Академический Документы
Профессиональный Документы
Культура Документы
Sumber: Chapter 9. The Challenges of Digital Age: Society and IT, p.463 Williams, B.K, Stacy C. Sawyer (2007). Using Information Technology: A Practical Introduction to Computers & Communications. Seventh Edition, McGraw-Hill, New York. ISBN-13: 978-007-110768-6
Learning Outcomes Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu :
menjelaskan: bagaimana data digital digunakan utk membodohi orang lain, dan dapat menjelaskan jenis-jenis ancaman pada komputer, dan karakteristik dari lima komponen sekuriti (C2)
Outline Materi
Truth Issues: Manipulating Digital Data Security Issues: Threats Security: Safeguarding Computers & Communications
9-4
Fashion model photos are routinely elongated to make models appear more slender
How many girls become anorexic to try to match those models impossible perfection? http://www.etniesgirl.com/blog/2005/11/30/photoshop -101-even-models-have-flaws http://www.tutorialized.com/tutorial/Basic-ModelRetouching/9547 http://news.bbc.co.uk/1/hi/health/769290.stm
9-5
9-6
9-7
Security Issues: Threats Errors and accidents Natural hazards Computer crime Computer criminals
Is my computer safe? Im concerned about it. What do I need to do to use it safely for work, home, and school?
9-8
Human errors
People choose the wrong computer
Too simple or too complex
9-9
Software errors
Programmers make coding errors Famous example: Utility billing software:
Customer pays early software credits account Customer pays late software credits account, adds late fee in for next bill Programmer forgot to consider customers who pay exactly on time their payments were never credited at all!
9-10
9-12
Theft of hardware Theft of software Theft of online music and videos Theft of time and services Theft of information Internet-related fraud Taking over your PC Crimes of malice Computer criminals
9-13
Theft of software
Pirated software is software obtained illegally This includes softlifting - buying one copy of the software and using it on multiple computers Software makers have prosecuted both companies and individuals including students for software piracy
9-14
Stealing movies
The film industry has taken aggressive aim at pirated movies 11-nation crackdown announced in 2005
9-15
If you are a victim of identity theft, you may file a report online at the Federal Trade Commissions website at
https://rn.ftc.gov/pls/dod/widtpubl$.startup?Z_ORG_CODE=PU03
9-17
Internet-related Fraud
Because it lends itself to anonymity, internetrelated fraud is becoming more common Well-known examples include:
Nigerian letter scam
Letter says you can get a lot of money out of Nigeria if you pay a money transfer fee first
Phishing
Sending emails that appear to come from a trusted source that links you to a website where you type in personal information that is intercepted by the phisher
9-18
9-20
Employees who
Have a grudge against their current or former employers Have a grudge against another employee Sell their companys secrets for personal profit
Computer criminals do not include your employer, who is legally allowed to monitor the computers at work
Check your companys computer usage policy Make sure you follow the rules Know that any data you store in the computer at work including emails is company property
9-22
Security: Safeguarding
9-23
Security: Safeguarding
Security: Safeguarding
Security: Safeguarding
Disadvantage: encrypting data may prevent lawenforcement officials from reading the data criminals are sending to each other
Discussion Question: Does information privacy outweigh law enforcements needs to track down and prosecute criminals? Should we all encrypt our information to prevent crackers and criminals from stealing it?
9-26
Security: Safeguarding
Security: Safeguarding
Kesimpulan
29