Preview

Computer Ethics Privacy and Security

Powerful Essays
Open Document
Open Document
2181 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Ethics Privacy and Security
Discovering Computers 2008

Chapter 9
Computer Security,
Ethics and Privacy
1

2

Chapter 10 Objectives
Describe the types of computer security risks

Discuss the types of devices available that protect computers from system failure

Identify ways to safeguard against computer viruses, worms, Trojan horses, botnets, denial of service attacks, back doors, and spoofing

Explain the options available for backing up computer resources

Discuss techniques to prevent unauthorized computer access and use
Identify safeguards against hardware theft and vandalism
Explain the ways software manufacturers protect against software piracy
Define encryption and explain why it is necessary Identify risks and safeguards associated with wireless communications
Recognize issues related to information accuracy, rights, and conduct
Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use

3

Computer Security Risks
What is a computer security risk?
Event or action that causes loss of or damage to computer system

4

Internet and Network Attacks
What are viruses, worms, and Trojan horses?
Virus is a potentially damaging computer program

Can spread and damage files

Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse hides within or looks like legitimate program until triggered Does not replicate itself on other computers

Payload
(destructive
event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive

5

Internet and Network Attacks
How can a virus spread through an e-mail message?
Step 1. Unscrupulous

Step 2. They use

programmers create a virus program. They hide the virus in a Word document and attach the Word document to an e-mail message. the Internet to send the e-mail message to thousands of users around the world. Step 3b. Other users do not
Step 3a. Some

users open the attachment and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    14) What term describes a malicious software program that users are tricked into running? A) Trojan horse…

    • 284 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    unit 7 lab 10

    • 595 Words
    • 3 Pages

    2. Trojan horse was a program that was supposed to find and destroy computer viruses. A Trojan horse may be widely redistributed as part of a computer virus. Email attachments are a way for a sender to transmit files to another user via email. In a similar way to junk mail coming in your door at home, email users regularly receive unsolicited emails from unknown senders. These emails can often contain links to malicious web sites or have attachments containing malicious software. A drive-by download is when a malicious web site you visit downloads and installs software without your knowledge. The objective of drive-by downloads is usually to install malware to record what you type and what sites you visit, to search your computer for stored passwords, or to open your computer to remote control.…

    • 595 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    with varying amounts of data. In order for scanners to detect this type of virus,…

    • 639 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    The obnoxious virus is exceptionally unsafe and perilous and can change interior settings of the Windows System.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Companies like Google are straying away from the once popular Virtual Reality, in favor of what they are calling “Augmented Reality”, or AR. According to Merriam-Webster, AR is “an enhanced version of reality created by the use of technology to overlay digital information on an image of something being viewed through a device (as a smartphone camera); also: the technology used to create augmented reality.” (Merriam-Webster, n.d.) In order to “augment” our realities, these technologies are recording, storing, altering, and displaying information in real time. The information they use can be anything, but with products like Google Glass, wearable technology can now modify what and how we see objects, people, or data, in real time.…

    • 874 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 324 Computer Ethics

    • 2262 Words
    • 10 Pages

    In the short time that computers and internet have existed in the modern era, the world has seen a complete 360 degree turn and in the various forms of electronic entertainment that people all over the world are now using. In the days before CD’s, DVD’s and the internet, not much was said if a vinyl album (remember these?), VHS cassette (or these?) or an audio cassette was loaned to a friend for their listening / viewing pleasure, but today with the availability of sending an email with three or four megabytes (mb) of information, one can enjoy a borrowed song but is assumed that it is piracy or stealing. Is this a fair assumption? This Author will not give his opinion but rather discuss both sides of the Peer to Peer (P2P) downloading and sharing issues and let the reader form their own opinions.…

    • 2262 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Souryal, Sam S. (2007). Ethics in Criminal Justice: In search of the Truth (4th ed.). Cincinnati,…

    • 1753 Words
    • 8 Pages
    Powerful Essays
  • Best Essays

    Hays, Tom, (June 27, 2000), Cop Gets 15 Years in Torture Case, Associated Press, Retrieved…

    • 1615 Words
    • 7 Pages
    Best Essays
  • Powerful Essays

    Ethical issues and the use of Personally Identifiable Information in computer systems, applications, and the internet.…

    • 2169 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    More and more information on all of us is being collected, stored, used, and shared among organizations…

    • 884 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ethics Of Privacy

    • 3817 Words
    • 16 Pages

    Smith, David. "Instagram Loses Half Its Daily Users In A Month, And Here 's Why [REPORT]." International Business Times. N.p., 14 Jan. 2013. Web. 13 Apr. 2013.…

    • 3817 Words
    • 16 Pages
    Better Essays
  • Powerful Essays

    In presenting this project, in partial fulfillment of the requirements for graduate degree from the University of Central Arkansas, I agree that the Library of this University shall make it freely available for inspections. I further agree that permission for extensive copying for scholarly purposes may be granted by the professor who supervised my thesis work, or, in the professors absence, by the Chair of the Department or the Dean of the Graduate School. It is understood, that due recognition shall be given to me and to the University of Central Arkansas in any scholarly use which may be made of any material in my project.…

    • 5250 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Danger of Malware

    • 839 Words
    • 4 Pages

    Computer worms and viruses pose a clear and present danger for corporate and public information security in that as time and technology progress, the damaging effects this "malware" has on the network increases. Throughout this paper the term "malware" is used to define software that damages your system, causes instability, or exhibits antisocial behavior such as changing settings or interfering with a computer's registry and security settings. Typical examples include computer viruses or worms.…

    • 839 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ethics Of Cyber Law

    • 1874 Words
    • 8 Pages

    The concept of cyber law in Australia is subject to a wide range of controversy, due to the lack of privacy offered to the individuals of Australia. Policies regarding cyber law in Australia are very narrow, and often do not provide the adequate amount of privacy and security to users in Australia, thus providing a motive for the necessity of an alteration of cyber law in Australia.…

    • 1874 Words
    • 8 Pages
    Powerful Essays