Transcript IT 10103

IT 10103
Introduction to Information Technology
CHAPTER 11 – Computers and Society, Security,
Privacy, and Ethics
Computer Security Risks
A computer security risk is any event or
action that could cause a loss of or damage
to computer hardware, software, data,
information, or processing capability.
Computer Security Risks
Cybercrime
Online or internet based illegal acts
An FBI top 10 priority
Viruses, Worms, Trojan Horses
Virus
A potentially damaging computer program
Viruses, Worms, Trojan Horses
Worm
A program that copies itself to create some
type of problem for the infected computer or
network
Viruses, Worms, Trojan Horses
Trojan Horse
A program that hides within a legitimate
program. Activates on some trigger.
Viruses, Worms, Trojan Horses
Virus Symptoms:
Unusual Screen Messages
Music or Sounds play randomly
Memory is reduced
Programs disappear
Files are corrupted
Programs do not work correctly
Unknown programs appear
System properties change
Viruses, Worms, Trojan Horses
How do we get these?
Opening an infected file
Running an infected program
Booting an infected computer with a disk
that is infected
Opening infected E-mail messages
Viruses, Worms, Trojan Horses
There are over 90,000 known viruses, etc.
6 - 10 new viruses, etc
are discovered each day
Viruses, Worms, Trojan Horses
Getting rid of viruses, etc.
Avast! Anti-Virus
http://www.avast.com
Viruses, Worms, Trojan Horses
Preventing Viruses, etc:
Page 562
Unauthorized Access
Using a computer or network without
permission
Cracker = illegally accesses a computer
network
Hacker = Same as cracker, but more elite
status
Unauthorized Access
Firewall
One way to prevent hacking or cracking.
It is a combination of hardware and
software that blocks unwanted attacks from
your computer or network
Unauthorized Access
Unauthorized Access
Usernames and Passwords
Username = UserID or identification
Password = private combination of
characters to allow access
Unauthorized Access
Passwords
Unauthorized Access
Biometric Devices
Physical biometric systems measure a unique
physical trait, such as the fingerprint or blood
vessel pattern of the retina, whereas behavioral
biometric systems measure a unique behavioral
attribute, such as the way a person talks or signs
his or her name.
Unauthorized Access
Biometric Devices
Unauthorized Access
Biometric Devices
Theft
Prevent Hardware Theft
Physical location
Physical security
Regular visual inspection
Theft
Prevent Software Theft
License Agreements
Activation Schemes
Regular System Scans
Theft
Prevent Information Theft
Encryption & Decryption
Theft
Encryption & Decryption
Theft
Two Types of Encryption:
In private-key encryption, the sender and receiver
of information share a secret--a key that is used
for both encryption and decryption.
In public-key encryption, two different
mathematically related keys (a key pair) are used
to encrypt and decrypt data. Information
encrypted with one key may only be decrypted by
using the other half of the key pair.
Theft
PGP (Pretty Good Privacy) Encryption Software
http://www.pgp.com
System Failure
Noise = any unwanted signal mixed with
normal voltage input to the computer
Under voltage = electrical supply drops
Over voltage = Power Surge
System Failure
Safeguards
Surge Protector (Minimum Protection)
UPS – Uninterruptible Power Supply (Best
Protection)
APC 750VA UPS = $ 90.00
Backup
The Ultimate Safeguard
Making copies of your important files
Internet Security Risks
Denial of Service Attacks (DoS Attack)
An assault on computer networks to disrupt
service
Internet Security Risks
Internet Transactions
Digital Certificates
SSL (Secure Sockets Layer)
SET (Secure Electronics Transactions)
Digital Signatures
Ethics and Society
Computer Ethics
Page 578
Ethics and Society
Information Accuracy
Everything you see on the internet may not
be accurate. You have to learn to judge or
discern what is correct and what is not
Remember what your parents used to say:
“Just because it is on TV or radio or in a
newspaper doesn’t mean it is true!”
Also “Would you jump off a bridge if your
friends did?”
Ethics and Society
Intellectual Property Rights
Rights of the creator to their own work(s)
Copyright – Automatically given when you
create something, doesn’t have to be
registered to be upheld in court
Ethics and Society
IT Code of Conduct
Page 580
Ethics and Society
Information Privacy
Your right to deny or restrict the use of your
personal information
Page 581
Ethics and Society
Cookies
A small text file that a web server stores on
your computer
Ethics and Society
Spyware
A program placed on your computer without
your knowledge that secretly collects
information about you.
Adaware SE
Spybot
Ethics and Society
Spam
Unsolicited E-mail
4 out of 5 messages are spam today
Ethics and Society
Employee Monitoring
Using a computer to observe, record and
review an employee’s use of a computer.
Ethics and Society
Content Filtering
Restricting access to certain material on the
web
Health Concerns
RSI – Repetitive Strain Injury
CTS – Carpal Tunnel Syndrome
CVS – Computer Vision Syndrome
Blindness recently reported as related to
Short-Sightedness and long-term computer
monitor use
Health Concerns
Computer Addiction
When computers consume someone’s
entire social life
Health Concerns
IAD – Internet Addiction Disorder
When using the internet consumes
someone’s entire social life but feels social
to the addict as they interact with others via
the internet
Health Concerns
Symptoms of both disorders:
Craves Computer Time
Overjoyed when at computer
Unable to stop computer activity
Irritable when not at a computer
Neglects family and friends
Problems at work or school
Chapter 11
Questions?
Chapter 11
Assignment 07
At Issue 11-2 on page 568
Answer the questions as presented and
defend your opinion.
Show references as well.