Computer Ethics Privacy and Security

Topics: E-mail, Internet, Computer virus Pages: 25 (2181 words) Published: November 20, 2014
Discovering Computers 2008

Chapter 9
Computer Security,
Ethics and Privacy
1

2

Chapter 10 Objectives
Describe the types of computer security risks

Discuss the types of devices available that
protect computers from system failure

Identify ways to safeguard against
computer viruses, worms, Trojan horses,
botnets, denial of service attacks, back
doors, and spoofing

Explain the options available for backing up
computer resources

Discuss techniques to prevent unauthorized
computer access and use
Identify safeguards against hardware theft
and vandalism
Explain the ways software manufacturers
protect against software piracy
Define encryption and explain why it is
necessary

Identify risks and safeguards associated with
wireless communications
Recognize issues related to information
accuracy, rights, and conduct
Discuss issues surrounding information
privacy
Discuss ways to prevent health-related
disorders and injuries due to computer use

3

Computer Security Risks
What is a computer security risk?
Event or action that causes loss of or damage to
computer system

4

Internet and Network Attacks
What are viruses, worms, and Trojan horses?
Virus is a
potentially
damaging
computer
program

Can
spread
and
damage
files

Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network

Trojan horse
hides within
or looks like
legitimate
program until
triggered
Does not
replicate
itself on
other
computers

Payload
(destructive
event) that is
delivered when
you open file, run
infected program,
or boot computer
with infected disk
in disk drive

5

Internet and Network Attacks
How can a virus spread through an e-mail message?
Step 1. Unscrupulous

Step 2. They use

programmers create a virus
program. They hide the
virus in a Word document
and attach the Word
document to an e-mail
message.

the Internet to send
the e-mail message
to thousands of
users around the
world.

Step 3b. Other users do not
Step 3a. Some

users open the
attachment and
their computers
become infected
with the virus.

recognize the name of the
sender of the e-mail message.
These users do not open the
e-mail message. Instead they
delete the e-mail message.
These users’ computers are not
infected with the virus.

6

Internet and Network Attacks
How can you protect your system from a macro virus?
Set macro security level in applications that allow you
to write macros
Set security level so that
warning displays that
document contains
macro
Macros are instructions
saved in an application,
such as word processing
or spreadsheet program

7

Internet and Network Attacks
What is an antivirus program?
Identifies and removes
computer viruses
Most also protect against
worms and Trojan
horses

8

Internet and Network Attacks
What is a virus signature?
Specific pattern of virus code
Also called virus definition

Antivirus programs
look for virus
signatures

9

Internet and Network Attacks
How does an antivirus
program inoculate a
Records
program file?
information
about program such
as file size and
creation
Uses
date
information
Attempts
to detect if
to remove
virus tampers
any detected
with file
virus
Quarantines
infected
files that it
Keeps file
cannot
in separate
remove
area of hard disk

10

Internet and Network Attacks
What are some tips for preventing virus, worm, and Trojan
horse infections?
Never start a
computer with
removable media
inserted

If the antivirus
program flags an email attachment as
infected, delete the
attachment
immediately

Install an antivirus
program on all of
your computers

Check all
downloaded
programs for
viruses, worms,
or Trojan horses

Never open an
e-mail attachment
unless you are
expecting it and
it is from a trusted
source

Install a personal
firewall program

11...
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Computer Ethics Essay
  • Essay about Computer Ethics, Privacy
  • Computer Security Essay
  • Computer Security Essay
  • Security and privacy Essay
  • Security and Privacy Essay
  • Privacy and Security Essay
  • Copyright and Privacy with Computer Ethic Essay

Become a StudyMode Member

Sign Up - It's Free