Your SlideShare is downloading. ×
ADM 316 Workshop 5 Slides
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

ADM 316 Workshop 5 Slides

462
views

Published on

Published in: Technology, Economy & Finance

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
462
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. ADM 316 Computers and Information Processing Workshop 5
  • 2. Devotion / Prayer
  • 3. Chapter 10 Computer Security and Risks
  • 4. A computer is a tool.
  • 5. Computer Crime
    • Computer crime is any crime accomplished through knowledge or use of computer technology.
    • Most computer crimes are committed by company insiders and are typically covered up or not reported to authorities to avoid embarrassment.
  • 6. Computer Crime
  • 7. Computers are used to steal:
    • Money
    • Goods
    • Information
    • Computer resources
  • 8. Online Fraud
    • The use of deception to get individuals to reveal sensitive information (social engineering)
      • Online auctions
      • Sweepstakes / bank scams
      • Phishing / spoofing
  • 9. Protecting Yourself from Identity Theft
    • Make all your online purchases using a separate credit card with a low credit limit for your online transactions.
    • Make sure a secure, encrypted Web site is managing your transaction.
    • Don’t disclose personal information over the phone.
    • Shred sensitive information.
  • 10. Malware
    • Virus: spreads by making copies of itself from program to program or disk to disk, requires user intervention to spread
    • Trojan horse: performs a useful task while also being secretly destructive (Michaelangelo)
    • Worm: program that travels independently over computer networks, seeking uninfected sites (ILOVEYOU, Anna, Blaster, Sobig.F, MyDoom)
  • 11. Effects of Malware
    • Proliferation through address lists
    • Modification or removal of startup files
    • Modification or removal of data or application files
    • Generation of denial-of-service attacks
  • 12. Spyware
    • Collects information from computer users (such as keystrokes, screenshots, history) without their knowledge or consent
    • Other names: adware, crapware, spybots
    • Sometimes from legitimate sources (Microsoft reporting, software updates, manufacturer sales pitches)
  • 13. Effects of Spyware
    • Unwanted advertising
    • Unwanted toolbars
    • Unwanted pop-ups
    • Unwanted browser changes (home page, favorites)
    • Unwanted interruptions
    • Unwanted redirections
    • Drains CPU usage / performance
  • 14. Effects of Malware
  • 15. Reducing Risks
    • Restrict physical access (keys, biometrics, special facilities)
    • Restrict logical access (passwords, CAPTCHA, user accounts)
    • Fortify the architecture (firewalls, encryption, UPS)
    • Maintain “clean” facilities (anti-virus software, auditing)