Objectives :-
*Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators.
*Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks.
*Discuss techniques to prevent unauthorized computer access and use.
*Identify safeguards against hardware theft and vandalism.
*Explain the ways software manufacturers protect against software piracy.
*Discuss how encryption works, and explain why it is necessary.
*Discuss the types of devices available that protect computers from system failure.
*Explain the options available for backing up computer resources.
*Identify risks and safeguards associated with wireless communications.
*Recognize issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.
*Discuss issues surrounding information privacy.
Computer Security Risks:-
>A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
>A cybercrime is an online or Internet-based illegal act.
*Hackers.
*Crackers.
*Script Kiddies.
*Corporate Spies.
*Unethical Employees.
*Cyberextortionists.
*Cyberterrorists.
Internet and Network Attacks:-
>Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises.
>An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.
Computer Virus
*Affects a computer negatively by altering the way the computer works.
Worm
*Copies itself repeatedly, using up resources and possibly shutting down the computer or network.
Trojan Horse
*A malicious program that hides within or looks like a legitimate program.
Rootkit
*Program that hides in a computer and allows someone from a remote location to take full control.
>Users can take several precautions to protect their home and work computers and mobile devices from these malicious infections.
>A botnet is a group of compromised computers connected to a network
*a compromised computer is known as a zombie
>A denial of service attack (DoS attack) disrupts computer access to Internet services.
*distributed DoS (DDoS)
>A back door is a program or set of instructions in a program that allow users to bypass security controls.
>Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate.
>A firewall is hardware and/or software that protects a network’s resources from intrusion.
Unauthorized Access and Use:-
>Unauthorized access is the use of a computer or network without permission.
>Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.
>Access controls define who can access a computer, when they can access it, and what actions they can take.
*Two-phase processes called identification and authentication
*User name
*Password
*Passphrase
*CAPTCHA
Hardware Theft and Hardware Vandalism:-
>Hardware theft is the act of stealing computer equipment.
>Hardware vandalism is the act of defacing or destroying computer equipment.
>To help reduce the of chances of theft, companies and schools use a variety of security measures.
*Physical access controls.
*Alarm systems.
*Cables to lock equipment.
*Real time location system.
*Passwords, possessed objects, and biometrics.
Software Theft:-
>Software theft occurs when someone:-
*Steals software media.
*Intentionally erases programs.
*Illegally copies a program.
*Illegally registers and/or activates a program.
>Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law.
>Some software requires product activation to function fully.
Information Theft:-
>Information theft occurs when someone steals personal or confidential information.
>Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.
>A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender.
*often used to ensure that an impostor is not participating in an Internet transaction.
>Web browsers and Web sites use encryption techniques.
>Popular security techniques include:-
*Digital Certificates.
*Transport Layer Security (TLS).
*Secure HTTP.
*VPN.
System Failure:-
>A system failure is the prolonged malfunction of a computer
>A variety of factors can lead to system failure, including:-
*Aging hardware.
*Natural disasters.
*Electrical power problems.
*Noise, undervoltages, and overvoltages.
*Errors in computer programs.
>Two ways to protect from system failures caused by electrical power variations include surge protectors and uninterruptable power supplies (UPS).
Backing-Up:-
>A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed.
*to back up a file means to make a copy of it
>Offsite backups are stored in a location separate from the computer site.
*cloud storage.
Wireless Security:-
>Wireless access poses additional security risks
*about 80 percent of wireless networks have no security protection.
>War driving allows individuals to detect wireless networks while driving a vehicle through the area.
Ethics and Society:-
>Computer ethics are the moral guidelines that govern the use of computers and information systems.
>Information accuracy is a concern
*not all information on the Web is correct.
>Green computing involves reducing the electricity and environmental waste while using a computer.
>Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
>Huge databases store data online.
>It is important to safeguard your information.
Summary:-
*Potential computer risks and safeguards.
*Wireless security risks and safeguards.
*Computer-related health issues and preventions.
*Ethical issues surrounding information accuracy, intellectual property rights, codes of conduct, green computing, and information privacy.
.
s
how encr yption works, and explain why it is necessary
No comments:
Post a Comment