Chapter 06 Ethics and Computer Security 062021
Chapter 06 Ethics and Computer Security 062021
Ethics
and
Computer
Security
Objectives:
3
A. Information Accuracy
5
C. Codes of Conduct
6
7
D. Green Computing
10
11
6.2 Digital Security Risk
• Same intent as a cracker but does not have the technical skills and
Script knowledge
Kiddie • Often use prewritten hacking and cracking programs to break into
computers
13
6.2 Digital Security Risk
• Break into their employers’ computers for variety of
reasons
Unethical • Seek financial gains from selling confidential
employees information
• Disgruntled employees may want revenge
17
Safeguards against Internet and
Network Attacks
Antivirus software
An antivirus software protects a computer against viruses
by identifying and removing any computer viruses found
in memory, on storage media, or on incoming files.
Firewall
A firewall is hardware and/or software that protects a
network’s resources from intrusion by users on another
network, such as the Internet.
Organizations use firewalls to protect network resources
from outsiders and to restrict employees’ access to
sensitive data, such as payroll or personnel records.
18
6.4 Unauthorized Access & Use
19
Safeguards against Unauthorized Access
and Use
Access Control
An access control is a security measure that defines who
can access a computer, device, or network; when they can
access it; and what actions they can take while accessing
it.
Usernames, passwords, passphrase and PIN
A username or user ID – unique combination of characters,
such as letters of the alphabet or numbers, that identifies
one specific user.
A password is a private combination of characters
associated with the username that allows access to certain
computer resources.
20
Safeguards against Unauthorized
Access and Use
Usernames, passwords, passphrase and PIN
Passphrase - A passphrase is a private combination of
words, often containing mixed capitalization and
punctuation, associated with a user name allows access
to certain computer resources. It can be up to 100
characters in length.
PIN (personal identification number) - sometimes called a
passcode, is a numeric password. Either assigned by a
company or selected by user.
21
Safeguards against Unauthorized
Access and Use
Possessed Objects
Any item that you must possess, or carry with you, in order
to gain access to a computer or computer facility.
Examples of possessed objects are badges, cards, smart
cards, and keys.
Biometric Devices
A biometric device authenticates a person’s identity by
translating a personal characteristic, such as a fingerprint,
into a digital code that is compared with a digital code
stored in a computer or mobile device verifying a physical
or behavioural characteristic. E.g. Fingerprint Reader, Face
recognition system, voice verification system and etc 22
6.5 Software Theft
Software theft occurs when someone steals software
media, intentionally erases programs, illegally registers
and/or activates a program, or illegally copies a program.
Physically stealing software
▪ Physically stealing the media that contain the software or the
hardware that contains the media.
Intentionally erasing software
▪ Dishonest programmers intentionally remove or disable the
programs they have written for the company after termination
Illegally copying
▪ Software stolen from software manufacturers
▪ Software piracy is the unauthorized and illegal duplication of
copyrighted software
23
Safeguards against Software Theft
24
6.6 Information Theft
25
Safeguards against Information Theft
Encryption
Is the process of converting data that is readable by
humans into encoded characters to prevent unauthorized
access
To read the data, the recipient must decrypt or decode it
into readable form.
26
Safeguards against Information Theft
Digital signature
is an encrypted code that a person, web site, or organization
attaches to an electronic message to verify the identity of
the message sender.
It also can verify that the content of a message has not
changed.
Digital certificate
Is a notice that guarantees a user or web site is legitimate.
E-commerce applications commonly use digital certificates.
27
6.7 Hardware Theft and Vandalism,
28
Safeguards against Hardware Theft &
Vandalism
Physical access controls
(e.g. locked doors, alarm)
Physical security devices
(e.g. cables lock
equipment)
Real time location
system (RTLS) – RFID
tags
Password-protect
portable storage devices
29
Backing up – The ultimate safeguard
31