Sunday 16 October 2016

Chapter 11

Manage Computing Securely,Safely and Ethically 

Objectives :-
*Define the term, computer security risks, and briefly describe the     types of cybercrime perpetrators.
*Describe various types of Internet and network attacks, and             identify ways to safeguard against these attacks.
*Discuss techniques to prevent unauthorized computer access and     use.
*Identify safeguards against hardware theft and vandalism.
*Explain the ways software manufacturers protect against software   piracy.

*Discuss how encryption works, and explain why it is necessary.
*Discuss the types of devices available that protect computers from   system failure.
*Explain the options available for backing up computer resources.
*Identify risks and safeguards associated with wireless                       communications.
*Recognize issues related to information accuracy, intellectual           property rights, codes of conduct, and green computing.
*Discuss issues surrounding information privacy.

Computer Security Risks:-
>A computer security risk is any event or action that could cause a     loss of or damage to computer hardware, software, data,                   information, or processing capability.

>A cybercrime is an online or Internet-based illegal act.
  *Hackers.
  *Crackers.
  *Script Kiddies.
  *Corporate Spies.
  *Unethical Employees.
  *Cyberextortionists.

  *Cyberterrorists.

Internet and Network Attacks:- 
>Information transmitted over networks has a higher degree of           security risk than information kept on an organization’s premises.
>An online security service is a Web site that evaluates your               computer to check for Internet and e-mail vulnerabilities.
Computer Virus
*Affects a computer negatively by altering the way the computer       works.
Worm
*Copies itself repeatedly, using up resources and possibly shutting     down the computer or network.
Trojan Horse
*A malicious program that hides within or looks like a legitimate       program.
Rootkit
*Program that hides in a computer and allows someone from a      remote location to take full control.


>Users can take several precautions to protect their home and work   computers and mobile devices from these malicious infections.

>A botnet is a group of compromised computers connected to a         network
*a compromised computer is known as a zombie

>A denial of service attack (DoS attack) disrupts computer access     to Internet services.
*distributed DoS (DDoS)
>A back door is a program or set of instructions in a program that     allow users to bypass security controls.
>Spoofing is a technique intruders use to make their network or         Internet transmission appear legitimate.
>A firewall is hardware and/or software that protects a network’s       resources from intrusion.

Unauthorized Access and Use:- 
>Unauthorized access is the use of a computer or network                 without permission.
>Unauthorized use is the use of a computer or its data for                 unapproved or possibly illegal activities.
>Access controls define who can access a computer, when they can   access it, and what actions they can take.
*Two-phase processes called identification and authentication
*User name
*Password
*Passphrase
*CAPTCHA

Hardware Theft and Hardware Vandalism:-
>Hardware theft is the act of stealing computer equipment.

>Hardware vandalism is the act of defacing or destroying                 computer equipment.
>To help reduce the of chances of theft, companies and schools use   a variety of security measures.
  *Physical access controls.
  *Alarm systems.
  *Cables to lock equipment.
  *Real time location system.

  *Passwords, possessed objects, and biometrics.

Software Theft:- 
>Software theft occurs when someone:-
*Steals software media.
*Intentionally erases programs.
*Illegally copies a program.

*Illegally registers and/or activates a program.
>Copying, loaning, borrowing, renting, or distributing software can   be a violation of copyright law.
>Some software requires product activation to function fully.

Information Theft:- 

>Information theft occurs when someone steals personal or                 confidential information.
>Encryption is a process of converting readable data into                   unreadable characters to prevent unauthorized access.
>A digital signature is an encrypted code that a person, Web site, or   organization attaches to an electronic message to verify the               identity of the sender.
*often used to ensure that an impostor is not participating in an         Internet transaction.
>Web browsers and Web sites use encryption techniques.
>Popular security techniques include:-
*Digital Certificates.
*Transport Layer Security (TLS).
*Secure HTTP.
*VPN.

System Failure:- 
>A system failure is the prolonged malfunction of a computer
>A variety of factors can lead to system failure, including:-
*Aging hardware.
*Natural disasters.
*Electrical power problems.
*Noise, undervoltages, and overvoltages.
*Errors in computer programs.
>Two ways to protect from system failures caused by electrical         power variations include surge protectors and uninterruptable           power supplies (UPS).

Backing-Up:-
>A backup is a duplicate of a file, program, or disk that can be used   if the original is lost, damaged, or destroyed.
*to back up a file means to make a copy of it
>Offsite backups are stored in a location separate from the                 computer site.
*cloud storage.

Wireless Security:-
>Wireless access poses additional security risks
  *about 80 percent of wireless networks have no security                     protection.
>War driving allows individuals to detect wireless networks while      driving a vehicle through the area.

Ethics and Society:-
>Computer ethics are the moral guidelines that govern the use of       computers and information systems.
>Information accuracy is a concern
*not all information on the Web is correct.
>Green computing involves reducing the electricity and                     environmental waste while using a computer.

>Information privacy refers to the right of individuals and                 companies to deny or restrict the collection and use of information   about them.
>Huge databases store data online.
>It is important to safeguard your information.

Summary:-

*Potential computer risks and safeguards.
*Wireless security risks and safeguards.
*Computer-related health issues and preventions.
*Ethical issues surrounding information accuracy, intellectual             property rights, codes of conduct, green computing, and                   information privacy.















.















s how encr                yption works, and explain why it is necessary

No comments:

Post a Comment