DOC PREVIEW
NOVA ITE 115 - Lecture Notes

This preview shows page 1-2-3-4-24-25-26-50-51-52-53 out of 53 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 53 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

PowerPoint PresentationChapter 10 ObjectivesComputer Security RisksInternet and Network AttacksSlide 5Slide 6Slide 7Slide 8Slide 9Slide 10Slide 11Slide 12Slide 13Authorized Access and UseSlide 15Slide 16Slide 17Slide 18Slide 19Hardware Theft and VandalismSoftware TheftSlide 22Slide 23Information TheftSlide 25Slide 26Slide 27Slide 28System FailureSlide 30Backing Up — The Ultimate SafeguardWireless SecurityEthics and SocietySlide 34Information PrivacySlide 36Slide 37Slide 38Slide 39Slide 40Slide 41Slide 42Slide 43Slide 44Slide 45Slide 46Cyber-bullyingHealth Concerns of Computer UseSlide 49Slide 50Slide 51Slide 52Summary of Computer Security, Ethics and PrivacyDiscovering Computers 2014Chapter 10 Computer Security/Safety, Ethics and PrivacyChapter 10 ObjectivesDescribe the types of computer security risksDescribe the types of computer security risksIdentify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofingIdentify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofingDiscuss techniques to prevent unauthorized computer access and useDiscuss techniques to prevent unauthorized computer access and useIdentify safeguards against hardware theft and vandalismIdentify safeguards against hardware theft and vandalismExplain the ways software manufacturers protect against software piracyExplain the ways software manufacturers protect against software piracyDefine encryption and explain why it is necessaryDefine encryption and explain why it is necessaryDiscuss the types of devices available that protect computers from system failureDiscuss the types of devices available that protect computers from system failureExplain the options available for backing up computer resourcesExplain the options available for backing up computer resourcesIdentify risks and safeguards associated with wireless communicationsIdentify risks and safeguards associated with wireless communicationsRecognize issues related to information accuracy, rights, and conductRecognize issues related to information accuracy, rights, and conductDiscuss issues surrounding information privacyDiscuss issues surrounding information privacyDiscuss ways to prevent health-related disorders and injuries due to computer useDiscuss ways to prevent health-related disorders and injuries due to computer useComputer Security RisksWhat is a computer security risk?Event or action that causes loss of or damage to computer system, especially data and/or softwareInternet and Network AttacksWhat are viruses, worms, and Trojan horses?VirusVirus is a potentially damaging computer programWormWorm copies itself repeatedly, using up resources and possibly shutting down computer or networkTrojan horseTrojan horse hides within or looks like legitimate program until triggeredPayload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk driveCan spread and damage filesDoes not replicate itself on other computersInternet and Network AttacksHow can a virus spread through an e-mail message?Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message.Step 2. They use the Internet to send the e-mail message to thousands of users around the world.Step 3b. Other users do not recognize the name of the sender of the e-mail message. These users do not open the e-mail message. Instead they delete the e-mail message. These users’ computers are not infected with the virus.Step 3a. Some users open the attachment and their computers become infected with the virus.Internet and Network AttacksHow can you protect your system from a macro virus?Set macro security level in applications that allow you to write macrosSet security level so that warning displays that document contains macroMacros are instructions saved in an application, such as word processing or spreadsheet programInternet and Network AttacksWhat is an antivirus program?Identifies and removes computer virusesMost also protect against worms and Trojan horsesInternet and Network AttacksWhat is a virus signature?Specific pattern of virus code that does damageAlso called virus definitionAntivirus programs look for virus signaturesKeeps file in separate area of hard diskInternet and Network AttacksHow does an antivirus program inoculate a program file?Records Records information information about program such about program such as file size and as file size and creation creation datedateAttempts Attempts to remove to remove any detected any detected virusvirusUses Uses information information to detect if to detect if virus tampers virus tampers with filewith fileQuarantinesQuarantines infected infected files that it files that it cannot cannot removeremoveInternet and Network AttacksWhat are some tips for preventing virus, worm, and Trojan horse infections?Install a personalfirewall programIf the antivirus program flags an e-mail attachment as infected, delete the attachment immediatelyNever start a computer with removable media insertedNever open an e-mail attachment unless you are expecting it and it is from a trusted sourceInstall an antivirus program on all of your computersCheck all downloaded programs for viruses, worms, or Trojan horsesInternet and Network AttacksWhat are a denial of service attack, back door and spoofing?A denial of service attack is an assault whichdisrupts computer access to an Internet service such as the Web or e-mailA back door is a program or set of instructionsin a program that allow users to bypasssecurity controls when accessing a computerresourceSpoofing is a technique intruders use to maketheir network or Internet transmissionappear legitimate to a victim computer ornetworkInternet and Network AttacksWhat is a firewall?Security system consisting of hardware and/or software that prevents unauthorized intrusionInternet and Network AttacksWhat is a personal firewall?Program that protects personal computer and its data from unauthorized intrusionsMonitors transmissions to and from computerInforms you of attempted intrusionAuthorized Access and UseHow can companies protect against hackers?Intrusion detection softwareIntrusion detection softwareanalyzes network traffic, assesses analyzes network traffic, assesses system vulnerabilities,


View Full Document

NOVA ITE 115 - Lecture Notes

Download Lecture Notes
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Lecture Notes and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Lecture Notes 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?