DOC PREVIEW
BARRY CS 180 - Computer Concepts

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Computer Concepts Computer Concepts --Illustrated Illustrated Introductory, Seventh EditionIntroductory, Seventh EditionUNIT F:Data SecurityAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareSecurity suite¾ Integrates several security modules to protect against the most common types of malwareComputer Concepts – Illustrated Introductory, Seventh EditionAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareAntivirus software¾ Utility software that looks for and removes viruses, Trojan horses, worms, and bots¾ Included in several suites or as stand-alone¾ Available for all types of computer and data storage¾ Dependable, but not infallibleAntivirus software searches for virus signature¾ Section of program code that can be used to identify known malicious programComputer Concepts – Illustrated Introductory, Seventh EditionAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareOnce antivirus software installed:¾ Set it to start when your computer starts¾ Keep running full time in backgroundList of virus signatures updated frequently¾ Information stored in one or more files called virus definitions¾ Can be manually or automatically downloadedConfigure antivirus software to periodically scan all files on computerComputer Concepts – Illustrated Introductory, Seventh EditionExamining Network and InternetExamining Network and InternetAccess SecurityAccess SecuritySecurity threats on network¾ Data can be stolen or modified during transmission.¾ IntrusionSolutions¾ Encryption¾ FirewallComputer Concepts – Illustrated Introductory, Seventh EditionExamining Network and InternetExamining Network and InternetAccess SecurityAccess SecurityMany wireless networks are not encrypted and are open to publicEncryption transforms message so contents are hidden from unauthorized readers¾ Wireless encryption: WEP, WAP, WAP2Computer Concepts – Illustrated Introductory, Seventh EditionExamining Network and InternetExamining Network and InternetAccess SecurityAccess SecurityFirewall¾ Software or hardware designed to filter out suspicious packets attempting to enter or leave a computerComputer Concepts – Illustrated Introductory, Seventh EditionExploring Web SecurityExploring Web SecurityCookie¾ Message containing information about user sent from Web server to browser¾ Stored on user’s hard drive¾ Marketers, hackers, and pranksters have found harmful uses for cookiesAd-serving cookie¾ Allows third party to track activities at any site containing their banner ads¾ Privacy issues have developedComputer Concepts – Illustrated Introductory, Seventh EditionExploring Web SecurityExploring Web SecurityBrowser may have setting that blocks all third-party cookies to prevent ad-serving cookiesSome companies may allow opting out of allowing cookies to be stored on computerComputer Concepts – Illustrated Introductory, Seventh EditionExploring Web SecurityExploring Web SecurityFlash cookie (local shared object)¾ Flash equivalent of conventional cookie¾ Marketers turning to Flash cookies as alternative way to track customersWeb bug (clear GIF)¾ Typically 1X1 pixel graphic embedded in Web page or email¾ Almost invisible¾ Designed to track who’s reading page or message¾ Can generate third-party ad-serving cookiesComputer Concepts – Illustrated Introductory, Seventh EditionExploring Web SecurityExploring Web SecurityFake Web site¾ Looks legitimate, created by third party to be clever replication of real site¾ Used to collect credit card numbers from unwary shoppers¾ Always review URL in Address box to ensure site is authentic before entering sensitive informationComputer Concepts – Illustrated Introductory, Seventh EditionExploring Web SecurityExploring Web SecurityAntispyware¾ Security software designed to identify and neutralize Web bugs, ad-serving cookies, and spywareComputer Concepts – Illustrated Introductory, Seventh EditionExploring Email SecurityExploring Email SecuritySpam¾ Unwanted electronic junk mail that arrives in online mailboxBlocking spam¾ Email authentication techniques• Sender ID, Domain Keys¾ Spam filter• Utility that captures unsolicited email before it reaches inboxComputer Concepts – Illustrated Introductory, Seventh EditionExamining Backup ProceduresExamining Backup ProceduresNeed backup plan that will help recover lost data in event of loss¾ Backup - copy of one or more files in case original(s) are damaged¾ Full backup (full-system backup)• Contains copy of every program, data, and system file on computerWindows backup softwareBackup plans in the textbookComputer Concepts – Illustrated Introductory, Seventh EditionExercisesWrite your answers and send them to [email protected]: exercises Concept Unit F-2Explain the following terms:¾ Virus signature¾ Cookie¾ Phishing


View Full Document

BARRY CS 180 - Computer Concepts

Download Computer Concepts
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Computer Concepts and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Computer Concepts 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?