0% found this document useful (0 votes)
34 views29 pages

Mti 10002217 050525161811

The document outlines key concepts of computer security risks, including types of attacks, unauthorized access, and methods for protecting systems. It discusses the importance of encryption for data privacy and the implications of information theft. Additionally, it highlights health concerns related to computer use and the significance of ergonomics in the workplace.

Uploaded by

Leonardo Lionel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views29 pages

Mti 10002217 050525161811

The document outlines key concepts of computer security risks, including types of attacks, unauthorized access, and methods for protecting systems. It discusses the importance of encryption for data privacy and the implications of information theft. Additionally, it highlights health concerns related to computer use and the significance of ergonomics in the workplace.

Uploaded by

Leonardo Lionel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 29

Course Outline

• Computer security risk


• Internet, and Network Attack
• Unauthorized Access and Use
• Hardware, Software, and Information Theft
• System Failure and Backing Up
• Discussion : Encryption Algorithms, and Data Privacy

1
Computer Security Risks
A computer security risk is any event or action that could
cause a loss of or damage to computer hardware,
software, data, information, or processing capability
A cybercrime is an online or Internet-based illegal act

Hackers Crackers Script Kiddies Corporate Spies

Unethical
Cyberextortionists Cyberterrorists
Employees
2
Internet and Network Attacks
• Information transmitted over networks has a higher
degree of security risk than information kept on an
organization’s premises
• An online security service is a Web site that evaluates
your computer to check for Internet and e-mail
vulnerabilities

3
Internet and Network Attacks

Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program that
computer repeatedly, program that hides in a
negatively by using up hides within computer
altering the resources or looks like and allows
way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control

4
Infected computer has one or more of the following symptoms:

Operating system Available memory Screen displays


Files become
runs much slower is less than unusual message
corrupted
than usual expected or image

Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear

Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly

5
6
Users can take several
precautions to protect
their home and work
computers and mobile
devices from these
malicious infections

7
Internet and Network Attacks
• A botnet is a group of compromised computers connected to a network
• A compromised computer is known as a zombie
• A denial of service attack (DoS attack) disrupts computer access to Internet
services
• Distributed DoS (DDoS)
• A back door is a program or set of instructions in a program that allow users
to bypass security controls
• Spoofing is a technique intruders use to make their network or Internet
transmission appear legitimate
• A firewall is hardware and/or software that protects a network’s resources
from intrusion

8
Internet and Network Attacks

Intrusion detection software


• Analyzes all network traffic
• Assesses system vulnerabilities
• Identifies any unauthorized intrusions
• Notifies network administrators of suspicious behavior
patterns or system breaches
Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
9
Unauthorized Access and Use

Unauthorized access is Unauthorized use is the


the use of a computer or use of a computer or its
network without data for unapproved or
permission possibly illegal activities

10
Unauthorized Access and Use
Organizations take
several measures to help
prevent unauthorized
access and use
• Acceptable use policy
• Disable file and printer
sharing
• Firewalls
• Intrusion detection
software

11
Unauthorized Access and Use
• Access controls define who can access a computer, when they can access it,
and what actions they can take
• Two-phase processes called identification and authentication
• User name
• Password
• Passphrase
• CAPTCHA

12
Security
• A possessed object is any • A biometric device
item that you must carry to authenticates a person’s
gain access to a computer or identity by translating a
computer facility personal characteristic into a
• Often are used in combination digital code that is compared
with a personal identification with a digital code in a
number (PIN) computer

13
Digital Forensics
• Digital forensics is the discovery, collection, and analysis of evidence found on
computers and networks
• Many areas use digital forensics

Law Criminal Military


enforcement prosecutors intelligence

Information
Insurance
security
agencies
departments

14
Hardware Theft and Vandalism

Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment

15
Hardware Theft Security
To help reduce the of chances of theft, companies and schools use a variety of
security measures

Cables to lock
Physical access controls Alarm systems
equipment

Real time location Passwords, possessed


system objects, and biometrics

16
Software theft occurs when someone:

Intentionally
Steals software
erases
media
programs

Illegally
Illegally copies registers and/or
a program activates a
program
17
Information Theft
• Information theft occurs when someone steals personal or confidential
information
• Encryption is a process of converting readable data into unreadable
characters to prevent unauthorized access

18
19
Information Theft
• A digital signature is an encrypted code that a person, Web site, or
organization attaches to an electronic message to verify the identity of the
sender
• Often used to ensure that an impostor is not participating in an Internet transaction
• Web browsers and Web sites use encryption techniques
• Popular security techniques include :

Digital Transport Layer


Secure HTTP VPN
Certificates Security (TLS)

20
System Failure
• A system failure is the prolonged malfunction of a computer
• A variety of factors can lead to system failure, including:
• Aging hardware
• Natural disasters
• Electrical power problems
• Noise, undervoltages, and overvoltages
• Errors in computer programs
• Two ways to protect from system failures caused by electrical power
variations include surge protectors and uninterruptable power supplies (UPS)

21
Backing Up – The Ultimate Safeguard
• A backup is a duplicate of a file, program, or disk that can be used if the
original is lost, damaged, or destroyed
• To back up a file means to make a copy of it
• Offsite backups are stored in a location separate from the computer site

• Three-generation backup
• Two categories of backups: policy
– Full backup Grandparent
– Selective backup

Parent

Child
22
Wireless Security
• In additional to using firewalls, some safeguards improve security of wireless
networks:

A wireless access
Change the default
point should not
SSID
broadcast an SSID

Configure a WAP
so that only Use WPA or WPA2
certain devices can security standards
access it
23
Health Concerns of Computer Use
• The widespread use of
computers has led to
health concerns
• Repetitive strain injury
(RSI)
• Tendonitis
• Carpal tunnel syndrome
(CTS)
• Computer vision
syndrome (CVS)

24
25
Health Concerns of Computer Use
Ergonomics is an applied
science devoted to
incorporating comfort,
efficiency, and safety into
the design of items in the
workplace

26
Health Concerns of Computer Use
• Computer addiction occurs when the computer consumes someone’s entire
social life
• Symptoms of users include:

Craves Overjoy when Unable to stop


computer at the computer
time computer activity

Irritable when Neglects Problems at


not at the family and work or
computer friends school
27
Discussion
Encryption: Data Privacy :
1. What is encryption ? 1. How important a
2. Advantage and privacy is?
disadvantage of 2. Misused of data ?
encryption?
3. How it works?

28
Summary
• Computer Security Risk is any event or action that
could cause a loss of or damage to computer hardware,
software, data, information or processing capability
• How does encryption work, and why is it necessary?
• Issues surrounding information privacy

29

You might also like