0 ratings0% found this document useful (0 votes) 40 views38 pagesIntro To Computing
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Discovering Computers
Technology in a World of Computers,
Mobile Devices, and the Internet
ine
AyD
Chapter 5
Digital Safety
and SecurityInternet and Network Attacks
——
* Abotnet is a group of compromised computers or mobile devices
connected to a network
— Acompromised computer or device is known as a zombie
* Adenial of service attack (DoS attack) disrupts computer access to
Internet services
— Distributed DoS (DDoS)
* Aback door is a program or set of instructions in a program that
allow users to bypass security controls
* Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimateInternet and Network Attacks
* A firewall is hardware and/or software that
protects a network’s resources from intrusion
Pages 208 - 209
Fgures.aUnauthorized Access and Use
ee
Unauthorized access is
the use of a computer or
Unauthorized use is the
use of a computer or its
network without
permission
data for unapproved or
Flees] NAIC Lee i)
Page 230 Copyright © Cengage Learning
= aUnauthorized Access and Use
———————
* Organizations take
several measures to
help prevent
unauthorized access
and use
— Acceptable use policy
— Disable file and printer
sharing
Page 210
Biases Copyright © Cengage Learning Alrights reserve.Unauthorized Access and Use
———
* Access controls define who can access a computer,
device, or network; when they can access it; and
what actions they can take while accessing it
* The computer, device, or network should maintain an
audit trail that records in a file both successful and
unsuccessful access attempts
— User name citi
— Password a a
— Passphrase Pesowore =— —
— CAPTCHA lal
Pages 213-212 Copyright © Cengage Learirg. Alright reserved
Figure 5-6Unauthorized Access and Use
———————
* Apossessed object is any * Abiometric device
item that you must carry to authenticates a person’s
gain access to a computer identity by translating a
or computer facility personal characteristic into
— Often are used in a digital code that is
combination with a PIN compared with a digital
(personal identification code in a computer
number)
a Copyright® Cengage Learirg, Alright eservedUnauthorized Access and Use
—
izle}
ix-leroy-4ar idol a)
system
Fingerprint
ire lg
Hand Voice
F4fol alin Nila s(e 8)
Eda) system
Starla lacs ik
verification recognition
system NS (laa)
Popes 213-234 (Copyright © Cengage Learning. All rights reserves.
Figures 5-85-10Unauthorized Access and Use
—
* Digital forensics is the discovery, collection, and
analysis of evidence found on computers and
networks
* Many areas use digital forensics
re orm) WEG
Pieces peeled intelligence
N iN NSN
Tm tel
Eoetiog
Ca
Sc
Eula
NS
Page 214 ‘Copyright © Cengage Learirg. Alright reserved.Software Theft
——
* Software theft occurs when someone:
Steals software Intentionally
Titel] erases programs
efecto kd 6
and/or activates
Illegally copies a
a program Dee ken
Page 235 Copyright © Cengoge Learning Al rights reservedSoftware Theft
————
* Many manufacturers incorporate an activation
process into their programs to ensure the
software is not installed on more computers than
legally licensed
During the product activation, which is conducted
either online or by phone, users provide the
software product’s identification number to
associate the software with the computer or
mobile device on which the software is installed
Page 235 Copyright © Cengoge Learning Al rights reserve, |Software Theft
———
* Asingle-user license agreement typically contains the
following conditions:
‘Typical Conditions of a Single-User License Agreement
Youcan
«Install the softvare on ony one computer. (Sore license agreements
allow uses to install the software on one desktop and one laptop)
‘+ Make one copy ofthe software 252 Backup.
* Give o el the software to another individual, but onl if the software
Is removed from the user's computer fist.
You cannot
«Install the software on a network, such as a school computer lab.
* Give copes to fiends and colleagues, while continuing to use the software
« Export the software
‘ Rent o lease the software,
Pages 215-216 Copyright © Cengage Learning. Al rights reserved
Figure 13‘ormation Theft
* Information theft occurs when someone steals
personal or confidential information
* Encryption is a process of converting data that is
readable by humans into encoded characters to
prevent unauthorized access
‘Name Plaintext —Ciphertext Explanation
Tianspestion Switch the order of characters SOFTWARE ——_OSTEAWER Acjcent characters swapoed
Substitution Replace character with other INFORMATION WLOIDXQUL Each ete eplaced wth another
characes
Cepanson Insert characters between existing USER ysvever Leer nseted ae each characte
sharaces
Compaction Remove characters and sore pcTATON ——ACITIN ery thir lee removed (8, 0)
Pages 216-217
AOA re, nl‘An Example of Public Key Encryption
step steps
TWesene cate emer ‘fe eer cise et
‘wbeemsles oe cver eect nesae
‘080%
sours
ace
Copyright © Cengage Learning. Al rights reserved.Information Theft
———————
* A digital signature is an encrypted code that a
person, website, or organization attaches to an
electronic message to verify the identity of the
sender
— Often used to ensure that an impostor is not participating
in an Internet transaction
* Adigital certificate is a notice that guarantees a user
or a website is legitimate
* Awebsite that uses encryption techniques to secure
its data is known as a secure sitetion Theft
rr ———
Page 218
Figure S:13
ty woe. amazon.com gj buy/shipaddvess MG
Choose your shipping options
Shipping Details: DBROTH (2m mor)
Choose a 9 speed:
@ Standard (3-5 business days)
© Two-Day Shipping (2 business days)
Capytight © Cengage Learning Al ight reservedHardware Theft, Vandalism, and Failure
——
. Hardware vandalism
Hardware theft is : :
. is the act of defacing
the act of stealing . a
on or destroying digital
digital equipment .
equipmentHardware Theft, Vandalism, and Failure
—
* To help reduce the of chances of theft, companies
and schools use a variety of security measures
Hardware Theft and Vandalism Safeguards
‘Physical access controls (ie, locked doors and windows)
‘© Alarm system
+ Physical security devices (.e, cables and locks)
+ Device-tracking app
Hordware Failure Safeguards
* Surge protector
* Uninterruptible power supply (UPS
‘© Duplicate components or duplicate computers
‘* Fault-tolerant computer
Page 218 Copyright © Cengage Learning. Allright reserved
FewestUp — The Ultimate Safeguard
————
* Abackup is a duplicate of a file, program, or
media that can be used if the original is lost,
damaged, or destroyed
—To back up a file means to make a copy of it
* Off-site backups are stored ina location separate
from the computer or mobile device site
(olor Te)
StorageUltimate Safeguard
* Three-generation
backup policy
=
=
Continuous data
protection
ae uLO ae
Type of
Backup Description ‘Advantages Disadvantages
Full backup Copies al ofthe files on media in__Fastestecvery method. lf Longest backup time.
the computer ae saved
Diferennal Copies oly he fles that have fast bach method. Requires Recovers time-consuming becuse the
backup changed since the est ull backup minimal storage space to backup. ls fll backp pus he ferential backup
are needed.
Incremental Copies oly he iles hat have ‘Fastest backup metho. Requires Recovers mos ire conuingbease the
backup changed sce the at ul or minima troge space to backup. ful bakp anda incerta aus
incemental badap Only mest ecent changes saved. sce he stl bap ae reeded
Selective backup Users choose which fiers and files Fast backup method. Provides Dif o manage inva le backups.
19 indude i a backp eat xb. Least manageable ofall the backup ethos.
Continuous dota Al data is backed up whenever a The only rea-tme backup. Very Ver expensive and requires @ great ount
protection (COP) change is made fast recovery of data of strane.
———— HWireless Security
* Wireless access poses
additional security risks
* Some intruders intercept
and monitor
communications as they
transmit through the air
* Others connect toa
network through an
unsecured wireless access
point (WAP) or
combination router/WAPEthics and Society
—————
* Computer ethics are
the moral guidelines
that govern the use of
computers, mobile
devices, and
information systems
* Information accuracy is
a concern
— Not all information on
the web is correctEthics and Society
———————
* Intellectual property refers to unique and original
works such as ideas, inventions, art, writings,
processes, company and product names, and logos
* Intellectual property rights are the rights to which
creators are entitled to their work
* Acopyright protects any tangible form of expression
* Digital rights management (DRM) is a strategy
designed to prevent illegal distribution of movies,
music, and other digital contentine whether a specification is
/unethical or allowed/not allowed
‘Sample I¥ Code of Conduct
| Tecnology may not be ued to harm ote people
2 Employes may ot mee in bres ies.
3. Emplyeesmay se chao ony for purses ia ich theyhave been athe
4 Tecnology may nt be used a tal.
5, Teeologymay not be sed to bear fe wines
6 Employees may ot copy owe softwere iMepaly
7. Employes may not use ches technology resouces without authorzatin
8 Employers may not use ates imlecual proper) aster own
9 Employes shal conser thesoal inact of progr and systems they dean.
10. Employes alas should se eran ay that demonstrates
cons deratin and respect fr flew Puan
Copyright © Cengoge Learning. Al rents reserved.
conduct is a written guideline that helpsEthics and Society
————
* Green computing involves reducing the electricity
and environmental waste while using computers,
mobile devices, and related technologies
Green Competing Tipe
1. Conserve Energy x
a: Use computes ad devices that comply with
the ENERGY STAR program,
». Do not leave a compute or device running overnight.
Tum ofthe mantr, printer, and other devies when not in use.
2. Reduce Environmental Waste
2. Use paperless methods to communicate. wr
ferencng and ValP for meetings
ps2 caer ||
Figure 5-20Information Privacy
———
¢ Information privacy refers to the right of
individuals and companies to deny or restrict the
collection and use of information about them
* Huge databases store data online
* It is important to safeguard your information1 ry resort on exe, nay,
ad epson os.
2. Dom prey phone rumba Sea
Seay rn oy pss es
2. Haan ed reps ore are.
{yuna att hawt Boe yur nae fom 9309
erences on
5. e aie jo phe nae on area est cee
6 Aakers to wt decd unt phone rub Sd
‘Seay rane’ ar res kes ante te bol our
pasa oes
1 Paras goat th ash ae an re oes.
8. cd secig db and bert
9. mers tpn queso eu my nat tno bee
‘essa te rtmsin
(Copyright © Cengage Learning. AI rights reserved.
10-Hlom ema you oo nat fen be os pes
oman
1 Ress n mina, brennan is.
12. Oana est eat ana etm eh a ether ct
‘epg oem gut byron ae asin ade a 08
13. Ret ey you medial mcs ne trom te ia
iomesrties!
14. nee anew amon you onde owes crea
Shaneon
‘Scena ip aa
16 Cee er ose Fie boars
17 Setup eel aan Ue hina aes br recht om,
18 To en stain nyt ere recon
19. penal eva
2. gp eat Sng go Pe aga pM
21, Det spa rayon,
2 Sutnewe rrp trough an anna wee‘Copyright © Cengage Leorning Allright reserved.Information Privacy
————
* Acookie is a small text file that a web server stores on
your computer
* Websites use cookies for a variety of reasons:
Store user Saal
names and/or online
passwords shopping
Allow for
personalization
Bic lonantey yy
folie) Vets
advertisements
WS eS
Page 228 Copyright © Cengoge Learning Alright reserved,step ion
When you ener the adress fa west ina brows,
the brome trees your ard dk ora coke
esacited wih the wedi nw omahasteaks com’ 9)
Step3
the net dows not cv cookie ivomation
and sexpecg it, the webste creates an ideriation
bet fo you nits database and sends that ruber
step2 okie information to our brome The omer nun ats» cote
Herons coke, flbacad on at nmbe ad oe cae on
it sed inate he
coke feo the webs enero.
rr omahaseks com
= a BH
ur hard dk The weiter can pate norton
inthe coke Fie whenever you ces the websiteInformation Privacy
VW—
* Phishing is a scam in which a perpetrator sends an
official looking email message that attempts to
obtain your personal and/or financial information
* With clickjacking, an object that can be clicked on
a website contains a malicious programInformation Privacy
——$s
* Spyware is a program placed on a computer or
mobile device without the user’s knowledge that
secretly collects information about the user and
then communicates the information it collects to
some outside source while the user is online
* Adware is a program that displays an online
advertisement in a banner or pop-up window on
webpages, email messages, or other Internet
servicesInformation Privacy
—————
* Social engineering is defined as gaining
unauthorized access to or obtaining confidential
information by taking advantage of the trusting
human nature of some victims and the naivety of
othersInformation Privacy
—————————
* The concern about privacy has led to the
enactment of federal and state laws regarding the
storage and disclosure of personal data
— See Table 5-4 on page 233 for a listing of major U.S.
government laws concerning privacyEmployee monitoring involves the use of computers, mobile
devices, or cameras to observe, record, and review an
employee’s use of a technology, including communications such
as email messages, keyboard activity (used to measure
productivity), and websites visited
Many programs exist that easily allow employers to monitor
employees. Further, it is legal for employers to use these
programs
Ser. Hestricts access to
ified websites
Copyright © Cengage Learning. Al rights reserves.Summary
Page 235
Cee eee)
ith Internet and network
ks, unauthorized access and
Pee
See
Pere eats
eet nn eee een
Ro CEU) ee ve)
oe ie various ways to protect the
ee ELg privacy of personal information
eee a