DOC PREVIEW
BARRY CS 180 - Protecting Computer Systems

This preview shows page 1 out of 4 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Computer Concepts Computer Concepts --Illustrated Illustrated Introductory, Seventh EditionIntroductory, Seventh EditionUNIT F:Data SecurityKnowing What Can Go WrongKnowing What Can Go WrongWhat can go wrong?¾ Power outages¾ Hardware failures¾ Software failures¾ Human error¾ Computer viruses¾ Less common threats include natural disasters, acts of war, security breaches, malicious hackers, and theftComputer Concepts – Illustrated Introductory, Seventh EditionProtecting Computer SystemsProtecting Computer SystemsPower protection¾ UPS (uninterruptible power supply)Surge strip (surge protector, surge suppressor)¾ Designed to protect electrical devices from power surges and voltage spikesComputer Concepts – Illustrated Introductory, Seventh EditionUnderstanding AuthenticationUnderstanding AuthenticationTwo-factor authentication¾ Verifies identity using two independent elements of confirmationUser ID¾ Also known as username, login, screen name, online nickname, handlePassword¾ Verifies user ID and guarantees that you are the person you claim to beComputer Concepts – Illustrated Introductory, Seventh EditionUnderstanding AuthenticationUnderstanding AuthenticationRestricting access to computer¾ Keep it in locked room when not in use¾ Password protection and authenticationUser rights¾ Rules that limit directories and files each user can accessComputer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareMalware¾ Malicious code - one of biggest threats to your computer securityComputer virus, worms, trojan horses, zombie, spyware…Computer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareViruses can¾ Corrupt files¾ Destroy data¾ Display irritating message¾ Disrupt operations¾ Deliver payload or trigger event• Time bombs, logic bombsBoot sector virus¾ Infects system files computer uses every time it turns onComputer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareComputer worm¾ Self-copying program designed to carry out unauthorized activity on victim’s computer¾ Able to spread themselves from one computer to another¾ Enter through security holes in browsers and OSs¾ Usually sent via emails or by victims clicking infected pop-up ads or links contained in emails¾ Can even infect mobile phones¾ Mass-mailing worm spreads by sending itself to every address on infected computerComputer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareComputer Concepts – Illustrated Introductory, Seventh EditionSimulated Worm AttackExploring Security ThreatsExploring Security Threatsand Malwareand MalwareTrojan horse¾ Computer program seems to perform one function while actually doing something else¾ Not designed to spread to other computers¾ Notorious for stealing passwords using keyloggerRemote Access Trojan (RAT)¾ Backdoor capabilities that allow remote hackers to• Transmit files to victim’s computer• Search for data• Run programs• Use victim’s computer as relay station for breaking into other computersComputer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareBot¾ Software that can automate task or autonomously execute task when commanded to do so• Called intelligent agent¾ Because intelligent agent behaves like robot, often called botZombie¾ Computer under control of botBotmaster¾ Person who controls many bot-infested computers and can link them together into network called botnetComputer Concepts – Illustrated Introductory, Seventh EditionExploring Security ThreatsExploring Security Threatsand Malwareand MalwareSpyware¾ Program that secretly gathers personal information without victim’s knowledge¾ Usually for advertising and commercial purposes¾ Can piggyback on seemingly legitimate freeware or shareware downloads¾ Can also allow spyware into computer by:• Clicking infected pop-up ads• Surfing through seemingly valid and secure but compromised Web sitesComputer Concepts – Illustrated Introductory, Seventh EditionAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareMay not even be aware that computer is infectedSymptoms of infected computer include¾ Irritating messages or sounds¾ Frequent pop-up ads (often pornographic in nature)¾ Sudden appearance of new Internet toolbar¾ Addition to favorites listComputer Concepts – Illustrated Introductory, Seventh EditionAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareMore symptoms of infected computer¾ Prolonged system start-up¾ Slower than usual response to clicking or typing¾ Browser or application crashes¾ Missing files¾ Disabled security¾ Network activity when not actively browsing or sending email¾ Frequent rebootingComputer Concepts – Illustrated Introductory, Seventh EditionAvoiding Security ThreatsAvoiding Security Threatsand Malwareand MalwareKeeping your computer safe¾ Install and activate security software¾ Keep software patches and operating system service packs up to date¾ Do not open suspicious email attachments¾ Obtain software only from reliable sources¾ Use security software to scan for malware¾ Do not click pop-up ads¾ Avoid unsavory Web sites¾ Disable option Hide extensions for known file types in WindowsComputer Concepts – Illustrated Introductory, Seventh EditionExercisesWrite your answers and send them to [email protected]: exercises Concept Unit F-1Explain the following terms in computer security:¾ Virus¾ Worm¾ Trojan


View Full Document

BARRY CS 180 - Protecting Computer Systems

Download Protecting Computer Systems
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Protecting Computer Systems and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Protecting Computer Systems 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?