Chp 11 Section 4-5 Notes
Download
Report
Transcript Chp 11 Section 4-5 Notes
Chapter 11 – Section 4-5
Techniques use to Access the network
War Driving or access point mapping
▪ Individuals attempt to detect wireless network via their
notebook computer or mobile device while driving a
vehicle through areas they suspect have a wireless
network
War Flying
▪ Use airplanes instead of vehicle to detect unsecured
wireless network
How can I ensure my wireless communication is
secure?
Firewalls
Secure your wireless access point (WAP)
WiFi Protected Access (WPA)
Authenticate network users and provide advanced
encryption techniques
802.11i (WPAs)
Conforms to the government security standards and
uses more sophisticated encryption techniques the
WPA
What are some health concerns of computer
use?
Computer addiction-when computer
consume entire social
Repetitive strain injury (RSI)
Injury or disorder of the muscles, nerves,
tendons, ligaments, and joints
Computer vision syndrome (CVS)
eye and vision problems
Tendonitis – inflammation
of a tendon due to
repeated motion
Carpal tunnel syndrome –
inflammation of the nerve that
connects the forearm to the palm
What precautions can prevent tendonitis or
carpal tunnel syndrome?
Spread fingers apart for several seconds while
keeping wrist straight
Gently push back fingers and then thumb
Dangle arms loosely at sides and shake arms and
hands
What is Ergonomics?
An applied science devoted to incorporating
comfort, efficiency, and safety into the
design of items in the workplace.
What are computer ethics?
Moral guidelines that govern use of computers and information systems
Unauthorized use
of computer
&Networks
Software theft
(piracy)
Information
accuracy
Intellectual
property rights
Codes of conduct
Information
privacy
Green
Computing
What is information accuracy?
Accuracy of computer input
Altering photo
National Press Photographer Association oppose
What are intellectual Property (IP) and
Intellectual property rights?
Intellectual Property
▪ Refer to unique & original work such as ideas,
inventions, art, writing, processes, company and
product name and logos.
Intellectual Property Rights
▪ The rights to which creators are entitled for their work
IT Code of Conduct
What is an IT code of
conduct?
Written guideline that
helps determine whether
computer action is ethical
Employers can distribute
to employees
1.
Computer may not be used to harm other
people.
2. Employee may not interfere with other’s
computer work.
3. Employees my not meddle in other’s
computer files.
4. Computers may not be used to steal
5. .Computers may not be used to bear false
witness.
6. Employees may not copy or use software
illegally.
7. Employees may not use others’ computer
resources without authorization
8. Employees may not use others’
intellectual property as their own.
9. Employees shall consider the social
impact of program and systems they
design.
10. Employees always should use computers
in a way that demonstrates and respect for
fellow humans.
What is Green Computing?
Involves reducing the electricity and
environmental waste while using a computer.
ENERGY STAR program
▪ Develop by US Department of Energy and US
Environmental Protection Agency (EPA)
▪ Help reduce the amount of electricity used by computer
and related devices
What is Information Privacy?
Right of individual and companies to deny or
restrict the collection and use of information
about them
Difficult to maintain today because data is stored
online
What is an electronic profile?
Data collected when you fill out forms on the Web
Merchant sell your electronic profile
Often you can specify whether you want personal
information distributed
What is a Cookie?
User
Preferences
Small text file on
your computer that
contains data about
you
How
regularly
you visit
Web site
Interest
and
browsing
habits
Some Web sites
sell or trade
information
stored on your
cookie
Set browser to
accept cookies,
prompt you to
accept cookies or
disable cookies
What is Spam?
Unsolicited e-mail message or newsgroup,
posting sent to many recipients or
newsgroups at once.
Internet Junk mail
How can you control spam?
Service that
blocks email
messages from
designated
source
E-mail filtering
Collects spam
in central
location that
you can view
anytime
Anti-spam program
Attempts
to remove
spam
Sometimes
removes valid
email
messages
What is Phishing and Pharming?
Phishing
Scam in which a perpetrator
sends an official looking
email message that
attempts to obtain your
personal and financial
information
Pharming
Similar as phishing but they
attempts to obtain your
personal and financial
information through
spoofing
What are Spyware and Adware?
Spyware is a program placed on a
computer without the user’s knowledge
that secretly collects information about
the user
Adware is a program that displays an
online advertisement
Some Privacy laws that have been enacted
1970 Fair Credit Reporting Act
Limits the right of other viewing a credit report to only
those with a legitimate business need.
1984 Computer Fraud and Abuse Act
Outlaws unauthorized access of federal government
computers
1998 Children’s Online Privacy Protection Act (COPPA)
Requires Web sites protect personal information of
children under 13 years of age
What is Social Engineering?
Gaining unauthorized access or obtaining
confidential information by taking advantage
of the trusting human nature of some victims
and naivety of other
What is Employee Monitoring?
Involves the use of computers to observe,
record, and review an employee’s use of a
computer
What is content filtering?
Process of restricting access to certain
material
Internet Content Rating Association (ICRA) provides
rating system of Web content
Web filtering software restricts access to specific
sites