15
ADM 316 Computers and Information Processing Workshop 5

ADM 316 Workshop 5 Slides

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: ADM 316 Workshop 5 Slides

ADM 316Computers and Information Processing

Workshop 5

Page 2: ADM 316 Workshop 5 Slides

Devotion / Prayer

Page 3: ADM 316 Workshop 5 Slides

Chapter 10

Computer Security and Risks

Page 4: ADM 316 Workshop 5 Slides

A computer is a tool.

Page 5: ADM 316 Workshop 5 Slides

Computer Crime

Computer crime is any crime accomplished through knowledge or use of computer technology.

Most computer crimes are committed by company insiders and are typically covered up or not reported to authorities to avoid embarrassment.

Page 6: ADM 316 Workshop 5 Slides

Computer Crime

Page 7: ADM 316 Workshop 5 Slides

Computers are used to steal:

Money Goods Information Computer resources

Page 8: ADM 316 Workshop 5 Slides

Online Fraud

The use of deception to get individuals to reveal sensitive information (social engineering)Online auctionsSweepstakes / bank scamsPhishing / spoofing

Page 9: ADM 316 Workshop 5 Slides

Protecting Yourself from Identity Theft Make all your online purchases using a separate

credit card with a low credit limit for your online transactions.

Make sure a secure, encrypted Web site is managing your transaction.

Don’t disclose personal information over the phone.

Shred sensitive information.

Page 10: ADM 316 Workshop 5 Slides

Malware

Virus: spreads by making copies of itself from program to program or disk to disk, requires user intervention to spread

Trojan horse: performs a useful task while also being secretly destructive (Michaelangelo)

Worm: program that travels independently over computer networks, seeking uninfected sites (ILOVEYOU, Anna, Blaster, Sobig.F, MyDoom)

Page 11: ADM 316 Workshop 5 Slides

Effects of Malware

Proliferation through address lists Modification or removal of startup files Modification or removal of data or

application files Generation of denial-of-service attacks

Page 12: ADM 316 Workshop 5 Slides

Spyware

Collects information from computer users (such as keystrokes, screenshots, history) without their knowledge or consent

Other names: adware, crapware, spybots Sometimes from legitimate sources

(Microsoft reporting, software updates, manufacturer sales pitches)

Page 13: ADM 316 Workshop 5 Slides

Effects of Spyware

Unwanted advertising Unwanted toolbars Unwanted pop-ups Unwanted browser changes (home page,

favorites) Unwanted interruptions Unwanted redirections Drains CPU usage / performance

Page 14: ADM 316 Workshop 5 Slides

Effects of Malware

Page 15: ADM 316 Workshop 5 Slides

Reducing Risks

Restrict physical access (keys, biometrics, special facilities)

Restrict logical access (passwords, CAPTCHA, user accounts)

Fortify the architecture (firewalls, encryption, UPS)

Maintain “clean” facilities (anti-virus software, auditing)