lect 07 computer security and privacy 1 4 q
TRANSCRIPT
![Page 1: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/1.jpg)
1
Arab Academy for Science &Technology & Maritime Transport
College of Computing and Information Technology
Computer Science Department
![Page 2: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/2.jpg)
2
• There are a number of security concerns related to computers that users should be aware of, including:
• Having a PC stolen
• Losing important data
• Losing contact lists
• Pirated or counterfeited products
![Page 3: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/3.jpg)
3
![Page 4: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/4.jpg)
4
• Hardware damage: Can be accidental or inten>onal
• System failure: The complete malfunc>on of a computer system
• Can be due to a hardware problem, so?ware problem, or computer virus
• Can be due to a natural disaster or planned a@ack
![Page 5: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/5.jpg)
5
• Use door and computer equipment locks
• Cable locks • Security slots
![Page 6: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/6.jpg)
6
• Use encryp7on to protect data • Increasingly used with USB flash drives, notebook PCs, hard drives, etc.
• Full disk encryp>on (FDE): Everything on storage medium is encrypted
• Self-‐encryp>ng hard drive: A hard drive using FDE
![Page 7: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/7.jpg)
7
• Computer tracking so;ware: Used to find a PC a?er it is lost or stolen • Sends out iden>fying data via the Internet • Law enforcement can use this data to recover the PC • Most o?en used with PCs but also available for other devices
• Kill switch: So?ware used to destroy sensi>ve data on a stolen or lost PC
• Other precau>ons: • Alarm so;ware, tamper evident labels, etc. • Common sense
![Page 8: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/8.jpg)
8
• Proper hardware care: Needed to prevent damage
• Ruggedized PCs: Designed for more abuse than conven>onal hardware
![Page 9: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/9.jpg)
9
• Surge suppressor: Protects hardware from damage due to electrical fluctua>ons
• Uninterrup7ble power supply (UPS): Provides con>nuous power to a computer system for a period of >me a?er the power goes off
![Page 10: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/10.jpg)
10
• Also: • Watch dust, moisture, sta7c, heat, etc.
• Avoid head crash • Stop USB devices before removing
• Use screen protectors, jewel cases, etc.
![Page 11: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/11.jpg)
11
• Backup and disaster recovery plans: • Both businesses and individuals should use appropriate backup procedures
• Con>nuous data protec>on (CDP): Enables data backups to be made on a con>nual basis
• Backup media needs to be secured • Data storage companies store backup media at secure remote loca>ons
• Online backup is another possibility • Disaster-‐recovery plan: Spells out what an organiza>on will do to prepare for and recover from a disrup>ve event • Hot sites
![Page 12: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/12.jpg)
12
• So;ware piracy: Unauthorized copying of a computer program • Widespread, global problem
• Occurs when: • Individuals make illegal copies of so?ware to give to friends
• Businesses or individuals install so?ware on more than the number of computers allowed according to the end-‐user license agreement (EULA)
• Sellers install unlicensed copies on PCs sold to consumers
• Large-‐scale opera>ons in which programs and packaging are illegally duplicated and sold as supposedly legi>mate products
![Page 13: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/13.jpg)
13
• Digital counterfei7ng: The use of computers to make illegal copies of currency, checks, collec>bles, and other items • O?en scanned and printed or color-‐copied
![Page 14: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/14.jpg)
14
![Page 15: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/15.jpg)
15
• Protec7ng against digital counterfei7ng • New currency designs
• Microprin>ng, watermarks, security thread, etc. • Special paper is used with U.S. currency
• Iden>fying technology included in digital imaging hardware
• Digital watermarks: Subtle altera>on to a digital item that is not no>ceable but that can be retrieved to iden>fy the owner of the item
• Also can use: • Holograms, RFID tags, and other hard-‐to-‐reproduce content
![Page 16: Lect 07 computer security and privacy 1 4 q](https://reader033.vdocuments.net/reader033/viewer/2022060119/558d16bbd8b42af5408b45ee/html5/thumbnails/16.jpg)
16
• Privacy: State of being concealed or free from unauthorized intrusion
• Informa7on privacy: Rights of individuals and companies to control how informa>on about them is collected and used
• Computers add addi7onal privacy challenges • Many data breaches recently due to lost or stolen hardware, carelessness with documents containing sensi>ve data, database breaches, etc. • Businesses need to be concerned with the expense, damage to reputa>on, and possible lawsuits