Top Banner
Computer Security Part 2 of 2 Small book by Shelly Cashman that came with text.
39

Computer Security B

Jun 09, 2015

Download

Education

Part 2 of 2, Shelly Cashman, small book by Shelly Cashman that comes with text.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Security B

Computer Security

Part 2 of 2Small book by Shelly

Cashman that came with text.

Page 3: Computer Security B

Gerald Martin hacked into the system of a company that competed with his. – NY Times

Page 4: Computer Security B

Anonymous “A Leaderless Hacker Group”

Page 6: Computer Security B

Figure 10-1, pg. 382

Page 7: Computer Security B

Internet and Network AttacksVirus Worm Trojan Rootkit

Infects, negatively altering the way computer works

Copies itself repeatedly, using up resources

Needs certain condition to trigger, does not replicate

Allows person to take over your computer from remote location.

Page 8: Computer Security B
Page 9: Computer Security B

Figure 10-2 from pg. 385

Page 10: Computer Security B

Tro-jan Pro-

grams;

3.90%

Viruses;

7.00%

Network Worms; 89.10%

Malicious Program Types

http://www.securelist.com/en/analysis/151436695/Virus_Review_2002

Porta-ble Media; 1.30%

In-ternet; 2.30%

Email; 93.40%

Main Virus Threat

Page 11: Computer Security B

Safeguards against computer viruses and other malware

Page 12: Computer Security B
Page 13: Computer Security B

Figure 10-5 from pg. 388 of your book

Page 14: Computer Security B

Safeguards

Page 15: Computer Security B

Hardware Theft and Vandalism

Page 16: Computer Security B

Software Theft

• End-User License Agreement (EULA)

Page 17: Computer Security B

Information Theft (Encryption)

Page 18: Computer Security B

Information Theft (Digital Signature)

Page 19: Computer Security B

System Failure

Uninterruptible Power Supply (UPS)

Page 20: Computer Security B

Backing Up – The Ultimate Safeguard

Page 21: Computer Security B

Wireless Security

Wireless Access Point (WAP)

Page 22: Computer Security B
Page 23: Computer Security B

802.11i network

Page 24: Computer Security B

Health Concerns: Repetitive Strain Injury

Page 25: Computer Security B

Health Concerns: Computer Vision Syndrome

Page 26: Computer Security B
Page 28: Computer Security B

Ethics and Society: Information Accuracy

• National Press Photographers Association

Page 29: Computer Security B

Ethics and Society: Intellectual Property Rights

Page 30: Computer Security B

Ethics and Society: Green Computing

Page 31: Computer Security B

Information Privacy: Electronic Profiles

Page 32: Computer Security B

Information Privacy:

Cookies

Look in your book, pg. 404, at figure 10-22 about “How Cookies Work”

Page 33: Computer Security B

Information Privacy: Spyware and Adware

Page 34: Computer Security B

Information

Privacy: Spam

Page 35: Computer Security B

Information Privacy: Phishing

Page 36: Computer Security B

Information Privacy: Social Engineering

Page 37: Computer Security B

Privacy Laws: Employee Monitoring

Page 38: Computer Security B

Privacy Laws: Content Filtering

Page 39: Computer Security B

• Complete both worksheets by Monday beginning of class.

• Complete take home test by Monday beginning of class.

Assignment