ADM 316 Computers and Information Processing Workshop 5
Devotion / Prayer
Chapter 10 Computer Security and Risks
A computer is a tool.
Computer Crime <ul><li>Computer crime is any crime accomplished through knowledge or use of computer technology. </li></ul...
Computer Crime
Computers are used to steal: <ul><li>Money </li></ul><ul><li>Goods </li></ul><ul><li>Information </li></ul><ul><li>Compute...
Online Fraud <ul><li>The use of deception to get individuals to reveal sensitive information (social engineering) </li></u...
Protecting Yourself from Identity Theft <ul><li>Make all your online purchases using a separate credit card with a low cre...
Malware <ul><li>Virus: spreads by making copies of itself from program to program or disk to disk, requires user intervent...
Effects of Malware <ul><li>Proliferation through address lists </li></ul><ul><li>Modification or removal of startup files ...
Spyware <ul><li>Collects information from computer users (such as keystrokes, screenshots, history) without their knowledg...
Effects of Spyware <ul><li>Unwanted advertising </li></ul><ul><li>Unwanted toolbars </li></ul><ul><li>Unwanted pop-ups </l...
Effects of Malware
Reducing Risks <ul><li>Restrict physical access (keys, biometrics, special facilities) </li></ul><ul><li>Restrict logical ...
Upcoming SlideShare
Loading in …5
×

ADM 316 Workshop 5 Slides

615 views

Published on

Published in: Technology, Economy & Finance
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
615
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

ADM 316 Workshop 5 Slides

  1. 1. ADM 316 Computers and Information Processing Workshop 5
  2. 2. Devotion / Prayer
  3. 3. Chapter 10 Computer Security and Risks
  4. 4. A computer is a tool.
  5. 5. Computer Crime <ul><li>Computer crime is any crime accomplished through knowledge or use of computer technology. </li></ul><ul><li>Most computer crimes are committed by company insiders and are typically covered up or not reported to authorities to avoid embarrassment. </li></ul>
  6. 6. Computer Crime
  7. 7. Computers are used to steal: <ul><li>Money </li></ul><ul><li>Goods </li></ul><ul><li>Information </li></ul><ul><li>Computer resources </li></ul>
  8. 8. Online Fraud <ul><li>The use of deception to get individuals to reveal sensitive information (social engineering) </li></ul><ul><ul><li>Online auctions </li></ul></ul><ul><ul><li>Sweepstakes / bank scams </li></ul></ul><ul><ul><li>Phishing / spoofing </li></ul></ul>
  9. 9. Protecting Yourself from Identity Theft <ul><li>Make all your online purchases using a separate credit card with a low credit limit for your online transactions. </li></ul><ul><li>Make sure a secure, encrypted Web site is managing your transaction. </li></ul><ul><li>Don’t disclose personal information over the phone. </li></ul><ul><li>Shred sensitive information. </li></ul>
  10. 10. Malware <ul><li>Virus: spreads by making copies of itself from program to program or disk to disk, requires user intervention to spread </li></ul><ul><li>Trojan horse: performs a useful task while also being secretly destructive (Michaelangelo) </li></ul><ul><li>Worm: program that travels independently over computer networks, seeking uninfected sites (ILOVEYOU, Anna, Blaster, Sobig.F, MyDoom) </li></ul>
  11. 11. Effects of Malware <ul><li>Proliferation through address lists </li></ul><ul><li>Modification or removal of startup files </li></ul><ul><li>Modification or removal of data or application files </li></ul><ul><li>Generation of denial-of-service attacks </li></ul>
  12. 12. Spyware <ul><li>Collects information from computer users (such as keystrokes, screenshots, history) without their knowledge or consent </li></ul><ul><li>Other names: adware, crapware, spybots </li></ul><ul><li>Sometimes from legitimate sources (Microsoft reporting, software updates, manufacturer sales pitches) </li></ul>
  13. 13. Effects of Spyware <ul><li>Unwanted advertising </li></ul><ul><li>Unwanted toolbars </li></ul><ul><li>Unwanted pop-ups </li></ul><ul><li>Unwanted browser changes (home page, favorites) </li></ul><ul><li>Unwanted interruptions </li></ul><ul><li>Unwanted redirections </li></ul><ul><li>Drains CPU usage / performance </li></ul>
  14. 14. Effects of Malware
  15. 15. Reducing Risks <ul><li>Restrict physical access (keys, biometrics, special facilities) </li></ul><ul><li>Restrict logical access (passwords, CAPTCHA, user accounts) </li></ul><ul><li>Fortify the architecture (firewalls, encryption, UPS) </li></ul><ul><li>Maintain “clean” facilities (anti-virus software, auditing) </li></ul>

×