SlideShare a Scribd company logo
Computer Security  and Privacy
Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy  Unethical employee Cyberextortionist Cyberterrorist Back doors spoofing Virus Worm Trojan horse Malware Payload Virus signature/virus definition Quarantine Virus hoax Botnets Denial of service attacks
Computer Security Risks Computer security risk  – any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing. Computer   crime  – any illegal act involving a computer. Cybercrime  – online or Internet-based illegal acts
Cyber Crime Categories Hacker  – someone who accesses a computer or network illegally. Claims intent  is to improve security Cracker  – someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
Script   kiddie   –Often  are teenagers that use prewritten hacking and cracking programs to break into computers has the same intent as a cracker does not have the technical skills and background. Corporate   spies  – are hired to break into a specific computer and steal its proprietary data and information Have excellent computer and network skills Cyber Crime Categories
Unethical   employees  – break into their employers ‘ computers for a variety of reasons 1) To exploit a security weakness; 2) seek financial gains from selling confidential information; 3) disgruntled employees seek revenge Cyberextortionist  – someone who uses e-mail as a vehicle for extortion. Send a company a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the company’s network—if they are  not paid a sum of money Cyber Crime Categories
Cyberterrorist  – uses the Internet or network to destroy or damage computers for political reasons. Usually require a team of highly skilled individuals, millions of dollars, and several years of planning Cyber Crime Categories
Internet and Network Attacks Attacks that jeopardize security include computer viruses, worms, and Trojan horses; botnets; denial of service attacks; back doors; and spoofing. Virus  – a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission Worm  –a program that copies itself repeatedly  Trojan   horse  – a program that hides within or looks like a legitimate program.
Virus, worms, Trojan horse are classified as malware. Malware   (malicious software) – program that act without a user’s knowledge and deliberately alter the computer’s operation Payload  –  the destructive event or  prank the program is intended to deliver. Internet and Network Attacks
Symptoms of a computer affected by virus, worm or Trojan horse Screen displays unusual message or image Available memory is less than expected Files become corrupted Unknown programs or files mysteriously appear Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly System properties change
Safeguards against viruses, worms, and Trojan horses Don’t start with removable media CDs, DVDs, and USB flash drives Never open an e-mail from an unknown source Never open an e-mail attachment unless you are expecting the attachment Set macro security level to medium Stay informed about new virus alerts and virus hoaxes.
Install antivirus program and update it frequently How antivirus programs work Look for virus  signatures/virus definitions —a known specific pattern of virus code. Quarantine infected file Safeguards against viruses, worms, and Trojan horses
Network and Internet  Security Risks Denial of service attack (DoS)   hackers run multiple copies of a program to flood it and shut it down.
Back Doors A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network. Spoofing fooling another computer by pretending to send packets from a legitimate source Network and Internet  Security Risks
Safeguards against DoS Attacks, Back Doors, and IP Spoofing Firewalls allows normal Web browser operations but prevents other types of communication checks incoming data against a list of known sources data rejected if it does not fit a preset profile
Intrusion Detection Software Automatically analyzes all network traffic, assesses system vulnerabilities Identifies any unauthorized access (intrusions) Notifies network administrators of suspicious behavior patterns or system breaches Safeguards against DoS Attacks, Back Doors, and IP Spoofing
Safeguards Against Unauthorized Access And Use Access control A security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer. Audit trail Records in a file both successful and unsuccessful access attempts. User Name and passwords Longer passwords provide better security
Password Protections Average Time to Discover Number of Characters Possible Combinations Human Computer 1 36 3 minutes .0000018 seconds 2 1,300 2 hours .00065 seconds 3 47,000 3 days .02 seconds 4 1,700,000 3 months 1 second 5 60,000,000 10 years 30 seconds 10 3,700,000,000,000,000 580 million years 59 years
Possessed Objects Any item that you must carry to gain access to a computer or computer facility. (Examples: badges, cards, smart cards & key) Often are used in combination with personal identification numbers. Biometric Devices Authenticates a person’s identify by translating a personal characteristics, such as a fingerprint, into a digital code that is then compared with a digital code stored in the computer to verify a physical or behavioral characteristic Safeguards Against Unauthorized Access And Use
Lets Review A back door attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Answer Denial of service
Lets Review 2. All networked and online computer users should implement a firewall solution. Answer Yes, because a firewall protects a network’s resources from intrusion (software or hardware) by users on another network.
Lets Review 3. Computer viruses, worms, and Trojan horses are malware that act with a user’s knowledge. Answer Are classified as malware, but acts with out  a user’s knowledge and deliberately alters the computer’s operations.
Lets Review 4. Shorter passwords provide greater security than longer ones. Answer The  longer  the password, the more effort required to discover it.
Lets Review 5. Updating an antivirus program’s quarantine protects a computer against viruses written since the antivirus program was released. Answer Updating an antivirus program’s  signature files  protects a computer against viruses written since the antivirus program was release.
Theft and Vandalism Hardware Locking doors/windows Install alarm systems Using cables to lock computers to stationary object Install a mini-security system Software piracy  —unauthorized and illegal duplication of copyrighted software. License agreement
License Agreement Are permitted to Install on only  one  computer Make one copy of the software as a backup Give or sell the software to another individual, but only is the software is removed from the user’s computer first. Not allowed to: Install the software on a network, such as a school computer lab Give copies to friends and colleagues, while continuing to use the software Export the software Rent or lease the software
Theft Information  – occurs when someone steals personal or confidential information. Encryption—the process of converting readable data into unreadable characters to prevent unauthorized access. Plaintext--Unencrypted, readable data Ciphertext—is the scrambled (encrypted) data Encryption key—a programmed formula that the recipient of the data uses to decrypt ciphertext.
Security Risk System failure – the prolonged malfunction of a computer Safeguards Surge protectors Uninterruptible power supply (UPS)  Backup files
Let’s Review True or False.  An end-user license agreement (EULA) permits users to give copies to friends and colleagues, while continuing to use the software. Answer False, Does not permit users to give copies to friends and colleagues, while continuing to use the software.
True or False.  Encryption is a process of converting ciphertext into plaintext to prevent authorized access. Let’s Review Answer False.  Converting plaintext into ciphertext
3.  True or False. Mobile users are not susceptible to hardware theft. Let’s Review Answer False. They are susceptible
4.  True or False. To prevent against data loss caused by a system failure, computer users should restore files regularly. Let’s Review Answer Backup files regularly
Did You Know? The penalty for copying software can be up to $250,000, five years in  prison , or both?
Security Strategies for Protecting Computer Systems and Data Network Sniffer displays network traffic data shows which resources employees use and Web sites they visit can be used to troubleshoot network connections and improve system performance

More Related Content

PPTX
Computer security
OZ Assignment help
 
PPTX
Security concepts
artisriva
 
PDF
Computer Security
Frederik Questier
 
PPTX
Basic concepts in computer security
Arzath Areeff
 
PPTX
Computer security
Shashi Chandra
 
PPTX
Computer security basics
Srinu Potnuru
 
PPT
Introduction To Computer Security
Vibrant Event
 
PPTX
Computer Security risks Shelly
Adeel Khurram
 
Computer security
OZ Assignment help
 
Security concepts
artisriva
 
Computer Security
Frederik Questier
 
Basic concepts in computer security
Arzath Areeff
 
Computer security
Shashi Chandra
 
Computer security basics
Srinu Potnuru
 
Introduction To Computer Security
Vibrant Event
 
Computer Security risks Shelly
Adeel Khurram
 

What's hot (20)

PPT
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
PPTX
Security in Computer System
Manesh T
 
PPTX
Basic practices for information & computer security
PrajktaGN
 
PDF
Computer Security and Risks
Miguel Rebollo
 
PPTX
Computer security and
Rana Usman Sattar
 
PPTX
Computer security
EktaVaswani2
 
PPT
Computer security
Univ of Salamanca
 
PPT
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
PPT
Computer security overview
CAS
 
PPT
Basic Security Chapter 1
AfiqEfendy Zaen
 
PPTX
Computer security threats & prevention
PriSim
 
PPTX
Computer Security
William Mann
 
PPTX
Computer , Internet and physical security.
Ankur Kumar
 
PDF
Free Libre Open Source Software Development
Frederik Questier
 
PPTX
Unauthorized access and use
chrispaul8676
 
PPTX
Computer Security 101
Progressive Integrations
 
PPTX
Computer security risks
Aasim Mushtaq
 
PPTX
4.2.1 computer security risks
hazirma
 
PPT
3 Most Common Threats Of Information Security
Ana Meskovska
 
PPTX
Security Basics
Rishi Prasath
 
Viruses (Lecture) IT Slides # 3
Muhammad Talha Zaroon
 
Security in Computer System
Manesh T
 
Basic practices for information & computer security
PrajktaGN
 
Computer Security and Risks
Miguel Rebollo
 
Computer security and
Rana Usman Sattar
 
Computer security
EktaVaswani2
 
Computer security
Univ of Salamanca
 
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Computer security overview
CAS
 
Basic Security Chapter 1
AfiqEfendy Zaen
 
Computer security threats & prevention
PriSim
 
Computer Security
William Mann
 
Computer , Internet and physical security.
Ankur Kumar
 
Free Libre Open Source Software Development
Frederik Questier
 
Unauthorized access and use
chrispaul8676
 
Computer Security 101
Progressive Integrations
 
Computer security risks
Aasim Mushtaq
 
4.2.1 computer security risks
hazirma
 
3 Most Common Threats Of Information Security
Ana Meskovska
 
Security Basics
Rishi Prasath
 
Ad

Viewers also liked (20)

PPTX
Hacker&cracker
Pat Ninlawan
 
PPTX
DDoS dengan LOIC, HOIC dan Slowloris.pl
Gani Amanda Abdulah
 
PPTX
Chapter 4
beiharira
 
PPTX
Chapter 2
beiharira
 
PPTX
Chapter 1
beiharira
 
PPTX
Hacking tutorial.
Ham'zzah Mir-zza
 
PPTX
Chapter 5
beiharira
 
PPTX
UAS TESTING
beiharira
 
PPTX
Chapter 6
beiharira
 
PPT
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
PPT
Cyber Crime
Sumit Dutta
 
PPT
Ethical Hacking
Harshit Upadhyay
 
PPTX
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Belinda Isamar
 
PPT
Backtrack os 5
Ayush Goyal
 
PPTX
Bab 01 complete
Norhisham Mohamad Nordin
 
PPSX
Hacking
Ranjan Som
 
PPT
TYPES OF HACKING
SHERALI445
 
PPTX
Introduction To Ethical Hacking
Neel Kamal
 
PPTX
ethical hacking in the modern times
jeshin jose
 
PPTX
Ethical hacking presentation
Suryansh Srivastava
 
Hacker&cracker
Pat Ninlawan
 
DDoS dengan LOIC, HOIC dan Slowloris.pl
Gani Amanda Abdulah
 
Chapter 4
beiharira
 
Chapter 2
beiharira
 
Chapter 1
beiharira
 
Hacking tutorial.
Ham'zzah Mir-zza
 
Chapter 5
beiharira
 
UAS TESTING
beiharira
 
Chapter 6
beiharira
 
Hackers Cracker Network Intruder
Erdo Deshiant Garnaby
 
Cyber Crime
Sumit Dutta
 
Ethical Hacking
Harshit Upadhyay
 
Presentasi chap 6 Penipuan dan Teknik Penyalahgunaan Komputer
Belinda Isamar
 
Backtrack os 5
Ayush Goyal
 
Bab 01 complete
Norhisham Mohamad Nordin
 
Hacking
Ranjan Som
 
TYPES OF HACKING
SHERALI445
 
Introduction To Ethical Hacking
Neel Kamal
 
ethical hacking in the modern times
jeshin jose
 
Ethical hacking presentation
Suryansh Srivastava
 
Ad

Similar to Computer security and_privacy_2010-2011 (20)

PPT
Computer security
Merma Niña Callanta
 
PPT
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
PPT
Computer security
fiza1975
 
PPT
Computer security
Dhani Ahmad
 
DOCX
Chapter 10.0
Adebisi Tolulope
 
PPT
Tutorial 09 - Security on the Internet and the Web
dpd
 
PPT
3e - Computer Crime
MISY
 
PPT
3e - Security And Privacy
MISY
 
PPTX
Computer security ethics_and_privacy
Ardit Meti
 
PDF
Information Security Lecture Notes
FellowBuddy.com
 
PDF
Sec0001 .pdf
mah902110
 
PPTX
Internet safety and you
Art Ocain
 
PPT
computer_security.ppt
Asif Raza
 
PPTX
Computing safety ryr
ryrsyd
 
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PDF
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
PPTX
Data security
Soumen Mondal
 
PPTX
Network Security Basics in networking to learn
amansinght675
 
PPTX
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Cengage Learning
 
Computer security
Merma Niña Callanta
 
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Computer security
fiza1975
 
Computer security
Dhani Ahmad
 
Chapter 10.0
Adebisi Tolulope
 
Tutorial 09 - Security on the Internet and the Web
dpd
 
3e - Computer Crime
MISY
 
3e - Security And Privacy
MISY
 
Computer security ethics_and_privacy
Ardit Meti
 
Information Security Lecture Notes
FellowBuddy.com
 
Sec0001 .pdf
mah902110
 
Internet safety and you
Art Ocain
 
computer_security.ppt
Asif Raza
 
Computing safety ryr
ryrsyd
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 
Data security
Soumen Mondal
 
Network Security Basics in networking to learn
amansinght675
 
Compusecuraphobia – The Fear of HOPING Your Computer is Secure - Course Techn...
Cengage Learning
 

Recently uploaded (20)

PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Care of patients with elImination deviation.pptx
AneetaSharma15
 
PPTX
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
DOCX
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
PDF
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
PPTX
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
PPTX
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
PPTX
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
PPTX
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PDF
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
PPTX
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
PPTX
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PPTX
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
PPTX
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
PDF
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Care of patients with elImination deviation.pptx
AneetaSharma15
 
Artificial Intelligence in Gastroentrology: Advancements and Future Presprec...
AyanHossain
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
Modul Ajar Deep Learning Bahasa Inggris Kelas 11 Terbaru 2025
wahyurestu63
 
Biological Classification Class 11th NCERT CBSE NEET.pdf
NehaRohtagi1
 
Five Point Someone – Chetan Bhagat | Book Summary & Analysis by Bhupesh Kushwaha
Bhupesh Kushwaha
 
Kanban Cards _ Mass Action in Odoo 18.2 - Odoo Slides
Celine George
 
HISTORY COLLECTION FOR PSYCHIATRIC PATIENTS.pptx
PoojaSen20
 
INTESTINALPARASITES OR WORM INFESTATIONS.pptx
PRADEEP ABOTHU
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
The-Invisible-Living-World-Beyond-Our-Naked-Eye chapter 2.pdf/8th science cur...
Sandeep Swamy
 
Command Palatte in Odoo 18.1 Spreadsheet - Odoo Slides
Celine George
 
An introduction to Prepositions for beginners.pptx
drsiddhantnagine
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
HEALTH CARE DELIVERY SYSTEM - UNIT 2 - GNM 3RD YEAR.pptx
Priyanshu Anand
 
Gupta Art & Architecture Temple and Sculptures.pptx
Virag Sontakke
 
What is CFA?? Complete Guide to the Chartered Financial Analyst Program
sp4989653
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 

Computer security and_privacy_2010-2011

  • 1. Computer Security and Privacy
  • 2. Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee Cyberextortionist Cyberterrorist Back doors spoofing Virus Worm Trojan horse Malware Payload Virus signature/virus definition Quarantine Virus hoax Botnets Denial of service attacks
  • 3. Computer Security Risks Computer security risk – any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing. Computer crime – any illegal act involving a computer. Cybercrime – online or Internet-based illegal acts
  • 4. Cyber Crime Categories Hacker – someone who accesses a computer or network illegally. Claims intent is to improve security Cracker – someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
  • 5. Script kiddie –Often are teenagers that use prewritten hacking and cracking programs to break into computers has the same intent as a cracker does not have the technical skills and background. Corporate spies – are hired to break into a specific computer and steal its proprietary data and information Have excellent computer and network skills Cyber Crime Categories
  • 6. Unethical employees – break into their employers ‘ computers for a variety of reasons 1) To exploit a security weakness; 2) seek financial gains from selling confidential information; 3) disgruntled employees seek revenge Cyberextortionist – someone who uses e-mail as a vehicle for extortion. Send a company a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the company’s network—if they are not paid a sum of money Cyber Crime Categories
  • 7. Cyberterrorist – uses the Internet or network to destroy or damage computers for political reasons. Usually require a team of highly skilled individuals, millions of dollars, and several years of planning Cyber Crime Categories
  • 8. Internet and Network Attacks Attacks that jeopardize security include computer viruses, worms, and Trojan horses; botnets; denial of service attacks; back doors; and spoofing. Virus – a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission Worm –a program that copies itself repeatedly Trojan horse – a program that hides within or looks like a legitimate program.
  • 9. Virus, worms, Trojan horse are classified as malware. Malware (malicious software) – program that act without a user’s knowledge and deliberately alter the computer’s operation Payload – the destructive event or prank the program is intended to deliver. Internet and Network Attacks
  • 10. Symptoms of a computer affected by virus, worm or Trojan horse Screen displays unusual message or image Available memory is less than expected Files become corrupted Unknown programs or files mysteriously appear Music or unusual sound plays randomly Existing programs and files disappear Programs or files do not work properly System properties change
  • 11. Safeguards against viruses, worms, and Trojan horses Don’t start with removable media CDs, DVDs, and USB flash drives Never open an e-mail from an unknown source Never open an e-mail attachment unless you are expecting the attachment Set macro security level to medium Stay informed about new virus alerts and virus hoaxes.
  • 12. Install antivirus program and update it frequently How antivirus programs work Look for virus signatures/virus definitions —a known specific pattern of virus code. Quarantine infected file Safeguards against viruses, worms, and Trojan horses
  • 13. Network and Internet Security Risks Denial of service attack (DoS) hackers run multiple copies of a program to flood it and shut it down.
  • 14. Back Doors A program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or network. Spoofing fooling another computer by pretending to send packets from a legitimate source Network and Internet Security Risks
  • 15. Safeguards against DoS Attacks, Back Doors, and IP Spoofing Firewalls allows normal Web browser operations but prevents other types of communication checks incoming data against a list of known sources data rejected if it does not fit a preset profile
  • 16. Intrusion Detection Software Automatically analyzes all network traffic, assesses system vulnerabilities Identifies any unauthorized access (intrusions) Notifies network administrators of suspicious behavior patterns or system breaches Safeguards against DoS Attacks, Back Doors, and IP Spoofing
  • 17. Safeguards Against Unauthorized Access And Use Access control A security measure that defines who can access a computer, when they can access it, and what actions they can take while accessing the computer. Audit trail Records in a file both successful and unsuccessful access attempts. User Name and passwords Longer passwords provide better security
  • 18. Password Protections Average Time to Discover Number of Characters Possible Combinations Human Computer 1 36 3 minutes .0000018 seconds 2 1,300 2 hours .00065 seconds 3 47,000 3 days .02 seconds 4 1,700,000 3 months 1 second 5 60,000,000 10 years 30 seconds 10 3,700,000,000,000,000 580 million years 59 years
  • 19. Possessed Objects Any item that you must carry to gain access to a computer or computer facility. (Examples: badges, cards, smart cards & key) Often are used in combination with personal identification numbers. Biometric Devices Authenticates a person’s identify by translating a personal characteristics, such as a fingerprint, into a digital code that is then compared with a digital code stored in the computer to verify a physical or behavioral characteristic Safeguards Against Unauthorized Access And Use
  • 20. Lets Review A back door attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail. Answer Denial of service
  • 21. Lets Review 2. All networked and online computer users should implement a firewall solution. Answer Yes, because a firewall protects a network’s resources from intrusion (software or hardware) by users on another network.
  • 22. Lets Review 3. Computer viruses, worms, and Trojan horses are malware that act with a user’s knowledge. Answer Are classified as malware, but acts with out a user’s knowledge and deliberately alters the computer’s operations.
  • 23. Lets Review 4. Shorter passwords provide greater security than longer ones. Answer The longer the password, the more effort required to discover it.
  • 24. Lets Review 5. Updating an antivirus program’s quarantine protects a computer against viruses written since the antivirus program was released. Answer Updating an antivirus program’s signature files protects a computer against viruses written since the antivirus program was release.
  • 25. Theft and Vandalism Hardware Locking doors/windows Install alarm systems Using cables to lock computers to stationary object Install a mini-security system Software piracy —unauthorized and illegal duplication of copyrighted software. License agreement
  • 26. License Agreement Are permitted to Install on only one computer Make one copy of the software as a backup Give or sell the software to another individual, but only is the software is removed from the user’s computer first. Not allowed to: Install the software on a network, such as a school computer lab Give copies to friends and colleagues, while continuing to use the software Export the software Rent or lease the software
  • 27. Theft Information – occurs when someone steals personal or confidential information. Encryption—the process of converting readable data into unreadable characters to prevent unauthorized access. Plaintext--Unencrypted, readable data Ciphertext—is the scrambled (encrypted) data Encryption key—a programmed formula that the recipient of the data uses to decrypt ciphertext.
  • 28. Security Risk System failure – the prolonged malfunction of a computer Safeguards Surge protectors Uninterruptible power supply (UPS) Backup files
  • 29. Let’s Review True or False. An end-user license agreement (EULA) permits users to give copies to friends and colleagues, while continuing to use the software. Answer False, Does not permit users to give copies to friends and colleagues, while continuing to use the software.
  • 30. True or False. Encryption is a process of converting ciphertext into plaintext to prevent authorized access. Let’s Review Answer False. Converting plaintext into ciphertext
  • 31. 3. True or False. Mobile users are not susceptible to hardware theft. Let’s Review Answer False. They are susceptible
  • 32. 4. True or False. To prevent against data loss caused by a system failure, computer users should restore files regularly. Let’s Review Answer Backup files regularly
  • 33. Did You Know? The penalty for copying software can be up to $250,000, five years in prison , or both?
  • 34. Security Strategies for Protecting Computer Systems and Data Network Sniffer displays network traffic data shows which resources employees use and Web sites they visit can be used to troubleshoot network connections and improve system performance

Editor's Notes

  • #5: Both hackers and crackers have advanced computer and network skills
  • #8: Example: The extensive damage might destroy the nation’s air traffic control system, electricity-generating companies, or a telecommunications infrastructure. The more common computer securityb risks include Internet theft, network attacks, unauthorized access, and use, hardware theft, software theft, information thft, and system failure.
  • #9: Every unprotected computer is susceptible to these computer security risks: computer virus; worm; Trojan Horse Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system. Worm example: in memory or on a network , using up resources and possible shutting down the computer or network Trojan horse – a certain condition or action usually triggers the Trojan horse. Unlike a virus or worm, a Trojan horse does not replicate itself to other computers
  • #10: Unscrupulous programmers write malware and then test it to ensure it can deliver its payload.
  • #12: Many programs allow a user to preview an e-mail message before or without opening it. Thus you should turn off message preview in your e-mail program. Virus hoax – an e-mail message that warns users of a nonexistent virus, worm, or Trojan horse. Often, these virus hoaxes are in the form of a chain letter that request the user to send a copy of the e-mail messages to as many people as possible. Antivirus program—protects a computer against viruses by identifying and removing an y computer viruses found in memory, on storage media, or on incoming files. Most antivirus programs also protect against worms, Trojan horses, and spyware. Some viruses are hidden in macros, which are instructions saved in an application such as a word processing or spreadsheet program.
  • #15: Back Doors – once inside the software, they often install a back door or modify an existing program to include as back door, which allows them to continue to access the computer remotely without the user’s knowledge. Spoofing – Perpetrators trick their victims into interacting with a phony Web site. The victim may provide confidential information or download files containing viruses, worms, or other malwar fooling another computer by pretending to send packets from a legitimate source e.
  • #17: Software requires the expertise of a network administrator because the programs are complex and difficult to use and interpret. These programs are expensive.
  • #26: a mini-security system -- shuts down the computer and sound an alarm if the computer is moved outside a specified distance License agreement—is the right to use the software
  • #29: System failure– can cause loss of hardware, software, data, or information. UPS – advice the contains surge protection circuits and one or more batteries that can provide power during a loss of power. A ups connects between your computers and a power source.