Professional Documents
Culture Documents
Computers 2012
Your Interactive Guide
to the Digital World
ObjectivesOverview
Definetheterm, Describevarioustypes
Discusstechniquesto
computersecurityrisks, ofInternetandnetwork
preventunauthorized
andbrieflydescribethe attacks,andidentify
computeraccessand
typesofcybercrime waystosafeguard
use
perpetrators againsttheseattacks
Explaintheways
Identifysafeguards Discusshowencryption
softwaremanufacturers
againsthardwaretheft works,andexplainwhy
protectagainst
andvandalism itisnecessary
softwarepiracy
SeePage555 DiscoveringComputers2012:Chapter11 2
forDetailedObjectives
ObjectivesOverview
Discussthetypesof Identifyrisksand
Explaintheoptions
devicesavailablethat safeguardsassociated
availableforbackingup
protectcomputersfrom withwireless
computerresources
systemfailure communications
Recognizeissuesrelated
Discusswaystoprevent
toinformationaccuracy, Discussissues
healthrelateddisorders
intellectualproperty surroundinginformation
andinjuriesdueto
rights,codesofconduct, privacy
computeruse
andgreencomputing
SeePage555 DiscoveringComputers2012:Chapter11 3
forDetailedObjectives
ComputerSecurityRisks
Acomputersecurityrisk isanyeventoractionthatcould
causealossofordamagetocomputerhardware,
software,data,information,orprocessingcapability
Acybercrime isanonlineorInternetbasedillegalact
Unethical
Cyberextortionists Cyberterrorists
Employees
Informationtransmittedovernetworkshasahigher
degreeofsecurityriskthaninformationkeptonan
organizationspremises
Anonlinesecurityservice isaWebsitethatevaluates
yourcomputertocheckforInternetandemail
vulnerabilities
Page558 DiscoveringComputers2012:Chapter11 6
Figure112
InternetandNetworkAttacks
Computer
Worm TrojanHorse Rootkit
Virus
Affectsa Copiesitself Amalicious Programthat
computer repeatedly, programthat hidesina
negativelyby usingup hideswithin computer
alteringthe resources orlookslike andallows
waythe andpossibly alegitimate someone
computer shutting program froma
works downthe remote
computeror locationto
network takefull
control
Page558 DiscoveringComputers2012:Chapter11 7
InternetandNetworkAttacks
Aninfectedcomputerhasoneormoreofthe
followingsymptoms:
Operatingsystem Availablememory Screendisplays
Filesbecome
runsmuchslower islessthan unusualmessage
corrupted
thanusual expected orimage
Unknown
Musicorunusual Programsorfiles
Existingprograms programsorfiles
soundplays donotwork
andfilesdisappear mysteriously
randomly properly
appear
Operatingsystem
Systemproperties Operatingsystem
shutsdown
change doesnotstartup
unexpectedly
Page559 DiscoveringComputers2012:Chapter11 9
Figure113
InternetandNetworkAttacks
Page561 DiscoveringComputers2012:Chapter11 10
Figure116
InternetandNetworkAttacks
Userscantakeseveral
precautionstoprotect
theirhomeandwork
computersandmobile
devicesfromthese
maliciousinfections
Abotnet isagroupofcompromisedcomputersconnectedtoa
network
Acompromisedcomputerisknownasazombie
Adenialofserviceattack(DoS attack)disruptscomputeraccessto
Internetservices
DistributedDoS (DDoS)
Abackdoor isaprogramorsetofinstructionsinaprogramthat
allowuserstobypasssecuritycontrols
Spoofing isatechniqueintrudersusetomaketheirnetworkor
Internettransmissionappearlegitimate
Afirewall ishardwareand/orsoftwarethat
protectsanetworksresourcesfromintrusion
Intrusiondetectionsoftware
Analyzesallnetworktraffic
Assessessystemvulnerabilities
Identifiesanyunauthorizedintrusions
Notifiesnetworkadministratorsofsuspiciousbehavior
patternsorsystembreaches
Honeypot
Vulnerablecomputerthatissetuptoenticeanintruderto
breakintoit
Page564 DiscoveringComputers2012:Chapter11 14
UnauthorizedAccessandUse
Page564 DiscoveringComputers2012:Chapter11 15
UnauthorizedAccessandUse
Organizationstake
severalmeasuresto
helpprevent
unauthorizedaccess
anduse
Acceptableusepolicy
Disablefileandprinter
sharing
Firewalls
Intrusiondetection
software
Page565 DiscoveringComputers2012:Chapter11 16
Figure1110
UnauthorizedAccessandUse
Accesscontrolsdefinewhocanaccessa
computer,whentheycanaccessit,andwhat
actionstheycantake
Twophaseprocessescalledidentificationand
authentication
Username
Password
Passphrase
CAPTCHA
Pages565 567 DiscoveringComputers2012:Chapter11 17
Figure1111
UnauthorizedAccessandUse
Apossessedobjectisany Abiometricdevice
itemthatyoumustcarryto authenticatesapersons
gainaccesstoacomputer identitybytranslatinga
orcomputerfacility personalcharacteristicinto
Oftenareusedin adigitalcodethatis
combinationwithapersonal comparedwithadigital
identificationnumber (PIN) codeinacomputer
Page568 DiscoveringComputers2012:Chapter11 18
Figure1114
UnauthorizedAccessandUse
Digitalforensics isthediscovery,collection,and
analysisofevidencefoundoncomputersand
networks
Manyareasusedigitalforensics
Law Criminal Military
enforcement prosecutors intelligence
Information
Insurance
security
agencies
departments
Page569 DiscoveringComputers2012:Chapter11 19
HardwareTheftandVandalism
Hardwarevandalism
Hardwaretheft isthe
istheactofdefacing
actofstealing
ordestroying
computerequipment
computerequipment
Page570 DiscoveringComputers2012:Chapter11 20
HardwareTheftandVandalism
Tohelpreducetheofchancesoftheft,companies
andschoolsuseavarietyofsecuritymeasures
Cablestolock
Physicalaccesscontrols Alarmsystems
equipment
Realtimelocation Passwords,possessed
system objects,andbiometrics
Page570 DiscoveringComputers2012:Chapter11 21
Figure1115
SoftwareTheft
Softwaretheft occurswhensomeone:
Stealssoftware Intentionally
media erasesprograms
Illegally
Illegallycopiesa registersand/or
program activatesa
program
Page571 DiscoveringComputers2012:Chapter11 22
SoftwareTheft
Asingleuserlicenseagreement typicallycontainsthe
followingconditions:
Permittedto
Installthesoftwareononecomputer
Makeonecopyofthesoftware
Removethesoftwarefromyourcomputerbeforegivingitawayorsellingit
Notpermittedto
Installthesoftwareonanetwork
Givecopiestofriendsorcolleagueswhilecontinuingtousethesoftware
Exportthesoftware
Rentorleasethesoftware
Page571 DiscoveringComputers2012:Chapter11 23
SoftwareTheft
Copying,loaning,
borrowing,renting,or
distributingsoftware
canbeaviolationof
copyrightlaw
Somesoftwarerequires
productactivation to
functionfully
Informationtheftoccurswhensomeonesteals
personalorconfidentialinformation
Encryption isaprocessofconvertingreadable
dataintounreadablecharacterstoprevent
unauthorizedaccess
Page573 DiscoveringComputers2012:Chapter11 26
Figure1118
InformationTheft
Adigitalsignature isanencryptedcodethata
person,Website,ororganizationattachestoan
electronicmessagetoverifytheidentityofthe
sender
Oftenusedtoensurethatanimpostorisnot
participatinginanInternettransaction
WebbrowsersandWebsitesuseencryption
techniques
Page574 DiscoveringComputers2012:Chapter11 27
InformationTheft
Popularsecuritytechniquesinclude
Digital TransportLayer
Certificates Security(TLS)
SecureHTTP VPN
Asystemfailureistheprolongedmalfunctionofa
computer
Avarietyoffactorscanleadtosystemfailure,
including:
Aginghardware
Naturaldisasters
Electricalpowerproblems
Noise,undervoltages,andovervoltages
Errorsincomputerprograms
Page575 DiscoveringComputers2012:Chapter11 30
SystemFailure
Twowaystoprotectfromsystemfailurescaused
byelectricalpowervariationsincludesurge
protectors anduninterruptablepowersupplies
(UPS)
Page576 DiscoveringComputers2012:Chapter11 31
Figures1121 1122
BackingUp TheUltimateSafeguard
Abackup isaduplicateofafile,program,ordisk
thatcanbeusediftheoriginalislost,damaged,
ordestroyed
Tobackup afilemeanstomakeacopyofit
Offsitebackupsarestoredinalocationseparate
fromthecomputersite
Cloud
Storage
Page577 DiscoveringComputers2012:Chapter11 32
BackingUp TheUltimateSafeguard
Twocategoriesof Threegeneration
backups: backuppolicy
Fullbackup
Grandparent
Selectivebackup
Parent
Child
Page577 DiscoveringComputers2012:Chapter11 33
WirelessSecurity
Wirelessaccessposesadditionalsecurityrisks
About80percentofwirelessnetworkshavenosecurity
protection
Wardrivingallowsindividualstodetectwireless
networkswhiledrivingavehiclethroughthearea
Page578 DiscoveringComputers2012:Chapter11 34
Figure1123
WirelessSecurity
Inadditionaltousingfirewalls,somesafeguards
improvesecurityofwirelessnetworks:
Awirelessaccess
Changethedefault
pointshouldnot
SSID
broadcastanSSID
ConfigureaWAP
sothatonly UseWPAorWPA2
certaindevicescan securitystandards
accessit
Page578 DiscoveringComputers2012:Chapter11 35
HealthConcernsofComputerUse
Thewidespreaduseof
computershasledto
healthconcerns
Repetitivestraininjury
(RSI)
Tendonitis
Carpaltunnelsyndrome
(CTS)
Computervision
syndrome (CVS)
Page579 DiscoveringComputers2012:Chapter11 36
Figure1124
HealthConcernsofComputerUse
Page580 DiscoveringComputers2012:Chapter11 37
Figure1125
HealthConcernsofComputerUse
Ergonomicsisan
appliedsciencedevoted
toincorporating
comfort,efficiency,and
safetyintothedesignof
itemsintheworkplace
Page580 DiscoveringComputers2012:Chapter11 38
Figure1126
HealthConcernsofComputerUse
Computeraddiction occurswhenthecomputer
consumessomeonesentiresociallife
Symptomsofusersinclude:
Craves Overjoyed Unabletostop
computer whenatthe computer
time computer activity
Computerethics are
themoralguidelines
thatgoverntheuseof
computersand
informationsystems
Informationaccuracyis
aconcern
Notallinformationon
theWebiscorrect
Intellectualpropertyrightsaretherightsto
whichcreatorsareentitledfortheirwork
Acopyright protectsanytangibleformofexpression
AnITcodeofconduct isawrittenguideline
thathelpsdeterminewhetheraspecific
computeractionisethicalorunethical
Page582 DiscoveringComputers2012:Chapter11 41
EthicsandSociety
Page583 DiscoveringComputers2012:Chapter11 42
Figure1129
EthicsandSociety
Greencomputing involvesreducingtheelectricity
andenvironmentalwastewhileusingacomputer
Informationprivacyreferstotherightof
individualsandcompaniestodenyorrestrictthe
collectionanduseofinformationaboutthem
Hugedatabasesstoredataonline
Itisimportanttosafeguardyourinformation
Page584 DiscoveringComputers2012:Chapter11 44
EthicsandSociety
Page584 DiscoveringComputers2012:Chapter11 45
Figure1131
EthicsandSociety
Whenyoufillouta
form,themerchantthat
receivestheform
usuallyentersitintoa
database
Manycompaniestoday
allowpeopletospecify
whethertheywant
theirpersonal
informationdistributed
Page585 DiscoveringComputers2012:Chapter11 46
Figure1132
EthicsandSociety
Acookie isasmalltextfilethataWebserverstoreson
yourcomputer
Websitesusecookiesforavarietyofreasons:
Assistwith
Allowfor Storeusers
online
personalization passwords
shopping
Trackhow
Target
oftenusers
advertisements
visitasite
Pages585 586 DiscoveringComputers2012:Chapter11 47
EthicsandSociety
Page586 DiscoveringComputers2012:Chapter11 48
Figure1133
EthicsandSociety
Spam isanunsolicited
emailmessageor
newsgroupposting
Emailfiltering blocks
emailmessagesfrom
designatedsources
Antispamprograms
attempttoremove
spambeforeitreaches
yourinbox
Page587 DiscoveringComputers2012:Chapter11 49
Figure1134
EthicsandSociety
Phishing isascamin
whichaperpetratorsends
anofficiallookingemail
messagethatattemptsto
obtainyourpersonaland
financialinformation
Pharming isascam
whereaperpetrator
attemptstoobtainyour
personalandfinancial
informationviaspoofing
Theconcernaboutprivacyhasledtothe
enactmentoffederalandstatelawsregardingthe
storageanddisclosureofpersonaldata
SeeFigure1136onpage589foralistingofmajorU.S.
governmentlawsconcerningprivacy
The1970 FairCreditReportingAct limitsthe
rightsofothersviewingacreditreporttoonly
thosewithalegitimatebusinessneed
Page588 DiscoveringComputers2012:Chapter11 51
EthicsandSociety
Socialengineering isdefinedasgaining
unauthorizedaccessorobtainingconfidential
informationbytakingadvantageoftrustandnaivety
Employeemonitoring involvestheuseofcomputers
toobserve,record,andreviewanemployeesuseof
acomputer
Page590 DiscoveringComputers2012:Chapter11 52
EthicsandSociety
Contentfiltering isthe
processofrestricting
accesstocertainmaterial
ontheWeb
Manybusinessesuse
contentfiltering
InternetContentRating
Association(ICRA)
Webfilteringsoftware
restrictsaccessto
specifiedWebsites
Potentialcomputerrisksand Wirelesssecurityrisksand
safeguards safeguards
Ethicalissuessurrounding
informationaccuracy,
Computerrelatedhealth intellectualpropertyrights,
issuesandpreventions codesofconduct,green
computing,andinformation
privacy
Page591 DiscoveringComputers2012:Chapter11 54
Discovering
Computers 2012
Your Interactive Guide
to the Digital World
Chapter11Complete