3 Cyber Security
PDF
No ratings yet
Unit 3 Cyber Security
50 pages
n3YDP97p4biKNcBe908
PDF
No ratings yet
n3YDP97p4biKNcBe908
17 pages
Unit 3 Cyber Security
PDF
No ratings yet
Unit 3 Cyber Security
50 pages
Data and Information Security - CW3551 - Notes - Unit 2 - Security Investigation
PDF
No ratings yet
Data and Information Security - CW3551 - Notes - Unit 2 - Security Investigation
18 pages
3 Security Concepts
PDF
No ratings yet
3 Security Concepts
13 pages
Computer Virus: DR Sajeena S
PDF
100% (1)
Computer Virus: DR Sajeena S
28 pages
Cyber Security 20211013105857
PDF
No ratings yet
Cyber Security 20211013105857
73 pages
CH 6: Securing The Electronic Frontier Vulnerabilities of The Net P 183
PDF
No ratings yet
CH 6: Securing The Electronic Frontier Vulnerabilities of The Net P 183
9 pages
CS Chapter 2 UP
PDF
No ratings yet
CS Chapter 2 UP
16 pages
Cs Threats 1
PDF
No ratings yet
Cs Threats 1
30 pages
Cyber Security
PDF
100% (1)
Cyber Security
72 pages
COSC 6301 - Computer Security Threats - and - Vulnerabilities
PDF
No ratings yet
COSC 6301 - Computer Security Threats - and - Vulnerabilities
52 pages
7 Chapter, Computer Science
PDF
No ratings yet
7 Chapter, Computer Science
16 pages
Computer Networks chapter no.5
PDF
No ratings yet
Computer Networks chapter no.5
18 pages
Komal Pandoo 2
PDF
No ratings yet
Komal Pandoo 2
4 pages
Computer 8 grade
PDF
No ratings yet
Computer 8 grade
208 pages
New Microsoft PowerPoint Presentation
PDF
No ratings yet
New Microsoft PowerPoint Presentation
7 pages
TEST 2 GRADE 10
PDF
No ratings yet
TEST 2 GRADE 10
1 page
Recruitment Process
PDF
No ratings yet
Recruitment Process
2 pages
Rise of the Novel (18 to 19 century)
PDF
No ratings yet
Rise of the Novel (18 to 19 century)
2 pages
Tag tesx
PDF
No ratings yet
Tag tesx
48 pages
Pedagogical Approaches
PDF
No ratings yet
Pedagogical Approaches
2 pages