OSU CS 101 - Tomorrow’s Technology and You

Unformatted text preview:

1© 2008 Prentice-Hall, Inc. Slide 1Tomorrow’s Technologyand You8th Edition© 2008 Prentice-Hall, Inc. Slide 2Tomorrow’s Technologyand You 8/eChapter 10Computer Security and Risks© 2008 Prentice-Hall, Inc. Slide 3Tomorrow’s Technology and You 8/eChapter 10Objectives Describe several types of computer crime and discusspossible crime prevention techniques. Describe the major security issues facing computer users,computer system administrators, and law enforcementofficials Describe the ways in which computer security relates topersonal privacy issues. Explain the ways in which security and computer reliabilityare related.2© 2008 Prentice-Hall, Inc. Slide 4Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeComputers are used to break lawsas well as to uphold them.Computer crime involves: Theft by computer Software piracy Software sabotage Hacking and electronic trespassing© 2008 Prentice-Hall, Inc. Slide 5Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeThe Computer Crime DossierComputer crime is any crime accomplished throughknowledge or use of computer technology.Businesses and government institutions lose billionsof dollars every year to computer criminals.The majority of crimes committed by companyinsiders. These crimes are typically covered up or not reported toauthorities to avoid embarrassment.© 2008 Prentice-Hall, Inc. Slide 6Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeAccording to a 2001 survey of over 500 companies andgovernment agencies: 85% detected computer security breaches in the preceding 12months. Financial losses due to security breaches topped $377 million. 70% reported that Internet connections were frequent pointsof attack. Only 31% said that internal systems were frequent points of attack.3© 2008 Prentice-Hall, Inc. Slide 7Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeTheft by Computer Theft is the most common form of computer crime. Computers are used to steal: Money Goods Information Computer resources© 2008 Prentice-Hall, Inc. Slide 8Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeCommon types of computer crime: Spoofing: the use of a computer for stealing passwords Identity theft: the use of computers and other tools to stealwhole identities Involves social engineering: slang for the use of deception to getindividuals to reveal sensitive information Online fraud 87% related to online auctions Average cost per victim: $600© 2008 Prentice-Hall, Inc. Slide 9Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeProtect Yourself from Identity Theft: Make all your online purchases using a credit card. Get a separate credit card with a low credit limit for your onlinetransactions. Make sure a secure Web site is managing yourtransaction. Don’t disclose personal information over the phone. Don’t give social security or driver’s license numbers over the phone;don’t print it on checks; and use encryption when sending it in email. Shred sensitive information.4© 2008 Prentice-Hall, Inc. Slide 10Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses and Other Malware Sabotage of software can include: Trojan horse: performs a useful task while also being secretlydestructive Examples: Logic and time bombs Virus: spreads by making copies of itself from program toprogram or disk to disk Examples: Macro viruses and email viruses© 2008 Prentice-Hall, Inc. Slide 11Tomorrow’s Technology and You 8/eChapter 10 Software Sabotage: Viruses and Other MalwareHow a Virus Works© 2008 Prentice-Hall, Inc. Slide 12Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses and Other Malware Worm: program that travels independently over computernetworks, seeking uninfected sites The first headline-making worm was created as an experiment by aCornell graduate student in 1988. In the summer of 2001, a worm called Code Red made worldwideheadlines. Virus War Researchers have identified more than 18,000 virus strains, with 200 newstrains appearing each month. At any given time, about 250 virus strains are in circulation.5© 2008 Prentice-Hall, Inc. Slide 13Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses and Other MalwareAntivirus programs are designed to search for viruses,notify users when they’re found, and remove them frominfected disks or files. Antivirus programs continually monitor system activity,watching for and reporting suspicious virus-like actions. Programs need to be frequently revised to combat new virusesas they appear. Most can automatically download new virus-fighting code fromthe Web as new virus strains appear. It can take several days for companies to develop and distributepatches for new viruses.© 2008 Prentice-Hall, Inc. Slide 14Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses and Other Malware Spyware is technology that collects information from computerusers without their knowledge or consent. Also called: Tracking software or Spybot Information is gathered and shared with others via the Internet. Your keystrokes could be monitored. Web sites you visit are recorded. Snapshots of your screen are taken. Spyware can be the cause of pop-ups appearing on your screen. 91% of PC users have spyware on their computers. In drive-by downloads just visiting a Web site can cause a download.© 2008 Prentice-Hall, Inc. Slide 15Tomorrow’s Technology and You 8/eChapter 10 Software Sabotage: Viruses and Other MalwareNorton Antivirus Software’s Interface6© 2008 Prentice-Hall, Inc. Slide 16Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses and Other MalwareHacking and Electronic Trespassing Hacker (or cracker) refers to people who break into computersystems. Webjackers hijack Web pages and redirect users to other sites. Denial of Service (DOS) attacks bombard servers and Web siteswith traffic that shuts down networks.© 2008 Prentice-Hall, Inc. Slide 17Tomorrow’s Technology and You 8/eChapter 10 Online Outlaws: Computer CrimeSoftware Sabotage: Viruses


View Full Document

OSU CS 101 - Tomorrow’s Technology and You

Download Tomorrow’s Technology and You
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Tomorrow’s Technology and You and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Tomorrow’s Technology and You 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?