Computer Security
Download
Report
Transcript Computer Security
INSM 180- Belasco
Bryant and Stratton
Fall 2011
Chapter 10 in Computing Essentials 2011
Privacy Issues
◦ Accuracy
◦ Property
◦ Access
Large organizations are constantly compiling
data
◦ Personal Information, websites visited, user
information, etc.
Information Resellers (Information Brokers)
collect and sell personal data
Personal Information is a marketable
commodity
Companies can spread information without
your personal consent.
Identity theft is the illegal assumption of
someone's identity for purposes of economic
gain.
Information Inaccuracies can lead to many
issues (Credit reports, background checks, etc.)
Freedom of Information Act entitles you to look
at your records from government agencies.
Most companies conduct business
and daily work operations within a
private network.
They are entitled to go through
ANY and ALL information within
that network.
Some companies use snoopware
to monitor employee computer
activities.
Companies have the right to
1.
Never give out personal information online.
ESPECIALLY in response to an e-mail.
Phishing is used to describe dishonest e-mails that are
sent to try to get you to disclose your account
information.
2. Only do online business with large corporations
that you know are legitimate with solid
reputations.
3. Make sure to remove all personal information
from a computer before selling or disposing of it.
4. Check your credit reports to verify information
and account activities.
Illusion of Anonymity- The idea most people
have that little can be done to their personal
privacy if they are selective about sharing
information.
IP Addresses
History File-Locations of sites visited by your
computer
Cookies –Small pieces of information that are
deposited on your hard disk from Websites
you have visited.
How To Delete Internet Browsing and Cookie
Information
-Internet Explorer
-Chrome
-Firefox
How To Run a Disk CleanUp
Traditional Cookies provide information
on a single site.
Ad network or adware cookies record
your activities across different sites.
Spyware- wide range of programs that
are designed to secretly record and
report an individuals activities on the
Internet
Web bugs- small images or HTML code
hidden within an e-mail message
Keystroke loggers record every activity
and keystroke made on your computer
system
Employees
Outside Users
Hackers- people who create or
improve programs to share with
others
Crackers- create and share programs
designed to gain unauthorized access
to computers or disrupt networks
Organized Crime members
Terrorists
Viruses- programs that migrate through
networks and operating systems that can
alter or delete files.
◦ Creation or spreading of viruses is punishable
under the Computer Fraud and Abuse Act
Worms- special type of virus that fills a
computer with self-replicating
information so that the computer is
drastically slowed or stopped.
Trojan Horses- Programs that come into
a computer disguised as something else.
Computers that are infected
by a virus, worm, or Trojan
horse that allow them to be
remotely controlled for
malicious purposes.
Botnet/ Robot Network is a
collection of zombie
computers that use their
combined powers to crack
passwords and send spam emails.
Capcha
Denial of Service Attack (DoS) attempts to slow
down or stop a computer system or a network
by flooding a computer/network with requests
for information and data. Sites/networks
become overwhelmed with requests, cannot
respond to legitimate users, and shut down.
Internet Scams- Fraudulent or deceptive act or
operation to trick individuals into providing
personal information or spending their time or
money
◦ Phishing
Theft of hardware, software, data, or computer
time
Data manipulation
Identity
Theft
Chain Letters
Auction Fraud
Vacation Prize
Advance Fee Loans
Information
you provide to
others online
The identity you create onlinee-mail address, user names,
etc.
Gramm-Leach-Bliley Act protects personal
financial information
Health Insurance Portability and Accountability
Act (HIPAA) protects medical records
Family Educational Rights and Privacy Act
(FERPA) restricts disclosure of educational
records.
Restricting Access
Strong passwords that are changed often
Firewalls
Data Encryption
Virtual Private Networks (VPN)
Anticipating Disaster
Guidelines for morally acceptable use of
computers in our society
Copyright gives content creators the
right to control their work and to get
financial gain from their work.
◦ You break copyright laws when you
unlawfully copy music or movies
Software piracy- unauthorized
copying and distributing of software
◦ Digital Millennium Copyright Act
established the rights of a software owner
to make copies for personal use
Plagiarism- Using other’s work or
ideas as your own