• Like
Unauthorized access and use
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

Unauthorized access and use

  • 2,939 views
Published

 

Published in Technology , Health & Medicine
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,939
On SlideShare
0
From Embeds
0
Number of Embeds
1

Actions

Shares
Downloads
80
Comments
0
Likes
1

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. UNAUTHORIZEDACCESS AND USE
  • 2. UNAUTHORIZED ACCESS - use of a computer or network without permission.- by connecting to it and then logging in as a legitimate user. - do not cause damages. - merely access the data, valuable information or programs in the computer.
  • 3. UNAUTHORIZED USE- Use of a computer or its data for unapproved or illegal activities. - Ex: gaining access to a bank computer and performing an unauthorized bank transfer etc.
  • 4. SAFEGUARDS AGAINSTUNAUTHORIZEDACCESS AND USE
  • 5. 1. Have a written acceptable use policy (AUP) that outlines the computer activities for which thecomputer and the network may and may not be used. 2. The use of firewall 3. Access Controls 4. Intrusion detection software
  • 6. USER NAMES AND PASSWORD
  • 7. USERNAME/ user ID - A unique combination of characters such as letters of thealphabets or numbers that identifies one specific user.
  • 8. PASSWORD - A private combination of characters associated with the users name that allow access to certain computer resources. - Some organization use passphrases to authenticates.- A passphrase is a private combination often containing mix capitalization and punctuation.
  • 9. - Some website uses CAPTHCHA to further protect a users password- CAPTHCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart - It displays a series of distorted characters and requires the user to enter characters correctly to use website…
  • 10. POSSESSED OBJECTS
  • 11. - Possessed object is any item that you must carry to gain access to a computer or a computer facility - Examples: badges, cards, smartcards and keys- ATM card is a possessed object - Used in combination with personal identification
  • 12. BIOMETRIC DEVICES
  • 13. - Authenticates a persons identity by translating apersonal characteristic, suchas a fingerprints, into a digital code stored in the computer verifying a physical or behavioral characteristic
  • 14. Fingerprint readersHand geometry systems
  • 15. Face recognition systemVoice verification system
  • 16. Signatureverification system Iris recognition systems
  • 17. Retinal scanners
  • 18. DIGITAL FORENSICS
  • 19. forensics, network forensics, or cyberforensics- involves the examination of computermedia, programs, data and log files on computers, servers, and networks. - Areas that uses it include law enforcement, criminal prosecutors, military intelligence, insurance agencies, and security departments in the private sector.
  • 20. HEALTHCONCERNS OFCOMPUTER USE
  • 21. COMPUTERS AND HEALTH RISKS
  • 22. -A repetitive strain injury (RSI) is an injury or disorder of themuscles, nerves, tendons, ligament s and joints. - Tendonitis is inflammation of a tendon due to repeated motion or stress on that tendon.
  • 23. -Carpal tunnel syndrome (CTS) is inflammation of the nerve thatconnects the forearm to the palm of the wrist.- Computer vision syndrome (CVS)include sore, tired, burning, itching, or dry eyes; blurred or doublevision; distance blurred vision after prolonged staring at a display
  • 24. ERGONOMICS ANDWORKPLACE DESIGN
  • 25. ERGONOMICS - An applied science devoted to incorporating comfort, efficiency,and safety into the design of items in the workplace. - help users to work comfortablyand efficiently and helps to protect their health.
  • 26. COMPUTERADDICTIONS
  • 27. SYMPTOMS OF COMPUTER ADDICTION - craves computer time. - overjoyed when at computer. - unable to stop computer activity.- irritable when not at the computer. - neglects family and friends. - problems at work or school.