SlideShare a Scribd company logo
1 of 33
Chapter 12 Computer Security and Risks
Topics “ Computers are power, and direct contact with power can bring out the best or worst in a person.” Former computer criminal turned corporate programmer ,[object Object],[object Object],[object Object],[object Object]
On-line Outlaws: Computer Crime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Computer Crime Dossier ,[object Object],[object Object]
The Computer Crime Dossier ,[object Object],[object Object],[object Object]
Theft by Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Software Piracy and  Intellectual Property Laws ,[object Object],[object Object]
Software Piracy and  Intellectual Property Laws ,[object Object],[object Object],[object Object],[object Object],[object Object]
Software Sabotage ,[object Object],[object Object],[object Object],Sabotage of software can include: These are referred to as a virus.
Software Sabotage How software sabotage works:
Software Sabotage ,[object Object],[object Object],[object Object]
Hacking and  Electronic Trespassing ,[object Object],[object Object],[object Object],[object Object]
Hacking and  Electronic Trespassing ,[object Object],[object Object],Cliff  Stoll discovered an international computer espionage ring because of a .75 cent accounting error.
Computer Security:  Reducing Risks ,[object Object],[object Object],[object Object]
Computer Security:  Reducing Risks ,[object Object],[object Object],[object Object],[object Object],[object Object],A variety of security techniques are used to protect computer systems
Physical Access Restrictions ,[object Object],[object Object],[object Object],[object Object]
Physical Access Restrictions ,[object Object]
Passwords ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Firewalls, Encryption, and Audits ,[object Object],[object Object],[object Object],[object Object]
Firewalls ,[object Object]
Encryption ,[object Object],[object Object],[object Object]
Encryption
Audit-Control Software ,[object Object],[object Object]
Backups and Other Precautions ,[object Object],[object Object]
Human Security Controls: Laws, Management, and Ethics ,[object Object],[object Object]
Security, Privacy, Freedom, & Ethics:  The Delicate Balance ,[object Object],[object Object],[object Object],“ In this age of advanced technology, thick walls and locked doors cannot guard our privacy or safeguard our personal freedom.” Lyndon B. Johnson
Rules of Thumb: Safe Computing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security and Reliability ,[object Object],[object Object],[object Object],[object Object]
Bugs and Breakdowns ,[object Object],[object Object],[object Object],[object Object],[object Object]
Bugs and Breakdowns ,[object Object],[object Object]
Computers at War ,[object Object],[object Object]
Warfare in the Digital Domain ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 

More Related Content

What's hot

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professionalciso_insights
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of SecurityDM_GS
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info SystemsHemant Nagwekar
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challengesLouie Medinaceli
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlSyama Raveendran
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacymalik1972
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer PrivacySaqib Raza
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacyeiramespi07
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 

What's hot (20)

Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
IT Security for the Physical Security Professional
IT Security for the Physical Security ProfessionalIT Security for the Physical Security Professional
IT Security for the Physical Security Professional
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Computer security and
Computer security andComputer security and
Computer security and
 
Evolution of Security
Evolution of SecurityEvolution of Security
Evolution of Security
 
8 - Securing Info Systems
8 - Securing Info Systems8 - Securing Info Systems
8 - Securing Info Systems
 
Security & ethical challenges
Security & ethical challengesSecurity & ethical challenges
Security & ethical challenges
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
CH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and PrivacyCH. 5 Computer Security and Safety, Ethics and Privacy
CH. 5 Computer Security and Safety, Ethics and Privacy
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
E secuity
E secuityE secuity
E secuity
 
Computer security and privacy
Computer security and privacyComputer security and privacy
Computer security and privacy
 
Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 

Viewers also liked

A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiA Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiAnup Narayanan
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingCSCJournals
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -enRolf Häsänen
 
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...BayCHI
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyDushyant Kalchuri
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error PreventionToru Nakata
 
eXtension: Managing Online Content Providers
 eXtension: Managing Online  Content Providers eXtension: Managing Online  Content Providers
eXtension: Managing Online Content Providersgreenehorse
 
VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08internationalvr
 
VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06internationalvr
 
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009internationalvr
 
Invitation Autumn
Invitation AutumnInvitation Autumn
Invitation Autumnguestbf0dbb
 
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009internationalvr
 
Presentación hangover taxi
Presentación hangover taxiPresentación hangover taxi
Presentación hangover taximariogomezprieto
 
VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008internationalvr
 
eCMO 2010 The e behind branding
eCMO 2010 The e behind brandingeCMO 2010 The e behind branding
eCMO 2010 The e behind brandingHKAIM
 

Viewers also liked (20)

A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiA Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
 
Ch04
Ch04Ch04
Ch04
 
A proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud ComputingA proposed Solution: Data Availability and Error Correction in Cloud Computing
A proposed Solution: Data Availability and Error Correction in Cloud Computing
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
Scott MacKenzie at BayCHI: Evaluating Eye Tracking Systems for Computer Data ...
 
Human Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & SafetyHuman Error & Risk Factor Affecting Reliability & Safety
Human Error & Risk Factor Affecting Reliability & Safety
 
Information security management
Information security managementInformation security management
Information security management
 
Human Error Prevention
Human Error PreventionHuman Error Prevention
Human Error Prevention
 
Proyectosolidario.pptx
Proyectosolidario.pptxProyectosolidario.pptx
Proyectosolidario.pptx
 
eXtension: Managing Online Content Providers
 eXtension: Managing Online  Content Providers eXtension: Managing Online  Content Providers
eXtension: Managing Online Content Providers
 
Digital Technology for Museum
Digital Technology for MuseumDigital Technology for Museum
Digital Technology for Museum
 
VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08VietRees_Newsletter_38_Week1_Month07_Year08
VietRees_Newsletter_38_Week1_Month07_Year08
 
VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06VietRees_Newsletter_34_Tuan1_Thang06
VietRees_Newsletter_34_Tuan1_Thang06
 
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
Vietnam Real Estate Newsletter - No. 71, Week 4 Feb, 2009
 
Invitation Autumn
Invitation AutumnInvitation Autumn
Invitation Autumn
 
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
Bản Tin BĐS Việt Nam Số 70 Tuần 3 Tháng 2 Năm 2009
 
MyOpenArchive
MyOpenArchiveMyOpenArchive
MyOpenArchive
 
Presentación hangover taxi
Presentación hangover taxiPresentación hangover taxi
Presentación hangover taxi
 
VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008VietnamRealEstate_E-Directory_VN_Q3_2008
VietnamRealEstate_E-Directory_VN_Q3_2008
 
eCMO 2010 The e behind branding
eCMO 2010 The e behind brandingeCMO 2010 The e behind branding
eCMO 2010 The e behind branding
 

Similar to Beekman5 std ppt_12

INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptxbabepa2317
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptxKarthikShivanand
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Preventionijsrd.com
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfsrtwgwfwwgw
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and ToolsKaran Bhandari
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securitySharath Raj
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Internet security
Internet securityInternet security
Internet securityat1211
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 

Similar to Beekman5 std ppt_12 (20)

Data security
Data securityData security
Data security
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Cybercrime and security.pptx
Cybercrime and security.pptxCybercrime and security.pptx
Cybercrime and security.pptx
 
Presentation1
Presentation1Presentation1
Presentation1
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
computer security
computer securitycomputer security
computer security
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Implications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdfImplications of Misuse and Cyber Security.pdf
Implications of Misuse and Cyber Security.pdf
 
Basics of System Security and Tools
Basics of System Security and ToolsBasics of System Security and Tools
Basics of System Security and Tools
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyber security
Cyber securityCyber security
Cyber security
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Internet security
Internet securityInternet security
Internet security
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Insecurity vssut
Insecurity vssutInsecurity vssut
Insecurity vssut
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 

More from Department of Education - Philippines

More from Department of Education - Philippines (20)

Ppt quiz
Ppt quizPpt quiz
Ppt quiz
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Beekman5 std ppt_16
Beekman5 std ppt_16Beekman5 std ppt_16
Beekman5 std ppt_16
 
Beekman5 std ppt_15
Beekman5 std ppt_15Beekman5 std ppt_15
Beekman5 std ppt_15
 
Beekman5 std ppt_14
Beekman5 std ppt_14Beekman5 std ppt_14
Beekman5 std ppt_14
 
Beekman5 std ppt_13
Beekman5 std ppt_13Beekman5 std ppt_13
Beekman5 std ppt_13
 
Beekman5 std ppt_11
Beekman5 std ppt_11Beekman5 std ppt_11
Beekman5 std ppt_11
 
Beekman5 std ppt_10
Beekman5 std ppt_10Beekman5 std ppt_10
Beekman5 std ppt_10
 
Beekman5 std ppt_09
Beekman5 std ppt_09Beekman5 std ppt_09
Beekman5 std ppt_09
 
Beekman5 std ppt_08
Beekman5 std ppt_08Beekman5 std ppt_08
Beekman5 std ppt_08
 
Beekman5 std ppt_07
Beekman5 std ppt_07Beekman5 std ppt_07
Beekman5 std ppt_07
 
Beekman5 std ppt_06
Beekman5 std ppt_06Beekman5 std ppt_06
Beekman5 std ppt_06
 
Beekman5 std ppt_05
Beekman5 std ppt_05Beekman5 std ppt_05
Beekman5 std ppt_05
 
Beekman5 std ppt_04
Beekman5 std ppt_04Beekman5 std ppt_04
Beekman5 std ppt_04
 
Beekman5 std ppt_03
Beekman5 std ppt_03Beekman5 std ppt_03
Beekman5 std ppt_03
 
Beekman5 std ppt_02
Beekman5 std ppt_02Beekman5 std ppt_02
Beekman5 std ppt_02
 
Beekman5 std ppt_01
Beekman5 std ppt_01Beekman5 std ppt_01
Beekman5 std ppt_01
 
Dep ed past-form
Dep ed past-formDep ed past-form
Dep ed past-form
 
Dep ed form-18e-giv-gvi-by-jonathanparanada
Dep ed form-18e-giv-gvi-by-jonathanparanadaDep ed form-18e-giv-gvi-by-jonathanparanada
Dep ed form-18e-giv-gvi-by-jonathanparanada
 
Dep ed form-18e-gi-giii-by-jonathanparanada
Dep ed form-18e-gi-giii-by-jonathanparanadaDep ed form-18e-gi-giii-by-jonathanparanada
Dep ed form-18e-gi-giii-by-jonathanparanada
 

Beekman5 std ppt_12