Академический Документы
Профессиональный Документы
Культура Документы
Computers 2010
Living in a Digital World
Objectives Overview
Identify safeguards against Explain the ways software Discuss how encryption
hardware theft and manufacturers protect works, and explain why it
vandalism against software piracy is necessary
Corporate
Hackers Crackers Script Kiddies
Spies
Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program
computer repeatedly, program that hides in
negatively using up that hides a computer
by altering resources within or and allows
the way the and possibly looks like a someone
computer shutting legitimate from a
works down the program remote
computer or location to
network take full
control
CLICK TO START
Discovering Computers 2010: Living in a Digital World 8
Chapter 11
Internet and Network Attacks
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
Information
Insurance
security
agencies
departments
Page 569 Discovering Computers 2010: Living in a Digital World 20
Chapter 11
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Cables to lock
Physical access controls Alarm systems
equipment
Illegally registers
Illegally copies a
and/or activates
program
a program
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Page 571 Discovering Computers 2010: Living in a Digital World 24
Chapter 11
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
Click to view Web Link,
click Chapter 11, Click Web
Link from left navigation,
then click Business Software
Alliance below Chapter 11
Parent
Child
A wireless access
Change the default
point should not
SSID
broadcast an SSID
Configure a WAP so
that only certain Use WPA or WPA2
devices can access security standards
it
Page 578 Discovering Computers 2010: Living in a Digital World 36
Chapter 11
Health Concerns of Computer Use
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
Irritable when
Neglects family Problems at
not at the
and friends work or school
computer
Page 581 Discovering Computers 2010: Living in a Digital World 40
Chapter 11
Ethics and Society
• Spam is an unsolicited e-
mail message or
newsgroup posting
• E-mail filtering blocks e-
mail messages from
designated sources
• Anti-spam programs
attempt to remove spam
before it reaches your
inbox
• Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
• Pharming is a scam
where a perpetrator
attempts to obtain your
personal and financial
information via spoofing
Chapter 11 Complete