Computer Security B
-
Upload
carolyn-brockman -
Category
Education
-
view
126 -
download
0
description
Transcript of Computer Security B
Computer Security
Part 2 of 2Small book by Shelly
Cashman that came with text.
Top 10 Hackers Who Got Caught
Gerald Martin hacked into the system of a company that competed with his. – NY Times
Anonymous “A Leaderless Hacker Group”
Figure 10-1, pg. 382
Internet and Network AttacksVirus Worm Trojan Rootkit
Infects, negatively altering the way computer works
Copies itself repeatedly, using up resources
Needs certain condition to trigger, does not replicate
Allows person to take over your computer from remote location.
Figure 10-2 from pg. 385
Tro-jan Pro-
grams;
3.90%
Viruses;
7.00%
Network Worms; 89.10%
Malicious Program Types
http://www.securelist.com/en/analysis/151436695/Virus_Review_2002
Porta-ble Media; 1.30%
In-ternet; 2.30%
Email; 93.40%
Main Virus Threat
Safeguards against computer viruses and other malware
Figure 10-5 from pg. 388 of your book
Safeguards
Hardware Theft and Vandalism
Information Theft (Encryption)
Information Theft (Digital Signature)
System Failure
Uninterruptible Power Supply (UPS)
Backing Up – The Ultimate Safeguard
Wireless Security
Wireless Access Point (WAP)
802.11i network
Health Concerns: Repetitive Strain Injury
Health Concerns: Computer Vision Syndrome
Ethics and Society: Information Accuracy
• National Press Photographers Association
Ethics and Society: Intellectual Property Rights
Ethics and Society: Green Computing
Information Privacy: Electronic Profiles
Information Privacy:
Cookies
Look in your book, pg. 404, at figure 10-22 about “How Cookies Work”
Information Privacy: Spyware and Adware
Information
Privacy: Spam
Information Privacy: Phishing
Information Privacy: Social Engineering
Privacy Laws: Employee Monitoring
Privacy Laws: Content Filtering
• Complete both worksheets by Monday beginning of class.
• Complete take home test by Monday beginning of class.
Assignment