Professional Documents
Culture Documents
Chapter 11
Chapter 11
Discovering
Computers 2012
Your Interactive Guide
to the Digital World
Objectives Overview
Unethical
Cyberextortionists Cyberterrorists
Employees
Computer
Worm Trojan Horse Rootkit
Virus
• Affects a • Copies itself • A malicious • Program that
computer repeatedly, program that hides in a
negatively by using up hides within computer
altering the resources or looks like and allows
way the and possibly a legitimate someone
computer shutting program from a
works down the remote
computer or location to
network take full
control
CLICK TO START
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
Pages 558 - 559 Discovering Computers 2012: Chapter 11 9
Page 559 Discovering Computers 2012: Chapter 11 10
Figure 11-3
Page 561 Discovering Computers 2012: Chapter 11 11
Figure 11-6
Internet and Network Attacks
Honeypot
• Vulnerable computer that is set up to entice an intruder to
break into it
Page 564 Discovering Computers 2012: Chapter 11 15
16 Discovering Computers 2012: Chapter 11 Page 564
Unauthorized use is the use of
Unauthorized access is the
a computer or its data for
use of a computer or network
unapproved or possibly illegal
without permission
activities
Unauthorized Access and Use
Unauthorized Access and Use
• Organizations take
several measures to
help prevent
unauthorized access
and use
– Acceptable use policy
– Disable file and printer
sharing
– Firewalls
– Intrusion detection
software
Information
Insurance
security
agencies
departments
Page 569 Discovering Computers 2012: Chapter 11 20
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Intentionally erases
Steals software media
programs
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Page 571 Discovering Computers 2012: Chapter 11 24
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
Cloud Storage
Parent
Child
Configure a WAP
so that only Use WPA or WPA2
certain devices can security standards
access it
Page 578 Discovering Computers 2012: Chapter 11 37
Health Concerns of Computer Use
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
Track how
Target
often users visit
advertisements
a site
Pages 585 – 586 Discovering Computers 2012: Chapter 11 50
Ethics and Society
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks
e-mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox
Discovering
Computers 2012
Your Interactive Guide
to the Digital World
Chapter 11 Complete