You are on page 1of 55

Discovering

Computers 2012
Your Interactive Guide
to the Digital World
ObjectivesOverview

Definetheterm, Describevarioustypes
Discusstechniquesto
computersecurityrisks, ofInternetandnetwork
preventunauthorized
andbrieflydescribethe attacks,andidentify
computeraccessand
typesofcybercrime waystosafeguard
use
perpetrators againsttheseattacks

Explaintheways
Identifysafeguards Discusshowencryption
softwaremanufacturers
againsthardwaretheft works,andexplainwhy
protectagainst
andvandalism itisnecessary
softwarepiracy

SeePage555 DiscoveringComputers2012:Chapter11 2
forDetailedObjectives
ObjectivesOverview

Discussthetypesof Identifyrisksand
Explaintheoptions
devicesavailablethat safeguardsassociated
availableforbackingup
protectcomputersfrom withwireless
computerresources
systemfailure communications

Recognizeissuesrelated
Discusswaystoprevent
toinformationaccuracy, Discussissues
healthrelateddisorders
intellectualproperty surroundinginformation
andinjuriesdueto
rights,codesofconduct, privacy
computeruse
andgreencomputing

SeePage555 DiscoveringComputers2012:Chapter11 3
forDetailedObjectives
ComputerSecurityRisks

Acomputersecurityrisk isanyeventoractionthatcould
causealossofordamagetocomputerhardware,
software,data,information,orprocessingcapability
Acybercrime isanonlineorInternetbasedillegalact

Hackers Crackers ScriptKiddies CorporateSpies

Unethical
Cyberextortionists Cyberterrorists
Employees

Pages556 557 DiscoveringComputers2012:Chapter11 4


ComputerSecurityRisks

Pages556 557 DiscoveringComputers2012:Chapter11 5


Figure111
InternetandNetworkAttacks

Informationtransmittedovernetworkshasahigher
degreeofsecurityriskthaninformationkeptonan
organizationspremises
Anonlinesecurityservice isaWebsitethatevaluates
yourcomputertocheckforInternetandemail
vulnerabilities

Page558 DiscoveringComputers2012:Chapter11 6
Figure112
InternetandNetworkAttacks

Computer
Worm TrojanHorse Rootkit
Virus
Affectsa Copiesitself Amalicious Programthat
computer repeatedly, programthat hidesina
negativelyby usingup hideswithin computer
alteringthe resources orlookslike andallows
waythe andpossibly alegitimate someone
computer shutting program froma
works downthe remote
computeror locationto
network takefull
control

Page558 DiscoveringComputers2012:Chapter11 7
InternetandNetworkAttacks

Aninfectedcomputerhasoneormoreofthe
followingsymptoms:
Operatingsystem Availablememory Screendisplays
Filesbecome
runsmuchslower islessthan unusualmessage
corrupted
thanusual expected orimage

Unknown
Musicorunusual Programsorfiles
Existingprograms programsorfiles
soundplays donotwork
andfilesdisappear mysteriously
randomly properly
appear

Operatingsystem
Systemproperties Operatingsystem
shutsdown
change doesnotstartup
unexpectedly

Pages558 559 DiscoveringComputers2012:Chapter11 8


InternetandNetworkAttacks

Page559 DiscoveringComputers2012:Chapter11 9
Figure113
InternetandNetworkAttacks

Page561 DiscoveringComputers2012:Chapter11 10
Figure116
InternetandNetworkAttacks

Userscantakeseveral
precautionstoprotect
theirhomeandwork
computersandmobile
devicesfromthese
maliciousinfections

Page560 561 DiscoveringComputers2012:Chapter11 11


Figure117
InternetandNetworkAttacks

Abotnet isagroupofcompromisedcomputersconnectedtoa
network
Acompromisedcomputerisknownasazombie
Adenialofserviceattack(DoS attack)disruptscomputeraccessto
Internetservices
DistributedDoS (DDoS)
Abackdoor isaprogramorsetofinstructionsinaprogramthat
allowuserstobypasssecuritycontrols
Spoofing isatechniqueintrudersusetomaketheirnetworkor
Internettransmissionappearlegitimate

Pages562 563 DiscoveringComputers2012:Chapter11 12


InternetandNetworkAttacks

Afirewall ishardwareand/orsoftwarethat
protectsanetworksresourcesfromintrusion

Pages563 564 DiscoveringComputers2012:Chapter11 13


Figure118
InternetandNetworkAttacks

Intrusiondetectionsoftware
Analyzesallnetworktraffic
Assessessystemvulnerabilities
Identifiesanyunauthorizedintrusions
Notifiesnetworkadministratorsofsuspiciousbehavior
patternsorsystembreaches
Honeypot
Vulnerablecomputerthatissetuptoenticeanintruderto
breakintoit
Page564 DiscoveringComputers2012:Chapter11 14
UnauthorizedAccessandUse

Unauthorizedaccess is Unauthorizeduse isthe


theuseofacomputeror useofacomputerorits
networkwithout dataforunapprovedor
permission possiblyillegalactivities

Page564 DiscoveringComputers2012:Chapter11 15
UnauthorizedAccessandUse

Organizationstake
severalmeasuresto
helpprevent
unauthorizedaccess
anduse
Acceptableusepolicy
Disablefileandprinter
sharing
Firewalls
Intrusiondetection
software

Page565 DiscoveringComputers2012:Chapter11 16
Figure1110
UnauthorizedAccessandUse

Accesscontrolsdefinewhocanaccessa
computer,whentheycanaccessit,andwhat
actionstheycantake
Twophaseprocessescalledidentificationand
authentication
Username
Password
Passphrase
CAPTCHA
Pages565 567 DiscoveringComputers2012:Chapter11 17
Figure1111
UnauthorizedAccessandUse

Apossessedobjectisany Abiometricdevice
itemthatyoumustcarryto authenticatesapersons
gainaccesstoacomputer identitybytranslatinga
orcomputerfacility personalcharacteristicinto
Oftenareusedin adigitalcodethatis
combinationwithapersonal comparedwithadigital
identificationnumber (PIN) codeinacomputer

Page568 DiscoveringComputers2012:Chapter11 18
Figure1114
UnauthorizedAccessandUse

Digitalforensics isthediscovery,collection,and
analysisofevidencefoundoncomputersand
networks
Manyareasusedigitalforensics
Law Criminal Military
enforcement prosecutors intelligence

Information
Insurance
security
agencies
departments
Page569 DiscoveringComputers2012:Chapter11 19
HardwareTheftandVandalism

Hardwarevandalism
Hardwaretheft isthe
istheactofdefacing
actofstealing
ordestroying
computerequipment
computerequipment

Page570 DiscoveringComputers2012:Chapter11 20
HardwareTheftandVandalism

Tohelpreducetheofchancesoftheft,companies
andschoolsuseavarietyofsecuritymeasures
Cablestolock
Physicalaccesscontrols Alarmsystems
equipment

Realtimelocation Passwords,possessed
system objects,andbiometrics

Page570 DiscoveringComputers2012:Chapter11 21
Figure1115
SoftwareTheft

Softwaretheft occurswhensomeone:

Stealssoftware Intentionally
media erasesprograms

Illegally
Illegallycopiesa registersand/or
program activatesa
program
Page571 DiscoveringComputers2012:Chapter11 22
SoftwareTheft

Asingleuserlicenseagreement typicallycontainsthe
followingconditions:
Permittedto
Installthesoftwareononecomputer
Makeonecopyofthesoftware
Removethesoftwarefromyourcomputerbeforegivingitawayorsellingit

Notpermittedto
Installthesoftwareonanetwork
Givecopiestofriendsorcolleagueswhilecontinuingtousethesoftware
Exportthesoftware
Rentorleasethesoftware
Page571 DiscoveringComputers2012:Chapter11 23
SoftwareTheft

Copying,loaning,
borrowing,renting,or
distributingsoftware
canbeaviolationof
copyrightlaw
Somesoftwarerequires
productactivation to
functionfully

Pages571 572 DiscoveringComputers2012:Chapter11 24


Figure1116
InformationTheft

Informationtheftoccurswhensomeonesteals
personalorconfidentialinformation
Encryption isaprocessofconvertingreadable
dataintounreadablecharacterstoprevent
unauthorizedaccess

Pages572 573 DiscoveringComputers2012:Chapter11 25


Figure1117
InformationTheft

Page573 DiscoveringComputers2012:Chapter11 26
Figure1118
InformationTheft

Adigitalsignature isanencryptedcodethata
person,Website,ororganizationattachestoan
electronicmessagetoverifytheidentityofthe
sender
Oftenusedtoensurethatanimpostorisnot
participatinginanInternettransaction
WebbrowsersandWebsitesuseencryption
techniques

Page574 DiscoveringComputers2012:Chapter11 27
InformationTheft

Popularsecuritytechniquesinclude

Digital TransportLayer
Certificates Security(TLS)

SecureHTTP VPN

Pages574 575 DiscoveringComputers2012:Chapter11 28


InformationTheft

Pages574 575 DiscoveringComputers2012:Chapter11 29


Figures1119 1120
SystemFailure

Asystemfailureistheprolongedmalfunctionofa
computer
Avarietyoffactorscanleadtosystemfailure,
including:
Aginghardware
Naturaldisasters
Electricalpowerproblems
Noise,undervoltages,andovervoltages
Errorsincomputerprograms
Page575 DiscoveringComputers2012:Chapter11 30
SystemFailure

Twowaystoprotectfromsystemfailurescaused
byelectricalpowervariationsincludesurge
protectors anduninterruptablepowersupplies
(UPS)

Page576 DiscoveringComputers2012:Chapter11 31
Figures1121 1122
BackingUp TheUltimateSafeguard

Abackup isaduplicateofafile,program,ordisk
thatcanbeusediftheoriginalislost,damaged,
ordestroyed
Tobackup afilemeanstomakeacopyofit
Offsitebackupsarestoredinalocationseparate
fromthecomputersite
Cloud
Storage

Page577 DiscoveringComputers2012:Chapter11 32
BackingUp TheUltimateSafeguard

Twocategoriesof Threegeneration
backups: backuppolicy
Fullbackup
Grandparent
Selectivebackup

Parent

Child

Page577 DiscoveringComputers2012:Chapter11 33
WirelessSecurity

Wirelessaccessposesadditionalsecurityrisks
About80percentofwirelessnetworkshavenosecurity
protection
Wardrivingallowsindividualstodetectwireless
networkswhiledrivingavehiclethroughthearea

Page578 DiscoveringComputers2012:Chapter11 34
Figure1123
WirelessSecurity

Inadditionaltousingfirewalls,somesafeguards
improvesecurityofwirelessnetworks:
Awirelessaccess
Changethedefault
pointshouldnot
SSID
broadcastanSSID

ConfigureaWAP
sothatonly UseWPAorWPA2
certaindevicescan securitystandards
accessit
Page578 DiscoveringComputers2012:Chapter11 35
HealthConcernsofComputerUse

Thewidespreaduseof
computershasledto
healthconcerns
Repetitivestraininjury
(RSI)
Tendonitis
Carpaltunnelsyndrome
(CTS)
Computervision
syndrome (CVS)

Page579 DiscoveringComputers2012:Chapter11 36
Figure1124
HealthConcernsofComputerUse

Page580 DiscoveringComputers2012:Chapter11 37
Figure1125
HealthConcernsofComputerUse

Ergonomicsisan
appliedsciencedevoted
toincorporating
comfort,efficiency,and
safetyintothedesignof
itemsintheworkplace

Page580 DiscoveringComputers2012:Chapter11 38
Figure1126
HealthConcernsofComputerUse

Computeraddiction occurswhenthecomputer
consumessomeonesentiresociallife
Symptomsofusersinclude:
Craves Overjoyed Unabletostop
computer whenatthe computer
time computer activity

Irritablewhen Neglects Problemsat


notatthe familyand workor
computer friends school
Page581 DiscoveringComputers2012:Chapter11 39
EthicsandSociety

Computerethics are
themoralguidelines
thatgoverntheuseof
computersand
informationsystems
Informationaccuracyis
aconcern
Notallinformationon
theWebiscorrect

Pages581 582 DiscoveringComputers2012:Chapter11 40


Figure1128
EthicsandSociety

Intellectualpropertyrightsaretherightsto
whichcreatorsareentitledfortheirwork

Acopyright protectsanytangibleformofexpression

AnITcodeofconduct isawrittenguideline
thathelpsdeterminewhetheraspecific
computeractionisethicalorunethical

Page582 DiscoveringComputers2012:Chapter11 41
EthicsandSociety

Page583 DiscoveringComputers2012:Chapter11 42
Figure1129
EthicsandSociety

Greencomputing involvesreducingtheelectricity
andenvironmentalwastewhileusingacomputer

Pages583 584 DiscoveringComputers2012:Chapter11 43


Figure1130
EthicsandSociety

Informationprivacyreferstotherightof
individualsandcompaniestodenyorrestrictthe
collectionanduseofinformationaboutthem
Hugedatabasesstoredataonline
Itisimportanttosafeguardyourinformation

Page584 DiscoveringComputers2012:Chapter11 44
EthicsandSociety

Page584 DiscoveringComputers2012:Chapter11 45
Figure1131
EthicsandSociety

Whenyoufillouta
form,themerchantthat
receivestheform
usuallyentersitintoa
database
Manycompaniestoday
allowpeopletospecify
whethertheywant
theirpersonal
informationdistributed
Page585 DiscoveringComputers2012:Chapter11 46
Figure1132
EthicsandSociety

Acookie isasmalltextfilethataWebserverstoreson
yourcomputer
Websitesusecookiesforavarietyofreasons:
Assistwith
Allowfor Storeusers
online
personalization passwords
shopping

Trackhow
Target
oftenusers
advertisements
visitasite
Pages585 586 DiscoveringComputers2012:Chapter11 47
EthicsandSociety

Page586 DiscoveringComputers2012:Chapter11 48
Figure1133
EthicsandSociety

Spam isanunsolicited
emailmessageor
newsgroupposting
Emailfiltering blocks
emailmessagesfrom
designatedsources
Antispamprograms
attempttoremove
spambeforeitreaches
yourinbox

Page587 DiscoveringComputers2012:Chapter11 49
Figure1134
EthicsandSociety

Phishing isascamin
whichaperpetratorsends
anofficiallookingemail
messagethatattemptsto
obtainyourpersonaland
financialinformation
Pharming isascam
whereaperpetrator
attemptstoobtainyour
personalandfinancial
informationviaspoofing

Pages587 588 DiscoveringComputers2012:Chapter11 50


Figure1135
EthicsandSociety

Theconcernaboutprivacyhasledtothe
enactmentoffederalandstatelawsregardingthe
storageanddisclosureofpersonaldata
SeeFigure1136onpage589foralistingofmajorU.S.
governmentlawsconcerningprivacy
The1970 FairCreditReportingAct limitsthe
rightsofothersviewingacreditreporttoonly
thosewithalegitimatebusinessneed

Page588 DiscoveringComputers2012:Chapter11 51
EthicsandSociety

Socialengineering isdefinedasgaining
unauthorizedaccessorobtainingconfidential
informationbytakingadvantageoftrustandnaivety

Employeemonitoring involvestheuseofcomputers
toobserve,record,andreviewanemployeesuseof
acomputer

Page590 DiscoveringComputers2012:Chapter11 52
EthicsandSociety

Contentfiltering isthe
processofrestricting
accesstocertainmaterial
ontheWeb
Manybusinessesuse
contentfiltering
InternetContentRating
Association(ICRA)
Webfilteringsoftware
restrictsaccessto
specifiedWebsites

Pages590 591 DiscoveringComputers2012:Chapter11 53


Figure1137
Summary

Potentialcomputerrisksand Wirelesssecurityrisksand
safeguards safeguards

Ethicalissuessurrounding
informationaccuracy,
Computerrelatedhealth intellectualpropertyrights,
issuesandpreventions codesofconduct,green
computing,andinformation
privacy
Page591 DiscoveringComputers2012:Chapter11 54
Discovering
Computers 2012
Your Interactive Guide
to the Digital World
Chapter11Complete

You might also like