Professional Documents
Culture Documents
EFFECTS AND CONTRIBUTIONS OF COMPUTER Since Then Until Now in Modern Society
EFFECTS AND CONTRIBUTIONS OF COMPUTER Since Then Until Now in Modern Society
HE MACHINE
society TEMPORARILY UNUSABLE
Ø CHILDREN ARE OUTPACING ADULTS ON THE TECHNOLOGY TRACK. Ø BROWSER-SIDE RISKS INCLUDING:
Ø EDUCATION PLAYS A MAJOR ROLE IN GUIDING THE CHILDREN TO MAKE > ACTIVE CONTENT THAT CRASHES THE BROWSER, DAMAGES THE USER’S
USE OF THE BEST OF THE COMPUTER TECHNOLOGY. SYSTEM, BREACHES THE USER’S PRIVACY, OR MERELY CREATES AN
ANNOYANCE
Ø CURRENT EDUCATION SYSTEMS MUST UNDERGO SIGNIFICANT REFORM
TO SERVE THE NEEDS OF THE YOUNGER GENERATIONS. > THE MISUSE OF PERSONAL INFORMATION KNOWINGLY OR UNKNOWINGLY
PROVIDED BY THE END-USER
Ø COMPUTERS AND THE INTERNET CAN HELP IN MAKING LESSONS
CUSTOMIZED AND STUDENT-CENTERED > INTERCEPTION OF NETWORK DATA SENT FROM BROWSER TO SERVER OR
VICE VERSA VIA NETWORK EAVESDROPPING
CAREERS AND PROFESSIONAL OUTLOOK
ASPECTS OF COMPUTER SECURITY
Ø CHANGE THAT INVOLVES NEW AND COMPLEX TECHNOLOGIES ARE
STRESSFUL TO OLDER AND LESS EDUCATED WORKERS. > PHYSICAL SECURITY
• CRIMES FACILITATED BY A COMPUTER > THE RULES AND STANDARDS GOVERNING THE CONDUCT OF AN
INDIVIDUAL WITH OTHERS
• CRIMES WHERE THE COMPUTER IS THE TARGET
• COPYRIGHT - A FORM OF PROTECTION PROVIDED BY LAW TO AUTHORS OF
ORIGINAL WORKS, OTHERWISE KNOWN AS THEIR INTELLECTUAL PROPERTY
COMPUTER SECURITY ISSUES • A COPYRIGHT OWNER HAS THE SOLE RIGHT TO: – REPRODUCE THE
MATERIAL – PREPARE DERIVATIVE WORKS BASED ON THE MATERIAL –
Ø BUGS OR MISCONFIGURATION PROBLEMS THAT ALLOW UNAUTHORIZED DISTRIBUTE THE COPIES OF THE MATERIAL TO THE PUBLIC – PERFORM THE
REMOTE USERS TO: WORK PUBLICLY (IF APPLICABLE) – DISPLAY THE WORK PUBLICLY
> STEAL CONFIDENTIAL DOCUMENTS > EXECUTE COMMANDS ON THE HOST • PRIVACY
MACHINE, ALLOWING THEM TO MODIFY THE SYSTEM
• CENSORSHIP
> GAIN INFORMATION ABOUT THE HOST MACHINE, ALLOWING THEM TO
BREAK INTO THE SYSTEM SECURITY INCIDENTS
Ø THERE ARE MANY DIFFERENT WAYS TO ATTACK COMPUTERS AND Ø INTEGRITY — RELATED TO CONCEPT BUT DEALS WITH THE GENERATION
NETWORKS TO TAKE ADVANTAGE OF WHAT HAS MADE SHOPPING, BANKING, AND MODIFICATION OF DATA.
INVESTMENT, AND LEISURE PURSUITS A SIMPLE MATTER OF “DRAGGING
AND CLICKING” FOR MANY PEOPLE. Ø AVAILABILITY — ENSURE THAT THE DATA, OR THE SYSTEM ITSELF, IS
AVAILABLE FOR USE WHEN THE AUTHORIZED USER WANTS IT.
Ø DIFFERENT TYPES OF ELECTRONIC CRIME FALL INTO TWO MAIN
CATEGORIES: > AUTHENTICATION — DEALS WITH THE DESIRE TO ENSURE THAT AN
INDIVIDUAL IS WHO THEY CLAIM TO BE.
> CRIMES IN WHICH THE COMPUTER WAS THE TARGET OF THE ATTACK
> NONREPUDIATION — DEALS WITH THE ABILITY TO VERIFY THAT A
> INCIDENTS IN WHICH THE COMPUTER WAS A MEANS OF PERPETRATING A MESSAGE HAS BEEN SENT AND RECEIVED AND THAT THE SENDER CAN BE
CRIMINAL ACT IDENTIFIED AND VERIFIED.
> THE MORRIS WORM (NOVEMBER, 1988), CITIBANK AND VLADIMIR LEVIN Ø THREE WAYS AN ORGANIZATION CAN CHOOSE TO ADDRESS THE
(JUNE-OCTOBER, 1994), KEVIN MITNICK (FEBRUARY, 1995), OMEGA PROTECTION OF ITS NETWORKS:
ENGINEERING AND TIMOTHY LLOYD (JULY, 1996), JESTER AND THE
WORCESTER AIRPORT (MARCH, 1997), SOLAR SUNRISE (FEBRUARY, 1998), > IGNORE SECURITY ISSUES
THE MELISSA VIRUS (MARCH, 1999), THE LOVE LETTER WORM (MAY, 2000),
THE CODE-RED WORM (2001), ADIL YAHYA ZAKARIA SHAKOUR (AUGUST, > PROVIDE HOST SECURITY
2001-MAY, 2002), THE SLAMMER WORM (2003)
> APPROACH SECURITY AT A NETWORK LEVEL
THREATS TO SECURITY
Ø HOST SECURITY
> VIRUSES AND WORMS > INTRUDERS > INSIDERS > CRIMINAL
> TAKES A GRANULAR VIEW OF SECURITY BY FOCUSING ON PROTECTING
ORGANIZATIONS > TERRORISTS AND INFORMATION WARFARE
EACH COMPUTER AND DEVICE INDIVIDUALLY INSTEAD OF ADDRESSING
SECURITY BASICS PROTECTION OF THE NETWORK AS A WHOLE
> NETWORK SECURITY FOCUSES ON SECURITY OF DATA AS IT IS Ø THE CONCEPT OF LEAST PRIVILEGE APPLIES TO MORE NETWORK
TRANSMITTED BETWEEN NETWORKED SYSTEMS. (E.G. AUTHENTICATION SECURITY ISSUES THAN JUST PROVIDING USERS WITH SPECIFIC RIGHTS
PROTOCOLS, ENCRYPTION OF TRANSMITTED DATA, FIREWALLS) AND PERMISSIONS.
THE CIA OF SECURITY Ø ANOTHER ISSUE IN LEAST PRIVILEGE CONCEPT IS THE SECURITY
CONTEXT IN WHICH AN APPLICATION RUNS. ALL APPLICATIONS, SCRIPTS,
Ø CONFIDENTIALITY — ENSURE THAT ONLY THOSE INDIVIDUALS WHO HAVE AND BATCH FILES RUN IN THE SECURITY CONTEXT OF A SPECIFIC USER ON
THE AUTHORITY TO VIEW A PIECE OF INFORMATION MAY DO SO. AN OPERATING SYSTEM
DIVERSITY OF DEFENSE
ACCESS CONTROL