Академический Документы
Профессиональный Документы
Культура Документы
_______________________________________________________________________________________________
Computer crime Computer security Computer viruses, worms and Trojan horses Computer ethics
Computer crime
7 basic categories : any crime that involves
hacker someone who accesses a computer / network illegally intent : improve security cracker someone who accesses a computer / network illegally intent : destroy data, stealing information script kiddie usually teenagers whose use prewritten hacking and cracking programs to break into computer / network intent : same as cracker
SCT0012 - UNDERSTANDING COMPUTER
worst computer crime occurs when there are no indications that data was accessed
unethical employees
Computer Security
Computer security risk :
Action that causes loss of or damage to computer system (hardware, software, data, information, processing capability)
corporate spies
have excellent computer and network skills, break into specific computer to steal data and information intent : gain competitive advantage use email as vehicle for extortion intent : threatening his victim if they are not pay him some money
cyberextortionist
cyberterrorist
SCT0012 - UNDERSTANDING COMPUTER
someone who use Internet / network to destroy computers for political reasons
SCT0012 - UNDERSTANDING COMPUTER
Information theft
How can individual protect against hackers / crackers? Set and use username/password
Username Unique combination of characters that identifies user
Password is private combination of characters associated with the user name that allows access to computer resources
Software theft :
Act of stealing or illegally copying software or intentionally erasing programs Software piracy is illegal duplication of copyrighted software
physical access control : locked doors and windows to protect the computer / equipment install alarm systems attach additional physical security devices such as cables that lock the computer / equipment to desktop mobile computer user attach physical device to lock mobile computer temporary to stationary object install mini security system use password, and biometrics
Information theft :
Steals personal / confidential information The loss of information can cause as much damage as hardware / software theft Crackers usually intercept during transmission of information over network
software manufactures issue users license agreement product activation allows user to input product identification number online or by phone and receive unique installation identification number
Encryption :
Process of converting plaintext (readable data) into ciphertext (unreadable characters) Encryption key (formula) often uses more than one method To read the data, the recipient must decrypt, or decipher, the data
use variety of encryption techniques to keep data secure and private via internet and network
encryption techniques digital signature digital certificates secure sockets layer secure http
System failure :
Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse hides within or looks like legitimate program until triggered Does not replicate itself on other computers Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive
inoculate existing infected files. Antivirus records information of that file (file size, creation look for virus signature / date). Virus detected will virus definition either remove or specific pattern of quarantine virus code. The code of virus should be updated regularly in antivirus programs program signature files
SCT0012 - UNDERSTANDING COMPUTER
Some tips for preventing virus, worm, and Trojan horse infections?
Set the macro security in programs so you can enable or disable macros Install an antivirus program on all of your computers Never open an e-mail attachment unless you are expecting it and it is from a trusted source
Records information about program such as file size and creation Uses date Attempts information to remove to detect if any detected virus tampers virus with file Quarantines infected files that it Keeps file cannot in separate remove
SCT0012 - UNDERSTANDING COMPUTER
If the antivirus program flags an e-mail attachment as infected, delete the attachment immediately
Security system consisting of hardware and/or software that prevents unauthorized network access
Computer ethics
Information privacy :
Right of individuals and companies to restrict collection and use of information about them Difficult to maintain today because data is stored online
Codes of conduct Codes of conduct
Unauthorized use of Unauthorized use of computers and computers and networks networks Software theft Software theft Information accuracy Information accuracy
Intellectual property Intellectual property rights rights to rights rights to which creators are which creators are entitled for their work entitled for their work
User preferences
Set browser to accept cookies, prompt you to accept cookies, or disable cookies
Spyware is program placed on computer without users knowledge Adware is a program that displays online advertisements Spam is unsolicited e-mail message sent to many recipients
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal information
Internet Content Rating Association (ICRA) provides rating system of Web content
REVISION
10