Академический Документы
Профессиональный Документы
Культура Документы
By
Ashu Shukla Comdt 165 Bn
1
Learning Objectives
Explain why computer users should be concerned about network and Internet security. List several examples of unauthorized access, unauthorized use, and computer sabotage. Explain how access control systems, firewalls, antivirus software, and encryption protect against unauthorized access, unauthorized use, and computer sabotage. Discuss online theft, identity theft, Internet scams, spoofing, phishing, and other types of dot cons.
Chapter 9
Learning Objectives
Detail steps an individual can take to protect against online theft, identity theft, Internet scams, spoofing, phishing, and other types of dot cons. Identify personal safety risks associated with Internet use. List steps individuals can take to safeguard their personal safety when using the Internet. Name several laws related to network and Internet security.
Chapter 9
Overview
This chapter covers:
Chapter 9
Chapter 9
Unauthorized access: Gaining access to a computer, network, file, or other resource without permission Unauthorized use: Using a computer resource for unapproved activities Both can be committed by insiders and outsiders Codes of conduct: Used to specify rules for behavior, typically by a business or school
Chapter 9
Chapter 9
Chapter 9
Computer Sabotage
Computer sabotage: Acts of malicious destruction to a computer or computer resource Bot: A PC that is controlled by a computer criminal Botnet: A group of bots that can work together in a controlled fashion Used by botherders to send spam, launch Internet attacks and malware, etc. Malware: Any type of malicious software Includes viruses, worms, Trojan horses, etc. Increasingly used for computer crimes and to take control of individuals PCs for botnet activities Can infect mobile phones and mobile devices (some preinstalled on mobile devices)
Chapter 9 Understanding Computers, 12th Edition 9
Computer Sabotage
Computer virus: Malicious program embedded in a file that is designed to cause harm to the computer system Often embedded in downloaded programs and email messages Computer worm: Malicious program designed to spread rapidly by sending copies of itself to other computers Typically sent via e-mail Trojan horse: Malicious program that masquerades as something else Usually appear to be a game or other program Cannot replicate themselves; must be downloaded and installed
Chapter 9 Understanding Computers, 12th Edition 10
Computer Sabotage
Chapter 9
11
Computer Sabotage
Denial of service (DoS) attack: Act of sabotage that floods a Web server with so much activity that it is unable to function Distributed DoS attack: Uses multiple computers
Chapter 9
12
Computer Sabotage
Data or program alteration: When a hacker breaches a computer system in order to delete or change data Students changing grades Employees performing vengeful acts, such as deleting or changing corporate data Web site defacement (cybervandalism): Changing content of a Web site Often used to make political statements
Chapter 9
13
Passwords
Chapter 9
16
Chapter 9
17
Biometric Systems
Chapter 9
20
Chapter 9
22
Firewalls
Chapter 9
24
Encryption
Chapter 9
26
Only transmit credit card numbers and other sensitive data via a secure Web server
Web-based encrypted e-mail (HushMail) is available
Chapter 9
28
Chapter 9
29
Antivirus Software
Chapter 9
30
Chapter 9
31
Chapter 9
33
Chapter 9
34
Identity Theft
Chapter 9
36
Chapter 9
37
Chapter 9
38
Chapter 9
42
Chapter 9
43
Chapter 9
44
Chapter 9
45
Check Web sites that list known spyware programs before downloading a program
Run antispyware programs regularly
Chapter 9
46
Chapter 9
47
Chapter 9
49
Chapter 9
50
Chapter 9
51
It is difficult for the legal system to keep pace with the rate at which technology changes There are domestic and international jurisdictional issues Computer crime legislation continues to be proposed and computer crimes are being prosecuted
Chapter 9
53
Chapter 9
IT ACT PROVISIONS
email would now be a valid and legal form of communication in our country that can be duly produced and approved in a court of law.
Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act.
Digital signatures have been given legal validity and sanction in the Act.
Chapter 9
The Act now allows Government to issue notification on the web thus heralding egovernance statutory remedy in case if anyone breaks into companies computer systems or network and causes damages or copies data
IT ACT PROVISIONS
Chapter 9
CYBER CRIMES
CYBER CRIMES AGAINST PERSONS eg melissaand lovebug virus
CYBER CRIMES
Chapter 9
Chapter 9
OFFENCES AND LAWS IN CYBER SPACE TAMPERING WITH COMPUTER DOCUMENTS HACKING WITH COMPUTER SYSTEM PUBLISHING OBSCENE MATERIAL ON INTERNET BREACHING OF CONFIDENTIALITY AND PRIVACY
Chapter 9 Understanding Computers, 12th Edition
Chapter 9
Summary
Why Be Concerned about Network and Internet Security? Unauthorized Access, Unauthorized Use, and Computer Sabotage Protecting Against Unauthorized Access, Unauthorized Use, and Computer Sabotage Online Theft, Fraud, and Other Dot Cons Protecting Against Online Theft, Fraud, and Other Dot Cons Personal Safety Issues Protecting Against Cyberstalking and Other Personal Safety Concerns