0% found this document useful (0 votes)
14 views

Computer chapter no.6

Computer Security and Ethics, Chapter 6, grade 9

Uploaded by

Faisal khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
14 views

Computer chapter no.6

Computer Security and Ethics, Chapter 6, grade 9

Uploaded by

Faisal khan
Copyright
© © All Rights Reserved
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 24
COMPUTER SECURITY AND ETHICS This is 10 periods Chapter including practical work. * Understand the importance of computer security * Define cybercrime, hacker and cracker * Differentiate between various types of attacks (virus, worm, adware, spyware, and Malware) + Understand how viruses spread * Know the common symptoms of attack by Vitus, worm, adware, spyware and malware * Understand how antivirus and anti-spyware software can protect computer from various types of attacks: * Differentiate between authentication and authorization + Differentiate between authorized access and unauthorized access * Describe authentication methodologies ‘© Describe the term multimodal authentication * Know that computer ethics are the moral guidelines that govern the use of computers and information systems + Describe computer ethics in information accuracy, information ownership, intellectual property rights, software piracy and information privacy UNIT INTRODUCTION Computer viruses and other types of harmful software often infect computer and damage computer hardware or software. Computer user must have knowledge about computer security to protect computer from malicious threats and keep it in good working condition. Computer technology should not be used to harm other people who use computers. This unit presents material about computer security and moral guidelines for ethical use of computer. . Scanned with CamScanner ye v 6 He mpl Security and Ethics 159 ? 6.1 COMPUTER SECURITY computer security refers to protecting computer hardware, software and information stored ‘i computer from threats. of gt IMPORTANCE OF COMPUTER SECURITY Computer users often exchange information with each other or communicate over Internet. this can infect a user's computer with virus or other types of malicious software. Some users are aware of computer threats but many are unaware and do not know how to protect their computers. Computer security or safety is important for computer users to protect their computer from different threats. It is necessary to install security software such as firewall, antivirus and spyware on computers. 6.1.2 CYBER CRIME, HACKER AND CRACKER Cybercrime Cybercrime refers to any crime that is committed by means of computer and Internet technology by having unlawful access to others’ computers. Computer and Intemet have improved our lives in many ways but unfortunately, the same technology is also used by criminals to harm the sociely. More and more criminals are exploiting the convenience and anonymity of the Internet to commit various types of crimes Cybercrime now includes sativities that cross intemational borders and can be considered a global epidemic. It is a erious concer for governments all over the world as it continues to grow: Many governments have passed cybercrime bill that carry fines and prison sentences for cybercriminals. “The following are the commonly committed cybererimes. «Computers have been involved in crimes such as fraud, Kidnapping, murder and crimes elated with stealing money from bank and credit card company. «Criminals use internet to steal personal information of other users and commit various types of eybererimes. Personal information includes username, password, credit card number, bank account number, etc. «Downloading illegal software, music files and videos are also cybercrimes. Internet harassment or cyber bullying is also a serious crime committed by cybercriminals. Internet harassment includes sending threatening e-mail, spreading rumors or virus, making defamatory comments, sending pornography or other bad material. Making negative comments about an individual on Internet can damage reputation or cause physical or mental harm to the victim. Scanned with CamScanner 160 6 Comput ty Hacker A person who illegally breaks into others’ computer systems is known as hacker Hack ng is a cybercrime. Hackers are computer experts who try to gain unauthorized access to computor systoms for stealing and corrupting information, Most of the hackers break into computers for financial benefits. They try to get credit cart details or bank account information so that they can steal money, Hackers have in-depth knowledge of network programming and can create tools and malicious software for others to break into networks and create problems. For example, a hacker develops software in which a dictionary file is loaded that contains all the dictionary words. When the software is run it tries all the dictionary words one by one as Password to hack a Computer. This method works if the user is having a simple password that exists in the dictionary, Cracker Cracker is a computer user who breaks into computer systems without permission using hacking tools for personal gain or damage and commits cybercrimes, Most of the crackers do not have professional computer skill to hack computer systems but they have knowledge about using hacking tools. Crackers break info computers and cause serious damage. They also break into’ Web Servers and replace the home page of a website with a page oftheir own design. These criminals are dangerous and harder to catch, For example, a cracker can install a key logger on another user’s computer through Internet. A key-logger is software which records every typed letter on the keyboard. When the user uses Facebook and enters the Facebook account detals, it wil get recorded in the cracker's computer. Now, he can easily hack the Facebook account. 6.1.3 MALWARE AND ITS TYPES thr Malware is malicious software. It comprises of a number of harmful software that are eats to all computer users. Malware is created for attack on privacy, spying, destruction and financial benefits. Most common types of malware are: ¢ Computer viruses « Worms ‘Spyware Adware Scanned with CamScanner G constr Seurty ad tes 461 aunuter ViTuses ‘Acomputer virus is a type of malware that spreads by inserting a copy of itself into another gram oF file. j, Most of the viruses are attached to executable files. ii, Viruses spread and infect other files when a computer user opens the infected program or file. iii, Viruses also spread when infected files are transferred from one computer to another through network, USB flash drive, CD/DVD or infected e-mail attachments. iv. Some viruses are not very harmful they are simply annoying while others can seriously damage the hardware, software or the information stored on the computer. \. Viruses can slow down the computer and some can even stop its operation. Examples of viruses are | Love You, MyDoom, etc. | Love You is an e-mail virus that infected computer when user opened an e-mail attachment named “| Love You". MyDoom Virus Detected ! oO lett Vato tecet Os dSuritveRALeeSergMepompbte Cab inetd Sieutost tevin ‘Hovenceelbe meta ec cette The cinta matters ove ate AUS VAL (GekteNove to AUS VAULT tonto se enone elcid etinriceldetna er a kia ta fesse Bam. places eles Wo rcoonepd you tlc tha Wove To VIUS VAULT” Fig.6-1 Detection of computer virus by antivirus software virus was discovered in 2004. It quickly infected about one million computers. Virus detection 1. is shown in Fig. Worms. ‘A worm is a malware that transmits itself over a network to infect other computers. FOR YOUR INFORMATION: The first computer virus named "Brain' was created by two Pakistani brothers, Basit Farooq Alvi and ‘Amjad Farooq Alvi in Lahore in | 1986. i, Worm can be harmful like a virus. Scanned with CamScanner NTS es Fig.6-2 Detection of worm by anitvirus software ads automatically rks and replicates it computer ni It can travel from computer to computer without any human action iii, It enters a computer through a weakness in the operating system of the computer. iv. Most of the worms cause some harm to the network such as slowing down communication by increasing network traffic. Code Red and Fizzer are examples of worms. Code Red worm broke out in July, 2001 and infected about 360,000 computers in a single day. Fizzer is a mass-mailing worm that captures a user's keystrokes and can allow the attacker access to infected computer. Fig.6- 2 shows detection of an e-mail worm by antivirus software. Spyware their activities on the computer. i. ii. Sirewano Alen ‘Spyware programs are developed to spy on computer users by gathering information about Spyware is developed for the personal benefit of the creator. It performs secret operations such as stealing password or banking PIN (Personal Identification Number) or other personal information about user. iii, It infects computers through installation of software form Internet. iv. It slows down the performance of infected computer. Most of the spyware is designed to be difficult to remove. Securty Wario! Warm Wis Ney detected cn your machine, ‘his wun is etiaded vin te tert cu eval nd Aetvax ortens wating unereteced mode every danger Taps Veus yom Attected Wve 2000, NT, Mt, XP, Veo, 7 Seeuy isk (0.6) & FRecemnendatens: Nie neoeasary to perfovm a ul eyctem gan, Fig.6-3 Detection of spyware by antivirus software For example, Flame is a spyware that was discovered in 2012. It attacks computers that use Microsoft Windows operating system. Itis known as one of the most sophisticated spyware used for the purpose of espionage. It can record screenshots, keyboard activities and network traffic. It also has the capability to turn on the computer microphone and record conversation over Skype. Detection of spyware by antivirus software is shown in Fig.6-3. Scanned with CamScanner yuter security and Ethics 2 Goo Securlty Suite yor adware jg a malware that attaches yf to free software on the Internet if infects computer when such satwer® is downloaded. sen Perfoming Scan

You might also like