Chapter10-Issuesandtrend
Chapter10-Issuesandtrend
1
Computer Security Risks
• A computer security risk is any event or action that could cause a loss of or
damage to computer hardware, software, data, information, or processing
capability
• A cybercrime is an online or Internet-based illegal act
• Any illegal act involving the use of a computer or related devices generally is
referred to as a computer crime
Unethical
Cyberextortionists Cyberterrorists
Employees
2
Computer Security Risks
3
Internet and Network Attacks
4
Internet and Network Attacks
Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program that
computer repeatedly, program that hides in a
negatively by using up hides within computer
altering the resources or looks like and allows
way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
6
Internet and Network Attacks
7
Internet and Network Attacks
8
Internet and Network Attacks
9
Internet and Network Attacks
• A botnet is a group of compromised computers connected to a
network
– A compromised computer is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to
Internet services
– Distributed DoS (DDoS)
• A back door is a program or set of instructions in a program that
allow users to bypass security controls
• Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimate
10
Internet and Network Attacks
11
Internet and Network Attacks
Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
12
Unauthorized Access and Use
Unauthorize
Unauthorize d use is the
d access is use of a
the use of a computer or
computer or its data for
network unapproved
without or possibly
permission illegal
activities
13
Unauthorized Access and Use
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
14
Unauthorized Access and Use
16
Unauthorized Access and Use
Information
Insurance
security
agencies
departments
17
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
18
Hardware Theft and Vandalism
19
Software Theft
Illegally registers
Illegally copies a
and/or activates
program
a program
20
Software Theft
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
21
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
22
Information Theft
23
Information Theft
24
Information Theft
25
Information Theft
26
Information Theft
27
System Failure
29
Backing Up – The Ultimate Safeguard
30
Backing Up – The Ultimate Safeguard
Parent
Child
31
Wireless Security
32
Wireless Security
Configure a WAP
so that only Use WPA or WPA2
certain devices can security standards
access it
33
Health Concerns of Computer Use
34
Health Concerns of Computer Use
35
Health Concerns of Computer Use
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
36
Health Concerns of Computer Use
38
Ethics and Society
39
Ethics and Society
40
Ethics and Society
41
Ethics and Society
42
Ethics and Society
43
Ethics and Society
Assist with
Allow for Store users’
online
personalization passwords
shopping
Track how
Target
often users visit
advertisements
a site
45
Ethics and Society
46
Ethics and Society
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks
e-mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox
47
Ethics and Society
• Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
• Pharming is a scam where
a perpetrator attempts to
obtain your personal and
financial information via
spoofing
48
Ethics and Society
49
Ethics and Society
50
Ethics and Society