Вы находитесь на странице: 1из 26

Discovering Computers 2008

Chapter 11
Computer
Security,
Ethics and
Computer Security Risks
What is a computer security risk?
 Event or action that causes loss of or damage to
computer system
 Computer crime: any illegal act involving a
computer generally
 Cybercrime: refer to online or Internet-based
illegal acts.

Click to view Web


Link, click Chapter 11,
Click
Web Link from left
navigation, then click
Computer Emergency
Response Team
Coordination Center
p. 556
below - 558 11
Chapter Fig. Next
11-1
Internet and Network Attacks

What are viruses, worms, and Trojan horses?


Virus is a Payload is the
potentially Worm copies Trojan horse destructive
damaging itself repeatedly, hides within event that is
computer using up or looks like delivered when
program that affects resources legitimate you (1) open file, (2)
a computer and possibly run infected
shutting down program until
negatively by triggered program, (3)
computer or connects an
altering the way the
network
computer works unprotected
without the user’s Does not computer to a
knowledge or replicate network, or (4) boot
permission itself on computer with
other infected disk
computers in disk drive
Can spread
and
damage
files
p. 558 Next
Internet and Network Attacks
Computer viruses, worms and Trojan horse are classified as
malware (short for malicious software), which are programs
that act without user’s knowledge and deliberately alter the
computer’s operation.
A computer infected by a virus, worm or Trojan horse has one
or more of the following symptoms:
 Screen displays unusual message or image
 Available memory is less than expected
 Files become corrupted
 Unknown programs or files mysteriously appear
 Music or unusual sound plays randomly
 Existing programs and files disappear
 Programs or files do not work properly
 System properties change
p. 560 - 561 Fig. Next
11-4
Internet and Network Attacks

How can a virus spread through an e-mail message?


Step 1. Unscrupulous Step 2. They
programmers create a virus use the Internet to
program. They hide the send the e-mail
virus in a Word document message to
and attach the Word thousands of users
document to an e-mail around the world.
message.

Step 3b. Other users do not


recognize the name of the
Step 3a. Some sender of the e-mail message.
users open the These users do not open the
attachment and e-mail message. Instead they
their computers delete the e-mail message.
become infected These users’ computers are not
with the virus. infected with the virus.

p. 559 Fig. 11-2 Next


Internet and Network Attacks

What is an antivirus program?


 Identifies and removes
computer viruses
 Most also protect against
worms and Trojan
horses

p. 560 - 561 Fig. Next


11-4
Internet and Network Attacks

What is a virus signature?


 Specific pattern of virus code
 Also called virus definition
 Antivirus programs
look for virus
signatures to
identify a virus

p. 561 Fig. 11-5 Next


Internet and Network Attacks

How does an antivirus program inoculate a program


file?
Records 
information 
about program such 
as file size and 
Uses  creation 
information  date Attempts 
to detect if  to remove 
virus tampers  any detected 
with file virus
Quarantines 
infected 
files that it 
Keeps file cannot 
in separate remove
area of hard disk

p. 561 Next
Internet and Network Attacks

What are some tips for preventing virus, worm, and


Trojan horse infections?
Never open an
Never start a e-mail attachment
Install an antivirus
computer with unless you are
program on all of
removable media expecting it and
your computers
inserted it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately

Click to view Web


Link, click Chapter 11,
Click
Web Link from left
navigation, then click
Virus Hoaxes below
p. 56211
Chapter Next
Internet and Network Attacks

What are a denial of service attack, back door and


spoofing?
A denial of service attack is an assault which
disrupts computer access to an Internet service
such as the Web or e-mail

A back door is a program or set of instructions


in a program that allow users to bypass
security controls when accessing a computer
resource

Spoofing is a technique intruders use to make


their network or Internet transmission
appear legitimate to a victim computer or
network
p. 562 and 563 Next
Internet and Network Attacks

What is a firewall?
 Security system consisting of hardware and/or
software that prevents unauthorized intrusion

p. 563 Fig. 11-7 Next


Internet and Network Attacks

What is a personal firewall?


 Program that protects personal computer and its data
from unauthorized intrusions
 Monitors transmissions to and from computer
 Informs you of attempted intrusion

Click to view Web


Link, click Chapter 11,
Click
Web Link from left
navigation, then click
Personal Firewall
Software below
p. 56411
Chapter Fig. 11-8 Next
Unauthorized Access and Use
How can companies protect against hackers
(someone who accesses a computer or network
legally)?
Intrusion detection software
analyzes network traffic, assesses Access control defines who
system vulnerabilities, and identifies can access computer and
intrusions and suspicious behavior what actions they can take

Audit trail records access


attempts

p. 564 - 565 Next


Unauthorized Access and Use
What are other ways to protect your personal computer?
 Disable file and
printer sharing on
Internet connection

p. 565 Fig. 11-9 Next


Unauthorized Access and Use
What is a user name?
 Unique combination of characters that identifies user
 Password is private
combination of
characters associated
with the user name
that allows access
to computer
resources

p. 566 Fig. 11-10 Next


Unauthorized Access and Use
How can you make your password more secure?
 Longer passwords provide greater security

p. 567 Fig. 11-11 Next


Unauthorized Access and Use
What is a possessed object?
 Item that you must carry to gain access to
computer or facility
 Often used with
numeric password
called personal
identification
number (PIN)

p. 567 Fig. 11-12 Next


Unauthorized Access and Use
What is a biometric device?
 Authenticates person’s
identity using personal
characteristic
 Fingerprint, hand geometry,
voice, signature, and iris

p. 567 - 568 Fig. Next


11-13
Hardware Theft and Vandalism
What are hardware theft and hardware vandalism?
 Hardware theft is act of stealing
computer equipment
 Cables sometimes used to lock
equipment
 Some notebook computers use
passwords, possessed objects, and
biometrics as security methods
 For PDAs and smart phones, you
can password-protect the device
 Hardware vandalism is act of
defacing or destroying computer
equipment

p. 569 - 570 Fig. Next


11-14
Software Theft
What is software theft?

Act of stealing or Software piracy


illegally stealing is illegal
software, copying duplication
software or of copyrighted
intentionally software
erasing
programs

Click to view Web


Link, click Chapter 11,
Click
Web Link from left
navigation, then click
Software Piracy
below Chapter 11
p. 570 Next
Software Theft
What is a license agreement?
 Right to use software
 Single-user license agreement allows user to install software
on one computer, make backup copy, and sell software
after removing from computer

p. 570 Fig. 11-15 Next


Software Theft
What are some other safeguards against software theft?

Product activation allows user to input product


identification number online or by phone and
receive unique installation identification number

Business Software Alliance (BSA) promotes better


understanding of software piracy problems

Click to view Web


Link, click Chapter 11,
Click
Web Link from left
navigation, then click
Business Software
Alliance
p. 571below Chapter Next
11
Information Theft
What is encryption?
 Safeguards against information theft
 Process of converting plaintext (readable data) into ciphertext
(unreadable characters)
 Encryption key (formula) often uses more than one method
 To read the data, the recipient must decrypt, or decipher, the data

p. 572 Fig. 11-16 Next


Information Privacy
What are spyware, adware, and spam?
 Spyware is program
placed on computer
without user’s
knowledge
 Adware is a program
that displays online
advertisements
 Spam is unsolicited
e-mail message sent
to many recipients

p. 583 - 584 Fig. Next


11-29
Information Privacy
How can you control spam?

Service that
E-mail filtering
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources

Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages

p. 584 Next
Information Privacy
What is phishing?

Scam in which a perpetrator
sends an official looking
e­mail that attempts
to obtain your personal and
 financial information

p. 584 Next

Вам также может понравиться