Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer...
-
Upload
clifford-oneal -
Category
Documents
-
view
223 -
download
0
Transcript of Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer...
![Page 1: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/1.jpg)
Computer and Online Security
![Page 2: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/2.jpg)
CybercrimeOnline or Internet-based illegal acts
What is a computer security risk?
Computer crimeAny illegal act involving
a computer
Event or action that causes loss
of or damage to a computer system
![Page 3: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/3.jpg)
What is a computer virus? Potentially damaging
program that affects computer negatively by altering way computer works
Segment of program code from some outside source that implants itself in computer
![Page 4: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/4.jpg)
What are the ways viruses can be activated?
Opening infected file
Running infected program
Booting computer with infected floppy disk in disk drive
![Page 5: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/5.jpg)
What is the source of a virus?
Written by programmer• Some write
viruses as challenge
• Others write viruses to cause destruction or to slow Internet
![Page 6: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/6.jpg)
What are signs of a virus infection?
![Page 7: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/7.jpg)
Boot sector virus• Resides in boot sector of
floppy disk or master boot record of hard disk
What are the three main types of virus?
File virus• Attaches itself to
program files Macro virus• When you open
document that contains infected macro, virus loads into memory
![Page 8: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/8.jpg)
How do viruses activate?
Logic bomb
Virus that activates when it detects certain condition
Time bomb
Type of logic bomb that activates on particular date
Malware
Malicious-logic programWorm and Trojan Horse
Acts without user’s knowledge and alters computer’s operations
![Page 9: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/9.jpg)
What does an antivirus program do? Detects and identifies
viruses Inoculates existing
program files Removes or quarantines
viruses Creates rescue disk
![Page 10: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/10.jpg)
How does an antivirus program scan for a virus?
Scans for• Programs that attempt to
modify boot program, operating system, and other programs that normally read from but not modified
• Files you download from the Web
• E-mail attachments• Files you open• All removable media,
such as a floppy
![Page 11: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/11.jpg)
How does an antivirus program inoculate a program file? Antivirus program records
file size and creation dateand uses this information to detect if a virus tamperswith inoculated program file
![Page 12: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/12.jpg)
What does an antivirus program do once it detects a virus?
Removes virus if possible
Quarantines infected file in folder on hard disk
![Page 13: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/13.jpg)
What is a rescue disk? Removable disk that
contains uninfected copy of key operating system commands and startup information
Upon startup, rescue disk finds and removes boot sector virus
![Page 14: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/14.jpg)
What should you do if a virus infects your system? Remove virus If you share data
with other users, then immediately inform them of virus infection
![Page 15: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/15.jpg)
How can you stay informed about viruses? Several Web
sites publish list of virus alerts and virus hoaxes
Virus hoaxE-mail message
that warns you of non-existent virus
![Page 16: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/16.jpg)
Use of computer or network without permission
CrackerSomeone who tries
to access a computer or
network illegally
HackerOnce used as a
complimentary word for a computer enthusiast
Now another word for cracker
What is unauthorized access?
![Page 17: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/17.jpg)
User names and passwords
Possessed objects
(badge or card)
Biometric devices
Callback systems
(computer calls back)
How can unauthorized access and use be prevented?
![Page 18: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/18.jpg)
How can you make your password more secure? Longer passwords provide greater security
![Page 19: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/19.jpg)
What is encryption? Process of converting
readable data into unreadable characters to prevent unauthorized access
Used to transmit files over Internet
PlaintextUnencrypted, readable data
CiphertextThe encrypted (scrambled) data
encryption software
PlaintextUnencrypted, readable data
encryption key
![Page 20: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/20.jpg)
What are some data encryption methods? Encryption key (formula) often uses more than
one of these methods
![Page 21: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/21.jpg)
Encryption
Most computer encryption systems belong in one of two categories: • Symmetric-key encryption
• Public-key encryption
![Page 22: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/22.jpg)
Step 1: Sender creates document to be e-mailed to receiver.
Sender (Joan)
message to be sent
Step 2: Sender uses receiver’s public key to encrypt a message.
Sender (Joan)
message to be sent
public key
encrypted message
Step 3: Receiver uses his or her private key to decrypt the message.
Sender (Joan)
message to be sent
public key private key
encrypted message
Step 4: Receiver can read or print the decrypted message.
Sender (Sylvia)
Receiver (Doug)
message to be sent
decrypted message
public key private key
encrypted message
Computer Security: Risks and SafeguardsHow does public key encryption work?
![Page 23: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/23.jpg)
Internet and Network Security
How do Web browsers provide secure data transmission? Many Web browsers
use encryption Web site that uses
encryption techniques to secure its data is known as secure site• Use digital
certificates with security protocol
Digital certificate
Notice that guarantees user or
Web site is legitimate
Also called public-key certificate
![Page 24: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/24.jpg)
What is Secure Sockets Layer (SSL)? Provides
private-key encryption of all data that passes betweenclient and server
https indicates secure connection
![Page 25: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/25.jpg)
Securing Email MessagesWhat is Pretty Good Privacy (PGP)?
One of most popular e-mail digital encryption programs
Freeware for personal, non-commercial users Uses public-key encryption scheme
![Page 26: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/26.jpg)
What is a digital signature? Encrypted code that person, Web site, or
company attaches to electronic message to verify identity of message sender • Code usually consists of user's name and hash
of all or part of message
HashMathematical formula that
generates code from contents of message
![Page 27: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/27.jpg)
What is a personal firewall? Software program that detects and protects personal
computer and its data from unauthorized intrusions
Constantly monitors all transmissions to and from computer
Informs you of any attempted intrusions
![Page 28: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/28.jpg)
Each packet's header will contain the proper protocols, the originating address (the IP address of your computer), the destination address (the IP address of the computer where you are sending the e-mail) and the packet number (1, 2, 3 or 4 since there are 4 packets). Routers in the network will look at the destination address in the header and compare it to their lookup table to find out where to send the packet. Once the packet arrives at its destination, your friend's computer will strip the header and trailer off each packet and reassemble the e-mail based on the numbered sequence of the packets
![Page 29: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/29.jpg)
Information Privacy• Information Privacy refers to the right
of individuals and companies to deny or restrict the collection and use of information about them.
![Page 30: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/30.jpg)
Track user preferences
What is a cookie? Small file that Web server
stores on your computer Typically contains data
about you Web site can read data
only from its own cookie file
Some Web sites sell or trade information stored in your cookie to advertisers
Track how regularly you visit site and Web pages you visit when
at site
Target advertisements to your interests and browsing habits
![Page 31: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/31.jpg)
How can cookies track user preferences?
Personal information you enter in form is converted to codes, which are stored
in cookie on your hard disk
Personal information you enter in form is converted to codes, which are stored
in cookie on your hard disk
Cookie for MSNBC saved in Cookies folder on
hard disk
Cookie for MSNBC saved in Cookies folder on
hard disk
![Page 32: Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal act involving.](https://reader035.fdocuments.net/reader035/viewer/2022081603/5697bfa51a28abf838c97ce1/html5/thumbnails/32.jpg)
What is a cookie manager? Software program that selectively blocks cookies