chap 12 presentation:intro i.t
TRANSCRIPT
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 1/62
Chapter 12Computers and Society:
Security and Privacy
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 2/62
Identify the various types of
security risks that can threatencomputers
Describe ways to safeguarda computer
Recognize how a computer virus works and take the
necessary steps to prevent
viruses
Understand how to createa good password
Identify various biometricdevices
Recognize that software piracyis illegal
Explain why encryption isnecessary
Determine why computer backup is important and how it
is accomplished
Discuss the steps in a disaster recovery plan
Understand ways to secure anInternet transaction
List ways to protect your personal information
Chapter 12 Objectives
Next
p. 12.2
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 3/62
CybercrimeOnline or Internet-
based illegal acts
Computer Security:Risks and Safeguards
What is a computer security risk ?
p.12.2
Next
Computer crimeAny illegal act involving
a computer
Event or actionthat causes loss
of or damage to acomputer system
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 4/62
Computer Security:Risks and Safeguards
What is a computer virus ?• Potentially damaging
program that affectscomputer negatively byaltering way computer works
• Segment of programcode from some outsidesource that implantsitself in computer
p.12.2
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 5/62
Computer Security:Risks and Safeguards
What are the ways viruses can be activated?
• Opening infectedfile
• Running infectedprogram
• Booting computer with infected floppydisk in disk drive
p.12.2
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 6/62
Computer Security:Risks and Safeguards
What is the source of a virus?• Written by
programmer – Some write viruses
as challenge – Others write viruses
to cause destructionor to slow Internet
p.12.2
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 7/62
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 8/62
Boot sector virus• Resides in boot sector of
floppy disk or master boot
record of hard disk
Computer Security:Risks and Safeguards
What are the three main types of virus?
p.12.4
Next
File virus• Attaches itself to
program files Macro virus• When you open
document thatcontains infectedmacro, virus loadsinto memory
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 9/62
Computer Security:Risks and Safeguards
How do viruses activate?
p.12.4
Next
Logic bomb
Virus that activates when itdetects certain condition
Time bomb
Type of logic bomb thatactivates on particular date
MalwareMalicious-logic program
Worm and Trojan Horse
Acts without user’s knowledgeand alters computer’s operations
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 10/62
Computer Security:Risks and Safeguards
How can you protect your system from amacro virus?
• Set macro’s securitylevel in all applicationsthat allow you to writemacros
• At medium securitylevel, warning displayswhen you attempt toopen document thatcontains macro
p.12.5 Fig. 12-3
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 11/62
Computer Security:Risks and Safeguards
What does an antivirus program do?
• Detects and identifies
viruses• Inoculates existing
program files• Removes or quarantines
viruses• Creates rescue disk
p.12.6
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 12/62
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 13/62
Computer Security:Risks and Safeguards
How does an antivirus program inoculate aprogram file?• Antivirus program
records
file size and creationdateand uses thisinformation to detect if
a virus tamperswith inoculatedprogram file
p.12.6
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 14/62
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 15/62
Computer Security:Risks and Safeguards
What does an antivirus program do once itdetects a virus?
p.12.6
Next
• Removes virus if possible
• Quarantines infectedfile in folder on hard
disk
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 16/62
Computer Security:Risks and Safeguards
What is a rescue disk ?• Removable disk that
contains uninfected copy of key operating systemcommands and startupinformation
• Upon startup, rescue diskfinds and removes bootsector virus
p.12.6
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 17/62
Computer Security:Risks and Safeguards
What should you do if a virus infects your system?• Remove virus• If you share data
with other users,then immediatelyinform them of virusinfection
p.12.6
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 18/62
Computer Security:Risks and Safeguards
How can you stay informed about viruses?• Several Web sites
publish list of virusalerts and virushoaxes
p.12.7 Fig. 12-6
Next
Virus hoaxE-mail message
that warns you of non-existent virus
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 19/62
Computer Security:Risks and Safeguards
• Use of computer or network withoutpermission
p.12.7
Next
Cracker
Someone whotries to access acomputer or
network illegally
Hacker Once used as a
complimentary word for acomputer enthusiast
Now another word
for cracker
What is unauthorized access ?
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 20/62
Computer Security:Risks and Safeguards
p.12.8
Next
User names and
passwords
Possessedobjects
(badge or card)
Biometricdevices
Callbacksystems
(computer calls back)
How can unauthorized access and use beprevented?
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 21/62
Computer Security:Risks and Safeguards
How can you make your password more secure?• Longer passwords provide greater security
p.12.9Fig. 12-9
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 22/62
Computer Security:Risks and Safeguards
How should you select a user name andpassword?• Avoid obvious
passwords, such as your
initials or birthday• Select password that is
easy for you toremember
p.12.9
Next
IAWL0901IAWL0901First letter of each word inyour favoritemovie, It’s a
Wonderful Life
September 1is your
anniversary
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 23/62
Computer Security:Risks and Safeguards
What is a biometric device ?• Translates person’s
characteristics intodigital code that iscompared to digital codestored in computer
p.12.10
Next
Biometricidentifier
• Fingerprints
• Hand geometry
• Facial features
• Voice
• Signatures
• Retinal (eye) patterns
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 24/62
Computer Security:Risks and Safeguards
What is a fingerprint scanner ?• Captures curves and
indentations of afingerprint
p.12.11 Fig. 12-11
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 25/62
Computer Security:Risks and Safeguards
What is a hand geometry system ?
• Measures shape andsize of person’shand
• Typically used astime and attendancedevice by large
companies
p.12.11 Fig. 12-12
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 26/62
Computer Security:Risks and Safeguards
What is a face recognition system ?• Captures face image
and compares it to
stored image to see if person is legitimateuser
• Can recognize peoplewith or withoutglasses, makeup, or
jewelry, and with newhairstyles
p.12.11 Fig. 12-13
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 27/62
Computer Security:Risks and Safeguards
What is an iris verification system ?• Reads patterns in tiny
blood vessels in backof eye
p.12.12 Fig. 12-14
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 28/62
Computer Security:Risks and Safeguards
What is an audit trail ?• Records in file both
successful andunsuccessful accessattempts
p.12.13
Next
Companies shoulddocument and explain to
employees policiesregarding use of
computers byemployees for personal
reasons
C S i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 29/62
When youpurchase
software, you donot own the
software;instead, you
become alicensed user
Computer Security:Risks and Safeguards
What is software theft ?• Can range from someone
stealing media thatcontains software tointentional piracy of software
• Software piracy isunauthorized and illegalduplication of copyrightedsoftware
p.12.14
Next
C S i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 30/62
Network Site LicenseAllows network users to share single
copy of software that resides on
network server
Computer Security:Risks and Safeguards
Single-User License vs Site License
p.12.14
Next
Single-User License• Install software on one computer
• Sell software to someone, but onlyafter removing software fromcomputer first
C S i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 31/62
Computer Security:Risks and Safeguards
What is encryption ?• Process of converting
readable data intounreadable characters
to prevent unauthorizedaccess• Used to transmit files
over Internet
p.12.16
Next
PlaintextUnencrypted, readable data
CiphertextThe encrypted (scrambled) data
encryption software
PlaintextUnencrypted, readable data
encryption key
C S i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 32/62
Computer Security:Risks and Safeguards
What are some data encryption methods?• Encryption key (formula) often uses more than one
of these methods
p.12.16 Fig. 12-18
Next
C S i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 33/62
Step 1: Sender creates document to be e-mailed to receiver.
Sender (Joan)
message tobe sent
Step 2: Sender uses receiver’s public key to encrypt amessage.
Sender (Joan)
message tobe sent
public key
encryptedmessage
Step 3: Receiver uses his or her private key to decrypt themessage.
Sender (Joan)
message tobe sent
public key private key
encryptedmessage
Step 4: Receiver can read or print the decrypted message.
Sender (Joan)
Receiver (Doug)
message tobe sent
decrypted message
public key private key
encryptedmessage
Computer Security:Risks and Safeguards
How does public key encryption work?
p.12.17 Fig. 12-20
Next
C t S it
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 34/62
Computer Security:Risks and Safeguards
• Prolongedmalfunction of computer
• Can cause loss of hardware,software, data, or information
p.12.18
Next
aging hardware
natural disasterssuch as fires,
floods, or storms
random events suchas electrical power
problems
What is a system failure ?
C t S it
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 35/62
Computer Security:Risks and Safeguards
What is a surge protector ?• Smoothes out minor noise,
provides stable current flow, andkeeps overvoltage from reaching
computer • Amount of protection
proportional to itscost
• Also calledsurge suppressor
p.12.18 Fig. 12-21
Next
C t S it
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 36/62
Computer Security:Risks and Safeguards
What is an uninterruptible power supply(UPS) ?
• Surge protector and
battery that can providepower during temporaryloss of power
p.12.19 Fig. 12-22
Next
C t S it
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 37/62
Computer Security:Risks and Safeguards
How do the types of backup compare?
p.12.20 Fig. 12-23
Next
Comp ter Sec rit :
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 38/62
Computer Security:Risks and Safeguards
What are backup procedures ?• Specify regular
plan of copyingand storing
important dataand program files
p.12.20 Fig. 12-24
Next
Computer Security:
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 39/62
ChildMost recent copy of file
Computer Security:Risks and Safeguards
What is a three-generation backup policy ?
p.12.21
Next
ParentSecond oldest copy of file
GrandparentOldest copy of file
Computer Security:
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 40/62
Computer Security:Risks and Safeguards
What is a disaster recovery plan ?• Written plandescribing stepscompany would taketo restore computer operations in event of a disaster
• Contains four major components
p.12.21
Next
Emergency plan
Backup plan
Recovery plan
Test plan
Computer Security:
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 41/62
Computer Security:Risks and Safeguards
What services can help with security plans?• International
Computer SecurityAssociation(ICSA) can assistcompanies andindividuals whoneed help with
computer securityplans
p.12.22 Fig. 12-25
Next
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 42/62
Internet and NetworkSecurity
How do Web browsers provide secure datatransmission?• Many Web browsers
use encryption• Web site that uses
encryption techniquesto secure its data isknown as secure site – Use digital certificates
withsecurity protocol
p.12.23
Next
Digital
certificateNotice that
guarantees user or Web site is
legitimateAlso called public-
key certificate
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 43/62
Internet and NetworkSecurity
What is Secure Sockets Layer (SSL) ?• Provides
private-keyencryption of
all data thatpassesbetweenclient and
server
p.12.24 Fig. 12-27
Next
https indicates secure connection
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 44/62
Internet and NetworkSecurity
What is Pretty Good Privacy (PGP) ?• One of most popular e-mail digital encryption
programs• Freeware for personal, non-commercial users
• Uses public-key encryption scheme
p.12.24
Next
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 45/62
Internet and NetworkSecurity
What is a digital signature ?• Encrypted code that person, Web site, or
company attaches to electronic message toverify identity of message sender
– Code usually consists of user's name and hash of all or part of message
p.12.24
Next
HashMathematical formula that
generates code from contentsof message
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 46/62
Internet and NetworkSecurity
What is a personal firewall ?• Software program that detects and protects personal
computer and its data fromunauthorizedintrusions
• Constantlymonitors alltransmissions toand fromcomputer
• Informs you of anyattempted intrusions
p.12.25 Fig. 12-29
Next
Internet and Network
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 47/62
Online securityservice
Web site that evaluatescomputer to check for
Web and e-mailvulnerabilities
Internet and NetworkSecurity
What is another way to protect your personalcomputer?• Disable File and Print
Sharing on Internet
connection
p.12.26 Fig. 12-30
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 48/62
Should employersmonitor your
computer usageand e-mail
messages?
Is data aboutan individual
really private?
Information Privacy
What is information privacy ?• Right of individuals and
companies to deny or restrict collection and useof information about them
• More difficult to maintaintoday because hugedatabases store this datain online databases
p.12.26
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 49/62
Information PrivacyWhat are ways to safeguard personalinformation?
p.12.27 Fig. 12-31
Next
(continued)
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 50/62
Information PrivacyWhat are ways to safeguard personalinformation (continued)?
p.12.27 Fig. 12-31
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 51/62
Information Privacy
What is an electronic profile ?
p.12.27
Next
Data collected every
time you fill outform or click
advertisement onWeb Merchants sell the
contents of their
databases tonational marketingfirms and Internetadvertising firms
Data combined
with informationfrom public
sourcesMerchants sell
contents of their
databases tonational marketingfirms and Internetadvertising firms
Marketing firmssell your
electronic profileto any companythat requests it
Information Privacy
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 52/62
Track user preferences
Information Privacy
What is a cookie ?• Small file that Web server
stores on your computer • Typically contains data
about you• Web site can read data only
from its own cookie file• Some Web sites sell or
trade information stored inyour cookie to advertisers
p.12.28
Next
Track how regularlyyou visit site and Webpages you visit when
at site
Targetadvertisements toyour interests and
browsing habits
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 53/62
Information PrivacyHow can cookies track user preferences?
p.12.29 Fig. 12-33
Next
Personal information youenter in form is convertedto codes, which are stored
in cookie on your harddisk
Cookie for MSNBC saved in
Cookies folder onhard disk
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 54/62
Information Privacy
How can you set your browser to controlcookies?• Set browser to accept
cookies automatically,or prompt you if youwish to accept cookie,or disable cookie use
• Many Web sites do notallow you to access
features if you disablecookie use
p.12.30 Fig. 12-34
Next
slider sets cookie control
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 55/62
Information Privacy
What is a cookie manager ?• Software program that selectively blocks cookies
p.12.30 Fig. 12-35
Next
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 56/62
Information Privacy
What is spyware ?
• Program placed oncomputer without user'sknowledge
• Secretly collectsinformation about user
• Can enter computer as
virus or as a result of installing new program
p.12.30
Next
AdwareSpyware used by
Internet advertisingfirms to collect
information about user’sWeb browsing habits
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 57/62
Anti-spamprogram
Attempts to remove spam
Sometimes removes valide-mail messages
Information Privacy
p.12.31
Next
E-mail filteringService that blocks e-mail
messages from designatedsources
Collects spam in centrallocation that you can view
any time
How can you control spam ?
f
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 58/62
Computer AbuseAmendments Law
Outlaws viruses
Information Privacy
What privacy laws have been enacted?
• Many federal and state laws regarding storage anddisclosure of personal data, such as:
Next
p.12.32
Child OnlineProtection Law
Penalizes those whodistribute materialdeemed harmful to
children
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 59/62
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 60/62
I f i P i
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 61/62
Information Privacy
What is filteringsoftware ?• Can restrict access
to specified Web
sites• Some filter sites use
specific words• Others filter e-mail
messages and chatrooms
p.12.35
Next
Summary of
8/14/2019 Chap 12 Presentation:INTRO I.T
http://slidepdf.com/reader/full/chap-12-presentationintro-it 62/62
yComputers andSociety: Security andPrivacy
• Computer security: risks and safeguards• How viruses work and how to prevent
them• Internet and network security• Information privacy
Chapter 12 Complete