Computer security b

Preview:

Citation preview

Computer Security

Part 1 of 2Small book by Shelly

Cashman that came with text.

Gerald Martin hacked into the system of a company that competed with his. – NY Times

Anonymous “A Leaderless Hacker Group”

Figure 10-1, pg. 382

Internet and Network AttacksVirus Worm Trojan Rootkit

Infects, negatively altering the way computer works

Copies itself repeatedly, using up resources

Needs certain condition to trigger, does not replicate

Allows person to take over your computer from remote location.

Figure 10-2 from pg. 385

Tro-jan Pro-

grams;

3.90%

Viruses;

7.00%

Network Worms; 89.10%

Malicious Program Types

http://www.securelist.com/en/analysis/151436695/Virus_Review_2002

Porta-ble Media; 1.30%

In-ternet; 2.30%

Email; 93.40%

Main Virus Threat

Safeguards against computer viruses and other malware

Figure 10-5 from pg. 388 of your book

Safeguards

Hardware Theft and Vandalism

Software Theft

• End-User License Agreement (EULA)

Information Theft (Encryption)

Information Theft (Digital Signature)

System Failure

Uninterruptible Power Supply (UPS)

Backing Up – The Ultimate Safeguard

Wireless Security

Wireless Access Point (WAP)

802.11i network

Health Concerns: Repetitive Strain Injury

Health Concerns: Computer Vision Syndrome

Ethics and Society: Information Accuracy

• National Press Photographers Association

Ethics and Society: Intellectual Property Rights

Ethics and Society: Green Computing

Information Privacy: Electronic Profiles

Information Privacy:

Cookies

Look in your book, pg. 404, at figure 10-22 about “How Cookies Work”

Information Privacy: Spyware and Adware

Information

Privacy: Spam

Information Privacy: Phishing

Information Privacy: Social Engineering

Privacy Laws: Employee Monitoring

Privacy Laws: Content Filtering

• Complete both worksheets by Monday beginning of class.

• Complete take home test by Monday beginning of class.

Assignment

Recommended