Chapter 9
Computer Security,
Ethics and Privacy
1
2
Chapter 10 Objectives
Describe the types of computer security risks
Discuss the types of devices available that protect computers from system failure
Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing
Explain the options available for backing up computer resources
Discuss techniques to prevent unauthorized computer access and use
Identify safeguards against hardware theft and vandalism
Explain the ways software manufacturers protect against software piracy
Define encryption and explain why it is necessary Identify risks and safeguards associated with wireless communications
Recognize issues related to information accuracy, rights, and conduct
Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use
3
Computer Security Risks
What is a computer security risk?
Event or action that causes loss of or damage to computer system
4
Internet and Network Attacks
What are viruses, worms, and Trojan horses?
Virus is a potentially damaging computer program
Can spread and damage files
Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse hides within or looks like legitimate program until triggered Does not replicate itself on other computers
Payload
(destructive
event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive
5
Internet and Network Attacks
How can a virus spread through an e-mail message?
Step 1. Unscrupulous
Step 2. They use
programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message. the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not
Step 3a. Some
users open the attachment and