computer security b
TRANSCRIPT
![Page 1: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/1.jpg)
Computer Security
Part 1 of 2Small book by Shelly
Cashman that came with text.
![Page 2: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/2.jpg)
Top 10 Hackers Who Got Caught
![Page 3: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/3.jpg)
Gerald Martin hacked into the system of a company that competed with his. – NY Times
![Page 6: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/6.jpg)
Figure 10-1, pg. 382
![Page 7: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/7.jpg)
Internet and Network AttacksVirus Worm Trojan Rootkit
Infects, negatively altering the way computer works
Copies itself repeatedly, using up resources
Needs certain condition to trigger, does not replicate
Allows person to take over your computer from remote location.
![Page 8: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/8.jpg)
![Page 9: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/9.jpg)
Figure 10-2 from pg. 385
![Page 10: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/10.jpg)
Tro-jan Pro-
grams;
3.90%
Viruses;
7.00%
Network Worms; 89.10%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Porta-ble Media; 1.30%
In-ternet; 2.30%
Email; 93.40%
Main Virus Threat
![Page 11: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/11.jpg)
Safeguards against computer viruses and other malware
![Page 12: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/12.jpg)
![Page 13: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/13.jpg)
Figure 10-5 from pg. 388 of your book
![Page 14: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/14.jpg)
Safeguards
![Page 15: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/15.jpg)
Hardware Theft and Vandalism
![Page 17: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/17.jpg)
Information Theft (Encryption)
![Page 18: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/18.jpg)
Information Theft (Digital Signature)
![Page 19: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/19.jpg)
System Failure
Uninterruptible Power Supply (UPS)
![Page 20: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/20.jpg)
Backing Up – The Ultimate Safeguard
![Page 21: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/21.jpg)
Wireless Security
Wireless Access Point (WAP)
![Page 22: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/22.jpg)
![Page 23: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/23.jpg)
802.11i network
![Page 24: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/24.jpg)
Health Concerns: Repetitive Strain Injury
![Page 25: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/25.jpg)
Health Concerns: Computer Vision Syndrome
![Page 26: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/26.jpg)
![Page 28: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/28.jpg)
Ethics and Society: Information Accuracy
• National Press Photographers Association
![Page 29: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/29.jpg)
Ethics and Society: Intellectual Property Rights
![Page 30: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/30.jpg)
Ethics and Society: Green Computing
![Page 31: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/31.jpg)
Information Privacy: Electronic Profiles
![Page 32: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/32.jpg)
Information Privacy:
Cookies
Look in your book, pg. 404, at figure 10-22 about “How Cookies Work”
![Page 33: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/33.jpg)
Information Privacy: Spyware and Adware
![Page 34: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/34.jpg)
Information
Privacy: Spam
![Page 35: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/35.jpg)
Information Privacy: Phishing
![Page 36: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/36.jpg)
Information Privacy: Social Engineering
![Page 37: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/37.jpg)
Privacy Laws: Employee Monitoring
![Page 38: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/38.jpg)
Privacy Laws: Content Filtering
![Page 39: Computer security b](https://reader033.vdocuments.net/reader033/viewer/2022060118/558a4df1d8b42a7a128b46b1/html5/thumbnails/39.jpg)
• Complete both worksheets by Monday beginning of class.
• Complete take home test by Monday beginning of class.
Assignment