SlideShare a Scribd company logo
Chapter 11 Computer Security,  Ethics and Privacy
Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses,  botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
Computer Security Risks ,[object Object],p. 556 - 558 Fig. 11-1 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Computer Emergency Response Team Coordination Center below Chapter 11
Internet and Network Attacks ,[object Object],p. 558 Virus  is a potentially damaging  computer  program ,[object Object],Trojan horse   hides within  or looks like legitimate program until triggered Payload  (destructive  event) that is delivered Can spread and damage files Does not replicate itself on other computers Next
Internet and Network Attacks ,[object Object],p. 559 Fig. 11-2 Step 1.  Unscrupulous programmers create a virus program that deletes all files. They hide the virus in a picture and attach the picture to an e-mail message. Step 2.  They use the Internet to send the e-mail message to thousands of users around the world. Step 3b.  Other users do not recognize the name of the sender of the e-mail message. These users do not open the  e-mail message - instead they delete the e-mail message. These users’ computers are not infected with the virus. Step 3a.  Some users open the attachment and their computers become infected with the virus. Next
Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
Internet and Network Attacks ,[object Object],p. 560 Fig. 11-3 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 560 - 561 Fig. 11-4 ,[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Fig. 11-5 ,[object Object],[object Object],[object Object],Next
Internet and Network Attacks ,[object Object],p. 561 Keeps file  in separate  area of hard disk Next Records  information  about program such  as file size and  creation  date Attempts  to remove  any detected  virus Uses  information  to detect if  virus tampers  with file Quarantines   infected  files that it  cannot  remove
Internet and Network Attacks ,[object Object],p. 562 Install a personal firewall program If the antivirus program flags an  e-mail attachment  as infected, delete  the attachment immediately Never start a computer with removable media inserted Never open an  e-mail attachment unless you are expecting it and  it is from a  trusted source Install an antivirus program on all of your computers Check all  downloaded  programs for  viruses, worms,  or Trojan horses Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Virus Hoaxes below Chapter 11
Internet and Network Attacks ,[object Object],p. 562 - 563 A  denial of service attack  is an assault which disrupts computer access to an Internet service  such as the Web or e-mail A  back door  is a program or set of instructions in a program that allow users to bypass security controls when accessing a computer resource Spoofing  is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network Next
Internet and Network Attacks ,[object Object],p. 563 Fig. 11-7 ,[object Object],Next
Internet and Network Attacks ,[object Object],p. 564 Fig. 11-8 ,[object Object],[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 564 - 565 Next Intrusion detection software analyzes network traffic, assesses  system vulnerabilities, and identifies  intrusions and suspicious behavior Access control defines who  can access computer and  what actions they can take Audit trail  records access attempts
Unauthorized Access and Use ,[object Object],p. 565 Fig. 11-9 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 566 Fig. 11-10 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  CAPTCHAs below Chapter 11
Unauthorized Access and Use ,[object Object],p. 566 - 567 Fig. 11-11 ,[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 ,[object Object],[object Object],Next
Unauthorized Access and Use ,[object Object],p. 567 - 568 Fig. 11-13 ,[object Object],[object Object],Next
Hardware Theft and Vandalism ,[object Object],p. 569 - 570 Fig. 11-14 ,[object Object],[object Object],[object Object],[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  RTLS below Chapter 11
Software Theft ,[object Object],p. 570 Next Act of stealing or  illegally stealing software, copying  software or  intentionally  erasing  programs Software  piracy   is illegal duplication  of copyrighted software
Software Theft ,[object Object],p. 570 - 571 Fig. 11-15 ,[object Object],[object Object],Next
Software Theft ,[object Object],p. 571 Product activation  allows user to input product identification number online or by telephone and receive unique installation identification number Business Software Alliance (BSA) promotes better understanding of software piracy problems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Business Software Alliance below Chapter 11
Information Theft ,[object Object],p. 572 Fig. 11-16 ,[object Object],[object Object],[object Object],[object Object],Next
Information Theft ,[object Object],p. 573 Fig. 11-17 Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  BitLocker below Chapter 11
Information Theft ,[object Object],Secure site   is Web site that uses encryption to secure data p. 573 Digital certificate  is notice that guarantees Web site is legitimate Many Web browsers  use encryption Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Certificates below Chapter 11
Information Theft ,[object Object],p. 573 Fig. 11-18 ,[object Object],[object Object],Next
Information Theft ,[object Object],p. 574 Fig. 11-19 ,[object Object],[object Object],Next
System Failure ,[object Object],p. 574  Caused by aging hardware,  natural disasters, or electrical  power disturbances Can cause loss of hardware,  software, or data Prolonged malfunction  of computer Undervoltage —drop  in electrical supply Next Overvoltage  or  power surge — significant increase  in electrical power Noise —unwanted  electrical signal
System Failure ,[object Object],p. 574 - 575 Figs. 11-20–11-21 ,[object Object],[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Uninterruptible Power Supply below Chapter 11
Backing Up — The Ultimate Safeguard ,[object Object],p. 576 Duplicate of file, program, or disk Full backup all files in computer Selective backup select which files  to back up Three-generation backup preserves  three copies of important files In case of system failure or corrupted files,  restore  files by copying to original location Next
Wireless Security ,[object Object],p. 577 Fig. 11-22 ,[object Object],[object Object],[object Object],[object Object],Next
Ethics and Society ,[object Object],p. 578 - 579 Information privacy Intellectual property rights —rights to which creators are entitled for their work Software theft Information accuracy Codes of conduct Unauthorized use of computers and networks Moral guidelines that govern use of computers and information systems Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Digital Rights Management below Chapter 11
Ethics and Society ,[object Object],p. 580 Fig. 11-25 ,[object Object],[object Object],Next
Information Privacy ,[object Object],p. 580 and 586 Legal for employers to use monitoring software programs Difficult to maintain today because data is stored online Employee monitoring  is using computers to observe employee computer use Right of individuals and companies to deny or restrict collection and use of information about them Next
Information Privacy ,[object Object],p. 581 Fill in only necessary information on rebate, warranty, and  registration forms Avoid shopping club  and buyers cards Install a cookie manager  to filter cookies Inform merchants that you  do not want them to distribute  your personal information Limit the amount of information  you provide to Web sites; fill  in only required information Clear your history file when  you are finished browsing Set up a free e-mail account;  use this e-mail address for  merchant forms Turn off file and print sharing  on your Internet connection Install a personal firewall Sign up for e-mail  filtering through your  Internet access provider or  use an antispam program,  such as Brightmail Do not reply to spam  for any reason Surf the Web anonymously  with a program such as  Freedom Web Secure or  through an anonymous  Web site such as  Anonymizer.com Next
Information Privacy ,[object Object],p. 581 - 582 Fig. 11-27 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 582 Set browser to accept cookies, prompt you to accept cookies, or disable cookies Some Web sites sell or trade information stored in your cookies Small text file on your computer that contains data about you User preferences Interests and browsing habits How regularly you visit Web sites Next
Information Privacy ,[object Object],p. 583 Fig. 11-28 Next
Information Privacy ,[object Object],p. 583 - 584 Fig. 11-29 ,[object Object],[object Object],[object Object],Next Click to view  Web Link, click Chapter 11, Click Web Link from left  navigation, then click  Spam below Chapter 11
Information Privacy ,[object Object],p. 584 E-mail filtering Anti-spam program Next Collects spam in central location  that you can  view any time Service that  blocks e-mail  messages from  designated  sources Sometimes  removes valid  e-mail messages Attempts to  remove spam
Information Privacy ,[object Object],p. 584 Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and  financial information Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 585 Fig. 11-30  Next
Information Privacy ,[object Object],p. 586 - 587 Fig. 11-31 ,[object Object],[object Object],[object Object],Next
Information Privacy ,[object Object],p. 587 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],Computer vision syndrome (CVS) —eye and vision problems p. 587 - 589 Repetitive strain injury (RSI) Computer addiction —when computer consumes entire social life Tendonitis—inflammation of tendon due to repeated motion Carpal tunnel syndrome (CTS)—inflammation of nerve that connects forearm to palm Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-32 ,[object Object],[object Object],[object Object],Next
Health Concerns of Computer Use ,[object Object],p. 588 Fig. 11-33 Next
Health Concerns of Computer Use ,[object Object],p. 589 Fig. 11-34  ,[object Object],keyboard height: 23” to 28” feet flat on floor adjustable height chair with 4 or 5 legs for stability adjustable seat elbows at 90° and arms and hands parallel to floor Next
Health Concerns of Computer Use ,[object Object],p. 590 Fig. 11-35 ,[object Object],Next Click to view Web  Link, click Chapter 11, Click  Web Link from left  navigation, then click  Green Computing below Chapter 11
Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools,  business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues,  their preventions, and ways to  keep the environment healthy Chapter 11 Complete

More Related Content

What's hot

Unrestricted file upload
Unrestricted file uploadUnrestricted file upload
Unrestricted file upload
vikram vashisth
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testingImaginea
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
TriCorps Technologies
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
Aman Kumar
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
hruth
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
TechnoHacks_Infosystem
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
Sachin Saini
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
SysCloud
 
Mobile security
Mobile securityMobile security
Mobile security
Tapan Khilar
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
Edwin A. Opare
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Akash Dhiman
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
arohan6
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
Rob Ragan
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
Security Testing
Security TestingSecurity Testing
Security Testing
Qualitest
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
Pushkar Pashupat
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
Anurag Srivastava
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
Jim Kaplan CIA CFE
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
Bibek Sharma
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
Quick Heal Technologies Ltd.
 

What's hot (20)

Unrestricted file upload
Unrestricted file uploadUnrestricted file upload
Unrestricted file upload
 
Web application penetration testing
Web application penetration testingWeb application penetration testing
Web application penetration testing
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Web application attacks
Web application attacksWeb application attacks
Web application attacks
 
Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )Cyber Security ( Action Against Cyber Crime )
Cyber Security ( Action Against Cyber Crime )
 
Phishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS WorkingPhishing attack, with SSL Encryption and HTTPS Working
Phishing attack, with SSL Encryption and HTTPS Working
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Security Testing
Security TestingSecurity Testing
Security Testing
 
Wireless and mobile security
Wireless and mobile securityWireless and mobile security
Wireless and mobile security
 
Introduction to Web Application Penetration Testing
Introduction to Web Application Penetration TestingIntroduction to Web Application Penetration Testing
Introduction to Web Application Penetration Testing
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 

Similar to Chapter11

Computer security
Computer securityComputer security
Computer security
Dhani Ahmad
 
Security presentation
Security presentationSecurity presentation
Security presentation
Nathan Bateman
 
Internet security
Internet securityInternet security
Internet securityat1211
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
Asif Raza
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
babepa2317
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virussharing notes123
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
Yhal Htet Aung
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
MuhammadRobeel3
 
Computer security
Computer securityComputer security
Computer security
EktaVaswani2
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011lbcollins18
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
ijsrd.com
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for LawyersMark Lanterman
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
JoselitoJMebolos
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
Tapan Khilar
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.angelaag98
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
Symptai Consulting Limited
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
tunzida045
 

Similar to Chapter11 (20)

Computer security
Computer securityComputer security
Computer security
 
Security presentation
Security presentationSecurity presentation
Security presentation
 
Internet security
Internet securityInternet security
Internet security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
INTERNET SECURITY.pptx
INTERNET SECURITY.pptxINTERNET SECURITY.pptx
INTERNET SECURITY.pptx
 
Securing information systems
Securing information systemsSecuring information systems
Securing information systems
 
Wong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-VirusWong Pau Tung-special-topic-02-Virus
Wong Pau Tung-special-topic-02-Virus
 
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and PrivacyCSC1100 - Chapter09 - Computer Security, Ethics and Privacy
CSC1100 - Chapter09 - Computer Security, Ethics and Privacy
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
Computer security
Computer securityComputer security
Computer security
 
Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011Computer security and_privacy_2010-2011
Computer security and_privacy_2010-2011
 
Type of Security Threats and its Prevention
Type of Security Threats and its PreventionType of Security Threats and its Prevention
Type of Security Threats and its Prevention
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Computer Security for Lawyers
Computer Security for LawyersComputer Security for Lawyers
Computer Security for Lawyers
 
Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Computer Secutity.
Computer Secutity.Computer Secutity.
Computer Secutity.
 
Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?Can your company survive a modern day cyber attack?
Can your company survive a modern day cyber attack?
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

More from Izaham

Morphology 1
Morphology 1Morphology 1
Morphology 1
Izaham
 
Morphology
MorphologyMorphology
Morphology
Izaham
 
Critical reading
Critical readingCritical reading
Critical reading
Izaham
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
Izaham
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
Izaham
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
Izaham
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
Izaham
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
Izaham
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
Izaham
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
Izaham
 
E learning design principles
E learning design principlesE learning design principles
E learning design principlesIzaham
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711Izaham
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware developmentIzaham
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)Izaham
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2Izaham
 
Flowchart
FlowchartFlowchart
FlowchartIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak BannerIzaham
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1Izaham
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2Izaham
 

More from Izaham (20)

Morphology 1
Morphology 1Morphology 1
Morphology 1
 
Morphology
MorphologyMorphology
Morphology
 
Critical reading
Critical readingCritical reading
Critical reading
 
Listening for main idea & supporting details
Listening for main idea & supporting detailsListening for main idea & supporting details
Listening for main idea & supporting details
 
Internet and elt
Internet and eltInternet and elt
Internet and elt
 
Mulitmedia english v3
Mulitmedia english v3Mulitmedia english v3
Mulitmedia english v3
 
Development of call simplified 2015
Development of call simplified 2015Development of call simplified 2015
Development of call simplified 2015
 
Ad & dis lect 2 2015
Ad & dis lect 2 2015Ad & dis lect 2 2015
Ad & dis lect 2 2015
 
Tsl641 principles for call evaluation v 2
Tsl641   principles for call evaluation v 2Tsl641   principles for call evaluation v 2
Tsl641 principles for call evaluation v 2
 
Intro to call cai
Intro to call caiIntro to call cai
Intro to call cai
 
E learning design principles
E learning design principlesE learning design principles
E learning design principles
 
Visual principles edu711
Visual principles edu711Visual principles edu711
Visual principles edu711
 
Sample courseware development
Sample courseware developmentSample courseware development
Sample courseware development
 
A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)A development of computer assisted software (a ja-w)
A development of computer assisted software (a ja-w)
 
Flowchart 2
Flowchart 2Flowchart 2
Flowchart 2
 
Flowchart
FlowchartFlowchart
Flowchart
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Poster Untuk Cetak Banner
Poster Untuk Cetak BannerPoster Untuk Cetak Banner
Poster Untuk Cetak Banner
 
Tsl641 Lecture 1
Tsl641 Lecture 1Tsl641 Lecture 1
Tsl641 Lecture 1
 
Ad & Dis Lect 2
Ad & Dis Lect 2Ad & Dis Lect 2
Ad & Dis Lect 2
 

Recently uploaded

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Chapter11

  • 1. Chapter 11 Computer Security, Ethics and Privacy
  • 2. Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next
  • 3.
  • 4.
  • 5.
  • 6. Internet and Network Attacks Video: Attack of the Mobile Viruses Next CLICK TO START
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53. Summary of Computer Security, Ethics and Privacy Potential computer risks Safeguards that schools, business, and individuals can implement to minimize these risks Wireless security risks and safeguards Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, and information privacy Computer-related health issues, their preventions, and ways to keep the environment healthy Chapter 11 Complete