Your SlideShare is downloading. ×
0
Computer Concepts – Illustrated 8 th  edition Unit F: Data Security
Objectives <ul><li>Know what can go wrong </li></ul><ul><li>Protect computer systems </li></ul><ul><li>Understand authenti...
Objectives (continued) <ul><li>Examine network and Internet access security </li></ul><ul><li>Explore Web and email securi...
Knowing What Can Go Wrong <ul><li>Risk management  in computer systems </li></ul><ul><ul><li>Identify potential threats to...
Knowing What Can Go Wrong (continued) <ul><li>Hardware failures </li></ul><ul><li>Software failures </li></ul><ul><li>Huma...
Computer Concepts – Illustrated 8th Edition Figure F-3: Troubleshooting guidelines
Protecting Computer Systems <ul><li>To reduce likelihood of computer theft: </li></ul><ul><ul><li>Use common sense </li></...
Computer Concepts – Illustrated 8th Edition Figure F-4: A locking device Figure F-5: A security plate
Protecting Computer Systems (continued) <ul><li>Protection from power problems </li></ul><ul><ul><li>UPS (uninterruptible ...
Understanding Authentication <ul><li>Authentication protocols </li></ul><ul><ul><li>Used to confirm a person’s identity wh...
Computer Concepts – Illustrated 8th Edition Figure F-9: Retinal scans are a form of biometric authentication
Understanding Authentication (continued) <ul><li>Two-factor authentication : verifies identity using two independent eleme...
Exploring Security Threats and Malware <ul><li>Malicious code  or  malware </li></ul><ul><ul><li>Created by  hackers ,  cr...
Computer Concepts – Illustrated 8th Edition Figure F-13: A simulated worm attack
Exploring Security Threats and Malware (continued) <ul><li>Trojan horse  (or  Trojan ) </li></ul><ul><ul><li>A program tha...
Exploring Security Threats and Malware (continued) <ul><li>Malware can: </li></ul><ul><ul><li>Create network traffic jam <...
Avoiding Security Threats and Malware <ul><li>Some guidelines to avoid threats: </li></ul><ul><ul><li>Install and activate...
Avoiding Security Threats and Malware (continued) <ul><li>Security suite </li></ul><ul><ul><li>Typically includes antiviru...
Avoiding Security Threats and Malware (continued) <ul><li>Virus definitions </li></ul><ul><ul><li>Contains information tha...
Examining Network and Internet Access Security <ul><li>Wireless networks </li></ul><ul><ul><li>Susceptible to unauthorized...
Examining Network and Internet Access Security (continued) <ul><li>Wireless network key </li></ul><ul><ul><li>The basis fo...
Computer Concepts – Illustrated 8th Edition Figure F-20: Windows Firewall settings
Exploring Web and Email Security <ul><li>Cookie  </li></ul><ul><ul><li>Contains information about the user </li></ul></ul>...
Computer Concepts – Illustrated 8th Edition Figure F-23: Anti-Spyware software
Exploring Web and Email Security (continued) <ul><li>Phishing </li></ul><ul><ul><li>Email-based or IM scam that persuades ...
Understanding Backups <ul><li>Backup :   a copy made in case the original files become damaged </li></ul><ul><ul><li>Full ...
Understanding Backups (continued) <ul><li>Backup software  is designed to back up and restore files </li></ul><ul><li>Boot...
Talking Points: Prosecuting Computer Crime <ul><li>Traditional laws do not cover the range of possibilities for computer c...
Talking Points: Prosecuting Computer Crime (continued) <ul><li>Computer crimes include: </li></ul><ul><ul><li>Data diddlin...
Summary <ul><li>This chapter introduced: </li></ul><ul><ul><li>Potential threats to computer equipment and data </li></ul>...
Upcoming SlideShare
Loading in...5
×

Unit F Data Security

3,026

Published on

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,026
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
88
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Transcript of "Unit F Data Security"

  1. 1. Computer Concepts – Illustrated 8 th  edition Unit F: Data Security
  2. 2. Objectives <ul><li>Know what can go wrong </li></ul><ul><li>Protect computer systems </li></ul><ul><li>Understand authentication </li></ul><ul><li>Explore security threats and malware </li></ul><ul><li>Avoid security threats and malware </li></ul>Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
  3. 3. Objectives (continued) <ul><li>Examine network and Internet access security </li></ul><ul><li>Explore Web and email security </li></ul><ul><li>Understand backups </li></ul>Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
  4. 4. Knowing What Can Go Wrong <ul><li>Risk management in computer systems </li></ul><ul><ul><li>Identify potential threats to equipment and data </li></ul></ul><ul><ul><li>Implement plans to avoid threats </li></ul></ul><ul><ul><li>Develop steps to recover from unavoidable disasters </li></ul></ul><ul><li>Possible problems with electricity </li></ul><ul><ul><li>Power failure </li></ul></ul><ul><ul><li>Power spikes (or voltage spikes ) </li></ul></ul><ul><ul><li>Power surges </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  5. 5. Knowing What Can Go Wrong (continued) <ul><li>Hardware failures </li></ul><ul><li>Software failures </li></ul><ul><li>Human error </li></ul><ul><li>Computer viruses </li></ul><ul><li>Safe Mode : a limited version of Windows that is used to troubleshoot some problems </li></ul><ul><li>Cyberterrorism : terrorist acts committed via the Internet </li></ul>Computer Concepts – Illustrated 8th Edition
  6. 6. Computer Concepts – Illustrated 8th Edition Figure F-3: Troubleshooting guidelines
  7. 7. Protecting Computer Systems <ul><li>To reduce likelihood of computer theft: </li></ul><ul><ul><li>Use common sense </li></ul></ul><ul><ul><li>Use locking devices </li></ul></ul><ul><ul><li>Use security plates </li></ul></ul><ul><li>Tracking and recovery software </li></ul><ul><ul><li>Used to track a computer if stolen </li></ul></ul><ul><li>Ways to protect data if computer is stolen </li></ul><ul><ul><li>Software that deletes data if computer is stolen </li></ul></ul><ul><ul><li>Use of a password to access computer </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  8. 8. Computer Concepts – Illustrated 8th Edition Figure F-4: A locking device Figure F-5: A security plate
  9. 9. Protecting Computer Systems (continued) <ul><li>Protection from power problems </li></ul><ul><ul><li>UPS (uninterruptible power supply) </li></ul></ul><ul><ul><ul><li>Offers the best protection against power problems </li></ul></ul></ul><ul><ul><ul><li>Provides a continuous supply of power </li></ul></ul></ul><ul><ul><li>Surge strip </li></ul></ul><ul><ul><ul><li>Protects against power surges and voltage spikes </li></ul></ul></ul><ul><li>Most computers have a fan </li></ul><ul><ul><li>Allow for ventilation around the computer </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  10. 10. Understanding Authentication <ul><li>Authentication protocols </li></ul><ul><ul><li>Used to confirm a person’s identity when he or she tries to use a computer system </li></ul></ul><ul><li>Three common ways to authenticate a user: </li></ul><ul><ul><li>Using something a person carries </li></ul></ul><ul><ul><li>Using something a person knows </li></ul></ul><ul><ul><li>Using a unique physical characteristic </li></ul></ul><ul><li>Biometrics : identification on some physical trait, such as a fingerprint, handprint, etc. </li></ul>Computer Concepts – Illustrated 8th Edition
  11. 11. Computer Concepts – Illustrated 8th Edition Figure F-9: Retinal scans are a form of biometric authentication
  12. 12. Understanding Authentication (continued) <ul><li>Two-factor authentication : verifies identity using two independent elements of confirmation </li></ul><ul><li>User ID : a user’s unique identifier on a computer or Web page; typically public </li></ul><ul><li>Password : verifies a user ID and guarantees that the user is the person he or she claims to be </li></ul><ul><li>User rights : rules that limit the directories and files that each user can access </li></ul>Computer Concepts – Illustrated 8th Edition
  13. 13. Exploring Security Threats and Malware <ul><li>Malicious code or malware </li></ul><ul><ul><li>Created by hackers , crackers , black hats , or cybercriminals </li></ul></ul><ul><li>Computer virus (or virus ) </li></ul><ul><ul><li>Set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files on the same computer </li></ul></ul><ul><li>Computer worm (or worm ) </li></ul><ul><ul><li>Self-copying program that carries out some unauthorized activity on a victim’s computer </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  14. 14. Computer Concepts – Illustrated 8th Edition Figure F-13: A simulated worm attack
  15. 15. Exploring Security Threats and Malware (continued) <ul><li>Trojan horse (or Trojan ) </li></ul><ul><ul><li>A program that seems to perform one function while actually doing something else </li></ul></ul><ul><li>Intelligent agent (or bot ) </li></ul><ul><ul><li>Software that can automate a task or autonomously execute a task </li></ul></ul><ul><ul><li>Bad bots are used by hackers for unauthorized or destructive tasks </li></ul></ul><ul><li>Spyware </li></ul><ul><ul><li>A program that secretly gathers personal information, usually for commercial purposes </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  16. 16. Exploring Security Threats and Malware (continued) <ul><li>Malware can: </li></ul><ul><ul><li>Create network traffic jam </li></ul></ul><ul><ul><li>Initiate a denial-of-Service (DoS) attack </li></ul></ul><ul><ul><li>Reconfigure a browser </li></ul></ul><ul><ul><li>Delete and modify files </li></ul></ul><ul><ul><li>Access confidential information </li></ul></ul><ul><ul><li>Disable antivirus and firewall software </li></ul></ul><ul><ul><li>Control your computer </li></ul></ul><ul><ul><li>Degrade performance </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  17. 17. Avoiding Security Threats and Malware <ul><li>Some guidelines to avoid threats: </li></ul><ul><ul><li>Install and activate security software </li></ul></ul><ul><ul><li>Keep software and operating system updated </li></ul></ul><ul><ul><li>Do not open suspicious email attachments </li></ul></ul><ul><ul><li>Obtain software only from reliable sources </li></ul></ul><ul><ul><li>Use security software to scan for malware </li></ul></ul><ul><ul><li>Do not click pop-up ads </li></ul></ul><ul><ul><li>Avoid unsavory Web sites </li></ul></ul><ul><ul><li>Disable the option Hide extensions for known file types in Windows </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  18. 18. Avoiding Security Threats and Malware (continued) <ul><li>Security suite </li></ul><ul><ul><li>Typically includes antivirus, firewall, and anti-spyware modules </li></ul></ul><ul><li>Antivirus software </li></ul><ul><ul><li>Utility software that looks for and removes viruses, Trojan horses, worms, and bots </li></ul></ul><ul><ul><li>Virus signature </li></ul></ul><ul><ul><ul><li>A section of code that can be used to identify a known malicious program </li></ul></ul></ul>Computer Concepts – Illustrated 8th Edition
  19. 19. Avoiding Security Threats and Malware (continued) <ul><li>Virus definitions </li></ul><ul><ul><li>Contains information that antivirus software uses to identify and remove malware </li></ul></ul><ul><ul><li>Needs to be updated regularly </li></ul></ul><ul><li>Make regular backups of your data </li></ul>Computer Concepts – Illustrated 8th Edition
  20. 20. Examining Network and Internet Access Security <ul><li>Wireless networks </li></ul><ul><ul><li>Susceptible to unauthorized access and use, especially if unsecured </li></ul></ul><ul><li>LANjacking or war driving </li></ul><ul><ul><li>Hackers can intercept signals with a Wi-Fi enabled notebook computer </li></ul></ul><ul><li>Wireless encryption </li></ul><ul><ul><li>WEP (Wired Equivalent Privacy) </li></ul></ul><ul><ul><li>WPA (Wi-Fi Protected Access) </li></ul></ul><ul><ul><li>WPA2 </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  21. 21. Examining Network and Internet Access Security (continued) <ul><li>Wireless network key </li></ul><ul><ul><li>The basis for scrambling and unscrambling data transmitted between wireless devices </li></ul></ul><ul><li>Encryption </li></ul><ul><ul><li>Transforms a message so that its contents are hidden from unauthorized readers </li></ul></ul><ul><li>Firewall </li></ul><ul><ul><li>Software or hardware that filters out suspicious packets attempting to enter or leave a computer </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  22. 22. Computer Concepts – Illustrated 8th Edition Figure F-20: Windows Firewall settings
  23. 23. Exploring Web and Email Security <ul><li>Cookie </li></ul><ul><ul><li>Contains information about the user </li></ul></ul><ul><ul><li>Stored on the user’s hard drive </li></ul></ul><ul><ul><li>Ad-serving cookie </li></ul></ul><ul><li>InPrivate feature of Internet Explorer </li></ul><ul><ul><li>No user data is stored after a browsing session </li></ul></ul><ul><li>Antispyware </li></ul><ul><ul><li>Security software designed to identify and neutralize spyware </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  24. 24. Computer Concepts – Illustrated 8th Edition Figure F-23: Anti-Spyware software
  25. 25. Exploring Web and Email Security (continued) <ul><li>Phishing </li></ul><ul><ul><li>Email-based or IM scam that persuades users to reveal confidential information </li></ul></ul><ul><li>Pharming </li></ul><ul><ul><li>Redirects users to fake sites by poisoning a domain name server with a false IP address </li></ul></ul><ul><li>Spam </li></ul><ul><ul><li>Unwanted electronic junk mail </li></ul></ul><ul><ul><li>Techniques to combat spam: </li></ul></ul><ul><ul><ul><li>Email authentication techniques </li></ul></ul></ul><ul><ul><ul><li>Spam filter </li></ul></ul></ul>Computer Concepts – Illustrated 8th Edition
  26. 26. Understanding Backups <ul><li>Backup : a copy made in case the original files become damaged </li></ul><ul><ul><li>Full backup (or full-system backup ) </li></ul></ul><ul><ul><li>Differential backup </li></ul></ul><ul><ul><li>Incremental backup </li></ul></ul><ul><li>Backup storage media include: </li></ul><ul><ul><li>Writable CDs, DVDs, BDs, solid-state storage cards, tapes, and USB flash drives </li></ul></ul><ul><li>Can back up data to a network server </li></ul><ul><li>Some Web sites offer Web-based storage </li></ul>Computer Concepts – Illustrated 8th Edition
  27. 27. Understanding Backups (continued) <ul><li>Backup software is designed to back up and restore files </li></ul><ul><li>Boot disk </li></ul><ul><ul><li>A removable storage medium containing the operating system files needed to boot a computer </li></ul></ul><ul><li>Recovery CD (or recovery disk ) </li></ul><ul><ul><li>A bootable CD, DVD, or other media that contains a complete copy of a computer’s hard drive, as it existed when shipped from the manufacturer </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  28. 28. Talking Points: Prosecuting Computer Crime <ul><li>Traditional laws do not cover the range of possibilities for computer crimes </li></ul><ul><li>Computer crime laws </li></ul><ul><ul><li>Many countries have laws that specifically define computer data and software as personal property </li></ul></ul>Computer Concepts – Illustrated 8th Edition
  29. 29. Talking Points: Prosecuting Computer Crime (continued) <ul><li>Computer crimes include: </li></ul><ul><ul><li>Data diddling </li></ul></ul><ul><ul><li>Identity theft </li></ul></ul><ul><ul><li>Salami shaving </li></ul></ul><ul><ul><li>Denial of service </li></ul></ul><ul><ul><li>Information theft </li></ul></ul><ul><ul><li>Virus distribution </li></ul></ul><ul><ul><li>Vandalism </li></ul></ul><ul><li>Are hackers dangerous cyberterrorists or harmless pranksters? </li></ul>Computer Concepts – Illustrated 8th Edition
  30. 30. Summary <ul><li>This chapter introduced: </li></ul><ul><ul><li>Potential threats to computer equipment and data </li></ul></ul><ul><ul><li>Ways to protect computer system hardware </li></ul></ul><ul><ul><li>Authentication </li></ul></ul><ul><ul><li>How to use software to protect or recover computer data </li></ul></ul><ul><ul><li>How to back up data </li></ul></ul><ul><ul><li>Network and Internet access security </li></ul></ul><ul><ul><li>Different positions on prosecuting computer crime </li></ul></ul>Computer Concepts – Illustrated 8th Edition Computer Concepts – Illustrated 8th Edition
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×