Professional Documents
Culture Documents
Week1 Into (From Discoverig Comp)
Week1 Into (From Discoverig Comp)
Chapter 11
Computer Security,
Ethics and Privacy
Chapter 11 Objectives
Describe Discuss
Discussthe
thetypes
typesof
ofdevices
devicesavailable
availablethat
that
Describethe
thetypes
typesof
ofcomputer
computersecurity
securityrisks
risks
protect
protectcomputers
computersfrom
fromsystem
systemfailure
failure
Identify
Identifyways
waystotosafeguard
safeguardagainst
against Explain
Explainthe
theoptions
optionsavailable
availablefor
forbacking
backingup
up
computer
computerviruses,
viruses,worms,
worms,Trojan
Trojanhorses,
horses, computer
computerresources
resources
botnets,
botnets, denial of service attacks,back
denial of service attacks, back
doors,
doors,and
andspoofing
spoofing
Identify
Identifyrisks
risksand
andsafeguards
safeguardsassociated
associatedwith
with
wireless
wirelesscommunications
communications
Discuss
Discusstechniques
techniquesto
toprevent
preventunauthorized
unauthorized
computer
computeraccess
accessand
anduse
use
Recognize
Recognizeissues
issuesrelated
relatedto
toinformation
information
accuracy,
accuracy,rights,
rights,and
andconduct
conduct
Identify
Identifysafeguards
safeguardsagainst
againsthardware
hardwaretheft
theft
and
andvandalism
vandalism
Discuss
Discussissues
issuessurrounding
surroundinginformation
information
privacy
privacy
Explain
Explainthe
theways
wayssoftware
softwaremanufacturers
manufacturers
protect
protectagainst
againstsoftware
softwarepiracy
piracy
Discuss
Discussways
waystotoprevent
preventhealth-related
health-related
disorders
disordersand
andinjuries
injuriesdue
dueto
tocomputer
computeruse
use
Define
Defineencryption
encryptionand
andexplain
explainwhy
whyititisis
necessary
necessary
Next
Computer Security Risks
What is a computer security risk?
Event or action that causes loss of or damage to
computer system
p. 558 Next
Internet and Network Attacks
CLICK TO START
Next
Internet and Network Attacks
p. 561 Next
Internet and Network Attacks
What are some tips for preventing virus, worm, and Trojan
horse infections?
Never open an
Never start a e-mail attachment
Install an antivirus
computer with unless you are
program on all of
removable media expecting it and
your computers
inserted it is from a
trusted source
If the antivirus
Check all
program flags an
downloaded
e-mail attachment Install a personal
programs for
as infected, delete firewall program
viruses, worms,
the attachment
or Trojan horses
immediately
What is a firewall?
Security system consisting of hardware and/or
software that prevents unauthorized intrusion
Secure site
Many Web browsers
is Web site that uses
use encryption
encryption to secure data
p. 574 Next
System Failure
What is a surge protector?
Protects computer and
equipment from electrical power
disturbances
Uninterruptible power supply
(UPS) is surge protector that
provides power during power loss
Three-generation
Three-generation
Full
Fullbackup
backup Selective
Selectivebackup
backup backup
backup
all
allfiles
filesinin select
selectwhich
whichfiles
files preserves
preserves
computer
computer totoback
backup
up three
threecopies
copiesofof
important
importantfiles
files
p. 576 Next
Wireless Security
How can I ensure my wireless communication is
secure?
Secure your wireless access point (WAP)
WAP should not broadcast your network name
Enable Wired Equivalent Privacy or Wi-Fi
Protected Access (WPA)
Unauthorized use of
computers and Software theft Information accuracy
networks
Intellectual property
rights—rights to which
Codes of conduct
creators are entitled for
their work
p. 581 Next
Information Privacy
What is an electronic profile?
Data collected when you fill out form on Web
Merchants sell
your electronic
profile
Often you can
specify whether
you want
personal
information
distributed
Set browser to
Some Web sites
User Small file on accept cookies,
sell or trade
preferences your computer prompt you to
information
that contains accept cookies,
stored in your
data about you or disable
cookies
cookies
How
regularly
you visit Interests
Web sites and
browsing
habits
p. 582 Next
Information Privacy
How do cookies work?
Service that
E-mail filtering
Collects spam in
blocks e-mail
central location
messages from
that you can
designated
view any time
sources
Anti-spam program
Sometimes
Attempts to
removes valid
remove spam
e-mail messages
p. 584 Next
Information Privacy
What is phishing?
p. 584 Next
Information Privacy
What privacy laws have been enacted?
p. 587 Next
Health Concerns of Computer Use
What are some health concerns of computer use?
Computer vision syndrome
(CVS)—eye and vision
problems
Carpal
Carpal tunnel
tunnel syndrome
syndrome (CTS)
(CTS)
—inflammation
—inflammation ofof nerve
nerve that
that
connects
connects forearm
forearm toto palm
palm
Tendonitis—inflammation
Tendonitis—inflammation ofof
tendon
tendon due
due to
to repeated
repeated motion
motion
Computer addiction—when
computer consumes entire
Click to view Web
Link, click Chapter social life
11, Click Web Link
from left navigation,
then click RSIs
below Chapter 11
p. 587 - 589 Next
Health Concerns of Computer Use
What precautions can prevent tendonitis or carpal
tunnel syndrome?
Spread fingers apart for several seconds while keeping
wrists straight
Gently push back fingers and
then thumb
Dangle arms
loosely at sides and
then shake arms
and hands
adjustable
seat
adjustable
height chair
with 4 or 5
legs for
stability
Potential
Potentialcomputer
computerrisks
risks
Ethical
Ethicalissues
issuessurrounding
surroundinginformation
information
accuracy,
accuracy,intellectual
intellectualproperty
propertyrights,
rights,codes
codes
of
ofconduct,
conduct,and
andinformation
informationprivacy
privacy
Safeguards
Safeguardsthat
thatschools,
schools,
business,
business,and
andindividuals
individualscan
can
implement
implement to minimize theserisks
to minimize these risks
Computer-related
Computer-relatedhealth
healthissues,
issues,
their
theirpreventions,
preventions,and
andways
waystoto
keep the environment healthy
keep the environment healthy
Wireless
Wirelesssecurity
securityrisks
risksand
andsafeguards
safeguards
Chapter 11 Complete