chap 12 presentation:intro i.t

62
 Chapter 12 Computers and Society: Security and Privacy 

Upload: windywitch

Post on 30-May-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 1/62

Chapter 12Computers and Society:

Security and Privacy

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 2/62

Identify the various types of

security risks that can threatencomputers

Describe ways to safeguarda computer

Recognize how a computer virus works and take the

necessary steps to prevent

viruses

Understand how to createa good password

Identify various biometricdevices

Recognize that software piracyis illegal

Explain why encryption isnecessary

Determine why computer backup is important and how it

is accomplished

Discuss the steps in a disaster recovery plan

Understand ways to secure anInternet transaction

List ways to protect your personal information

Chapter 12 Objectives

Next

p. 12.2

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 3/62

CybercrimeOnline or Internet-

based illegal acts

Computer Security:Risks and Safeguards

What is a computer security risk ?

p.12.2

Next

Computer crimeAny illegal act involving

a computer

Event or actionthat causes loss

of or damage to acomputer system

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 4/62

Computer Security:Risks and Safeguards

What is a computer virus ?• Potentially damaging

program that affectscomputer negatively byaltering way computer works

• Segment of programcode from some outsidesource that implantsitself in computer

p.12.2

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 5/62

Computer Security:Risks and Safeguards

What are the ways viruses can be activated?

• Opening infectedfile

• Running infectedprogram

• Booting computer with infected floppydisk in disk drive

p.12.2

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 6/62

Computer Security:Risks and Safeguards

What is the source of a virus?• Written by

programmer – Some write viruses

as challenge – Others write viruses

to cause destructionor to slow Internet

p.12.2

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 7/62

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 8/62

Boot sector virus• Resides in boot sector of

floppy disk or master boot

record of hard disk

Computer Security:Risks and Safeguards

What are the three main types of virus?

p.12.4

Next

File virus• Attaches itself to

program files Macro virus• When you open

document thatcontains infectedmacro, virus loadsinto memory

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 9/62

Computer Security:Risks and Safeguards

How do viruses activate?

p.12.4

Next

Logic bomb

Virus that activates when itdetects certain condition

Time bomb

Type of logic bomb thatactivates on particular date

MalwareMalicious-logic program

Worm and Trojan Horse

Acts without user’s knowledgeand alters computer’s operations

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 10/62

Computer Security:Risks and Safeguards

How can you protect your system from amacro virus?

• Set macro’s securitylevel in all applicationsthat allow you to writemacros

• At medium securitylevel, warning displayswhen you attempt toopen document thatcontains macro

p.12.5 Fig. 12-3

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 11/62

Computer Security:Risks and Safeguards

What does an antivirus program do?

• Detects and identifies

viruses• Inoculates existing

program files• Removes or quarantines

viruses• Creates rescue disk

p.12.6

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 12/62

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 13/62

Computer Security:Risks and Safeguards

How does an antivirus program inoculate aprogram file?• Antivirus program

records

file size and creationdateand uses thisinformation to detect if

a virus tamperswith inoculatedprogram file

p.12.6

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 14/62

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 15/62

Computer Security:Risks and Safeguards

What does an antivirus program do once itdetects a virus?

p.12.6

Next

• Removes virus if possible

• Quarantines infectedfile in folder on hard

disk

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 16/62

Computer Security:Risks and Safeguards

What is a rescue disk ?• Removable disk that

contains uninfected copy of key operating systemcommands and startupinformation

• Upon startup, rescue diskfinds and removes bootsector virus

p.12.6

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 17/62

Computer Security:Risks and Safeguards

What should you do if a virus infects your system?• Remove virus• If you share data

with other users,then immediatelyinform them of virusinfection

p.12.6

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 18/62

Computer Security:Risks and Safeguards

How can you stay informed about viruses?• Several Web sites

publish list of virusalerts and virushoaxes

p.12.7 Fig. 12-6

Next

Virus hoaxE-mail message

that warns you of non-existent virus

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 19/62

Computer Security:Risks and Safeguards

• Use of computer or network withoutpermission

p.12.7

Next

Cracker

Someone whotries to access acomputer or

network illegally

Hacker Once used as a

complimentary word for acomputer enthusiast

Now another word

for cracker

What is unauthorized access ?

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 20/62

Computer Security:Risks and Safeguards

p.12.8

Next

User names and

passwords

Possessedobjects

(badge or card)

Biometricdevices

Callbacksystems

(computer calls back)

How can unauthorized access and use beprevented?

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 21/62

Computer Security:Risks and Safeguards

How can you make your password more secure?• Longer passwords provide greater security

p.12.9Fig. 12-9

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 22/62

Computer Security:Risks and Safeguards

How should you select a user name andpassword?• Avoid obvious

passwords, such as your

initials or birthday• Select password that is

easy for you toremember

p.12.9

Next

IAWL0901IAWL0901First letter of each word inyour favoritemovie, It’s a

Wonderful Life

September 1is your

anniversary

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 23/62

Computer Security:Risks and Safeguards

What is a biometric device ?• Translates person’s

characteristics intodigital code that iscompared to digital codestored in computer

p.12.10

Next

Biometricidentifier

• Fingerprints

• Hand geometry

• Facial features

• Voice

• Signatures

• Retinal (eye) patterns

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 24/62

Computer Security:Risks and Safeguards

What is a fingerprint scanner ?• Captures curves and

indentations of afingerprint

p.12.11 Fig. 12-11

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 25/62

Computer Security:Risks and Safeguards

What is a hand geometry system ?

• Measures shape andsize of person’shand

• Typically used astime and attendancedevice by large

companies

p.12.11 Fig. 12-12

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 26/62

Computer Security:Risks and Safeguards

What is a face recognition system ?• Captures face image

and compares it to

stored image to see if person is legitimateuser

• Can recognize peoplewith or withoutglasses, makeup, or

jewelry, and with newhairstyles

p.12.11 Fig. 12-13

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 27/62

Computer Security:Risks and Safeguards

What is an iris verification system ?• Reads patterns in tiny

blood vessels in backof eye

p.12.12 Fig. 12-14

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 28/62

Computer Security:Risks and Safeguards

What is an audit trail ?• Records in file both

successful andunsuccessful accessattempts

p.12.13

Next

Companies shoulddocument and explain to

employees policiesregarding use of

computers byemployees for personal

reasons

C S i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 29/62

When youpurchase

software, you donot own the

software;instead, you

become alicensed user

Computer Security:Risks and Safeguards

What is software theft ?• Can range from someone

stealing media thatcontains software tointentional piracy of software

• Software piracy isunauthorized and illegalduplication of copyrightedsoftware

p.12.14

Next

C S i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 30/62

Network Site LicenseAllows network users to share single

copy of software that resides on

network server

Computer Security:Risks and Safeguards

Single-User License vs Site License

p.12.14

Next

Single-User License• Install software on one computer

• Sell software to someone, but onlyafter removing software fromcomputer first

C S i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 31/62

Computer Security:Risks and Safeguards

What is encryption ?• Process of converting

readable data intounreadable characters

to prevent unauthorizedaccess• Used to transmit files

over Internet

p.12.16

Next

PlaintextUnencrypted, readable data

CiphertextThe encrypted (scrambled) data

encryption software

PlaintextUnencrypted, readable data

encryption key

C S i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 32/62

Computer Security:Risks and Safeguards

What are some data encryption methods?• Encryption key (formula) often uses more than one

of these methods

p.12.16 Fig. 12-18

Next

C S i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 33/62

Step 1: Sender creates document to be e-mailed to receiver.

Sender (Joan)

message tobe sent

Step 2: Sender uses receiver’s public key to encrypt amessage.

Sender (Joan)

message tobe sent

public key

encryptedmessage

Step 3: Receiver uses his or her private key to decrypt themessage.

Sender (Joan)

message tobe sent

public key private key

encryptedmessage

Step 4: Receiver can read or print the decrypted message.

Sender (Joan)

Receiver (Doug)

message tobe sent

decrypted message

public key private key

encryptedmessage

Computer Security:Risks and Safeguards

How does public key encryption work?

p.12.17 Fig. 12-20

Next

C t S it

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 34/62

Computer Security:Risks and Safeguards

• Prolongedmalfunction of computer

• Can cause loss of hardware,software, data, or information

p.12.18

Next

aging hardware

natural disasterssuch as fires,

floods, or storms

random events suchas electrical power

problems

What is a system failure ?

C t S it

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 35/62

Computer Security:Risks and Safeguards

What is a surge protector ?• Smoothes out minor noise,

provides stable current flow, andkeeps overvoltage from reaching

computer • Amount of protection

proportional to itscost

• Also calledsurge suppressor

p.12.18 Fig. 12-21

Next

C t S it

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 36/62

Computer Security:Risks and Safeguards

What is an uninterruptible power supply(UPS) ?

• Surge protector and

battery that can providepower during temporaryloss of power

p.12.19 Fig. 12-22

Next

C t S it

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 37/62

Computer Security:Risks and Safeguards

How do the types of backup compare?

p.12.20 Fig. 12-23

Next

Comp ter Sec rit :

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 38/62

Computer Security:Risks and Safeguards

What are backup procedures ?• Specify regular

plan of copyingand storing

important dataand program files

p.12.20 Fig. 12-24

Next

Computer Security:

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 39/62

ChildMost recent copy of file

Computer Security:Risks and Safeguards

What is a three-generation backup policy ?

p.12.21

Next

ParentSecond oldest copy of file

GrandparentOldest copy of file

Computer Security:

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 40/62

Computer Security:Risks and Safeguards

What is a disaster recovery plan ?• Written plandescribing stepscompany would taketo restore computer operations in event of a disaster

• Contains four major components

p.12.21

Next

Emergency plan

Backup plan

Recovery plan

Test plan

Computer Security:

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 41/62

Computer Security:Risks and Safeguards

What services can help with security plans?• International

Computer SecurityAssociation(ICSA) can assistcompanies andindividuals whoneed help with

computer securityplans

p.12.22 Fig. 12-25

Next

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 42/62

Internet and NetworkSecurity

How do Web browsers provide secure datatransmission?• Many Web browsers

use encryption• Web site that uses

encryption techniquesto secure its data isknown as secure site – Use digital certificates

withsecurity protocol

p.12.23

Next

Digital

certificateNotice that

guarantees user or Web site is

legitimateAlso called public-

key certificate

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 43/62

Internet and NetworkSecurity

What is Secure Sockets Layer (SSL) ?• Provides

private-keyencryption of

all data thatpassesbetweenclient and

server

p.12.24 Fig. 12-27

Next

https indicates secure connection

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 44/62

Internet and NetworkSecurity

What is Pretty Good Privacy (PGP) ?• One of most popular e-mail digital encryption

programs• Freeware for personal, non-commercial users

• Uses public-key encryption scheme

p.12.24

Next

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 45/62

Internet and NetworkSecurity

What is a digital signature ?• Encrypted code that person, Web site, or

company attaches to electronic message toverify identity of message sender

– Code usually consists of user's name and hash of all or part of message

p.12.24

Next

HashMathematical formula that

generates code from contentsof message

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 46/62

Internet and NetworkSecurity

What is a personal firewall ?• Software program that detects and protects personal

computer and its data fromunauthorizedintrusions

• Constantlymonitors alltransmissions toand fromcomputer

• Informs you of anyattempted intrusions

p.12.25 Fig. 12-29

Next

Internet and Network

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 47/62

Online securityservice

Web site that evaluatescomputer to check for

Web and e-mailvulnerabilities

Internet and NetworkSecurity

What is another way to protect your personalcomputer?• Disable File and Print

Sharing on Internet

connection

p.12.26 Fig. 12-30

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 48/62

Should employersmonitor your

computer usageand e-mail

messages?

Is data aboutan individual

really private?

Information Privacy

What is information privacy ?• Right of individuals and

companies to deny or restrict collection and useof information about them

• More difficult to maintaintoday because hugedatabases store this datain online databases

p.12.26

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 49/62

Information PrivacyWhat are ways to safeguard personalinformation?

p.12.27 Fig. 12-31

Next

(continued)

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 50/62

Information PrivacyWhat are ways to safeguard personalinformation (continued)?

p.12.27 Fig. 12-31

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 51/62

Information Privacy

What is an electronic profile ?

p.12.27

Next

Data collected every

time you fill outform or click

advertisement onWeb Merchants sell the

contents of their

databases tonational marketingfirms and Internetadvertising firms

Data combined

with informationfrom public

sourcesMerchants sell

contents of their

databases tonational marketingfirms and Internetadvertising firms

Marketing firmssell your

electronic profileto any companythat requests it

Information Privacy

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 52/62

Track user preferences

Information Privacy

What is a cookie ?• Small file that Web server

stores on your computer • Typically contains data

about you• Web site can read data only

from its own cookie file• Some Web sites sell or

trade information stored inyour cookie to advertisers

p.12.28

Next

Track how regularlyyou visit site and Webpages you visit when

at site

Targetadvertisements toyour interests and

browsing habits

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 53/62

Information PrivacyHow can cookies track user preferences?

p.12.29 Fig. 12-33

Next

Personal information youenter in form is convertedto codes, which are stored

in cookie on your harddisk

Cookie for MSNBC saved in

Cookies folder onhard disk

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 54/62

Information Privacy

How can you set your browser to controlcookies?• Set browser to accept

cookies automatically,or prompt you if youwish to accept cookie,or disable cookie use

• Many Web sites do notallow you to access

features if you disablecookie use

p.12.30 Fig. 12-34

Next

slider sets cookie control

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 55/62

Information Privacy

What is a cookie manager ?• Software program that selectively blocks cookies

p.12.30 Fig. 12-35

Next

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 56/62

Information Privacy

What is spyware ?

• Program placed oncomputer without user'sknowledge

• Secretly collectsinformation about user

• Can enter computer as

virus or as a result of installing new program

p.12.30

Next

AdwareSpyware used by

Internet advertisingfirms to collect

information about user’sWeb browsing habits

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 57/62

Anti-spamprogram

Attempts to remove spam

Sometimes removes valide-mail messages

Information Privacy

p.12.31

Next

E-mail filteringService that blocks e-mail

messages from designatedsources

Collects spam in centrallocation that you can view

any time

How can you control spam ?

f

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 58/62

Computer AbuseAmendments Law

Outlaws viruses

Information Privacy

What privacy laws have been enacted?

• Many federal and state laws regarding storage anddisclosure of personal data, such as:

Next

p.12.32

Child OnlineProtection Law

Penalizes those whodistribute materialdeemed harmful to

children

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 59/62

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 60/62

I f i P i

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 61/62

Information Privacy

What is filteringsoftware ?• Can restrict access

to specified Web

sites• Some filter sites use

specific words• Others filter e-mail

messages and chatrooms

p.12.35

Next

Summary of

8/14/2019 Chap 12 Presentation:INTRO I.T

http://slidepdf.com/reader/full/chap-12-presentationintro-it 62/62

yComputers andSociety: Security andPrivacy

• Computer security: risks and safeguards• How viruses work and how to prevent

them• Internet and network security• Information privacy

Chapter 12 Complete