Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Computer security b

336 views

Published on

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Computer security b

  1. 1. Computer Security Part 1 of 2 Small book by Shelly Cashman that came with text.
  2. 2. Top 10 Hackers Who Got Caught
  3. 3. Gerald Martin hacked into the system of a company that competed with his. – NY Times
  4. 4. Anonymous “A Leaderless Hacker Group”
  5. 5. Figure 10-1, pg. 382
  6. 6. Internet and Network Attacks Virus Worm Trojan Rootkit Infects, negatively altering the way computer works Copies itself repeatedly, using up resources Needs certain condition to trigger, does not replicate Allows person to take over your computer from remote location.
  7. 7. Figure 10-2 from pg. 385
  8. 8. Trojan Programs, 3. 90% Viruses, 7.00 % Network Worms, 89.1 0% Malicious Program Types http://www.securelist.com/en/analysis/151436695/Virus_Review_2002 Portable Media, 1.3 0% Internet, 2. 30% Email, 93.4 0% Main Virus Threat
  9. 9. Safeguards against computer viruses and other malware
  10. 10. Figure 10-5 from pg. 388 of your book
  11. 11. Safeguards
  12. 12. Hardware Theft and Vandalism
  13. 13. Software Theft • End-User License Agreement (EULA)
  14. 14. Information Theft (Encryption)
  15. 15. Information Theft (Digital Signature)
  16. 16. System Failure Uninterruptible Power Supply (UPS)
  17. 17. Backing Up – The Ultimate Safeguard
  18. 18. Wireless Security Wireless Access Point (WAP)
  19. 19. 802.11i network
  20. 20. Health Concerns: Repetitive Strain Injury
  21. 21. Health Concerns: Computer Vision Syndrome
  22. 22. Computer Addiction helpguide.org
  23. 23. Ethics and Society: Information Accuracy • National Press Photographers Association
  24. 24. Ethics and Society: Intellectual Property Rights
  25. 25. Ethics and Society: Green Computing
  26. 26. Information Privacy: Electronic Profiles
  27. 27. Information Privacy: Cookies Look in your book, pg. 404, at figure 10-22 about “How Cookies Work”
  28. 28. Information Privacy: Spyware and Adware
  29. 29. Information Privacy: Spam
  30. 30. Information Privacy: Phishing
  31. 31. Information Privacy: Social Engineering
  32. 32. Privacy Laws: Employee Monitoring
  33. 33. Privacy Laws: Content Filtering
  34. 34. • Complete both worksheets by Monday beginning of class. • Complete take home test by Monday beginning of class. Assignment

×