SYSTEM SECURITY, ICT ETHICAL ISSUES AND EMERGING
TECHNOLOGIES.
*Computer System Security.
*Privacy and ICT Ethical Issues.
*Emerging Technologies. ICT industry
What is a computer security risk?
Action that causes loss of or damage to computer system Examples
Information theft
Soft ware theft
System failure
Computer viruses,worms and trogern horse
Hard ware theft
Unauthorized access and use of computer (hacking)
What are viruses, worms,and Trojan horses?
Virus is a potentially damaging computer program. It can spread and damage files
Worm copies itself repeatedly, using up resources and possibly shutting
down computer or network
Trojan horse hides within or looks like legitimate program until triggered but it does not
replicate itself on other computers
How can you protect your system from a macro virus?
Set macro security level in applications that allow you to write macros
At medium security level, warning displays that document contains macro
Macros are instructions saved in an application, such as word processing or
spreadsheet program What is an antivirus program?
Identifies and removes computer viruses
Most also protect against worms and Trojan horses What is a virus signature?
Specific pattern of virus code
Also called virus definition
So the Antivirus programs look for virus signatures
What happens if an antivirus program identifies an infected file?
Attempts to remove any detected virus
Quarantines infected files that it cannot remove
Keeps file in separate area of hard disk What is a recovery disk?
Removable disk that contains uninfected copy of key operating system commands that
enables computer to restart
Also called rescue disk
Once computer restarts, antivirus program can
attempt to repair damaged files
What are some tips for preventing virus, worm, and Trojan horse infections?
Set the macro security in programs so you can enable or disable macros
Install an antivirus program on all of your computers
Never open an e-mail attachment unless you are expecting it and it is from a
trusted source
If the antivirus program flags an e-mail attachment as infected, delete the
attachment immediately
Check all downloaded programs for viruses, worms, or Trojan horses
Install a personal firewall program
What is unauthorized access and how is it achieved?
Use of a computer or network without permission
Hackers typically break into computer by connecting to it and then logging in as
a legitimate user
Hacker, or cracker, is someone who tries to access a computer or network
illegally
What is a firewall?
Security system consisting of hardware and/or software that prevents unauthorized network
access
How can companies protect against hackers?
Intrusion detection software analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior
Access control defines who can access computer and what actions they can take
Audit trail records access attempts What is a user name?
Unique combination of characters that identifies user
Password is private combination of characters associated with the user name that allows access
to computer resources
How can you make your password more secure?
Longer passwords provide greater security
What is a possessed object?
Item that you must carry to gain access to computer or facility
Often used with numeric password called personal identification number (PIN)
What is a biometric device?
Authenticates person’s identity using personal characteristic
Fingerprint, hand geometry, voice, signature, and iris
What is a callback system?
User connects to computer only after the computer calls that user back at a previously
established telephone number
Some networks utilize callback systems as an access control method to authenticate
remote or mobile users
Callback systems work best for users who regularly work at the same remote location,
such as at home or branch office
What are hardware theft and hardware vandalism?
Hardware theft is act of stealing computer equipment
Cables sometimes used to lock equipment
Some notebook computers use passwords, possessed objects, and
biometrics as security methods
For PDAs, you can password-protect the device
Hardware vandalism is act of defacing or destroying computer equipment
What is software theft?
Act of stealing or illegally copying software or intentionally erasing programs
Software piracy
is illegal duplication of copyrighted software
Whatis a license agreement?
Right to use software
Single-user license agreement allows user to install software on one computer, make
backup copy, and sell software after removing from computer
What is product activation?
Product activation allows user to input product identification number online or by phone and
receive unique installation identification number
What is encryption?
-Safeguards against information theft
Process of converting plaintext (readable data) into ciphertext (unreadable
characters)
Encryption key (formula) often uses more than one method
To read the data, the recipient must decrypt, or decipher, the data
What is a system failure?
-Prolonged malfunction of computer Can
cause loss of hardware, software, or data
Causes of system failure
Caused by aging hardware, natural disasters, or electrical power disturbances
What is a surge protector?
Protects computer and equipment from electrical power disturbances Eg
Uninterruptible power supply (UPS) is surge protector that provides power
during power loss
What is a backup?
Duplicate of file, program, or disk
What is adenial of service attack?
………………………………………………………………………
What is a certificate authority (CA)?
Authorized person or company that issues and verifies digital certificates
Users apply for digital certificate from CA
Pretty Good Privacy (PGP) is popular e-mail encryption program
Freeware for personal, non-commercial use
Digital signature is encrypted code attached to e-mail message to verify identity
of sender
What are computer ethics?
Moral guidelines that govern use of computers and information systems
What is a cookie?
Small file on your computer that contains data about you
It tells ;
– How regularly you visit a web site
– Your Interests and browsing habits
– User preferences
Danger
Some Web sites sell or trade information stored in your cookies How do cookies
work?
Step 1. When you type Web address of Web site in your browser window, browser program
searches your hard disk for a cookie associated with Web site. Step 2. If browser finds a
cookie, it sends information in cookie file to Web site.
Step 3. If Web site does not receive cookie information, and is expecting it, Web site creates
an identification number for you in its database and sends that number to your browser.
Browser in turn creates a cookie file based on that number and stores cookie file on your hard
disk. Web site now can update information in cookie files whenever you access the site.
What are spyware and spam?
Spyware is program placed on computer without user’s knowledge
Secretly collects information about user
Spam is unsolicited e-mailmessage sent to many recipients
How can you control spam?
E-mail filtering
Anti-spam program
What is content filtering?
Process of restricting access to certain material
Internet Content Rating Association (ICRA) provides rating system of
Web content
Web filtering software restricts access to specified sites
What are some health concerns of computer use?
-Computer vision syndrome (CVS)—eye and vision problems
-Carpal tunnel syndrome (CTS)—inflammation of nerve that connects
forearm to palm
-Repetitive strain injury (RSI)
-Tendonitis—inflammation of tendon due to repeated motion Computer
-addiction—when computer consumes entire social life
What precautions can prevent tendonitis or carpal tunnel syndrome?
-Take frequent breaks during computer session
-Use wrist rest
-Exercise hands and arms
-Minimize number of times you switch between mouse and keyboard How
can you ease eyestrain when working at the computer?
What is ergonomics?
Applied science devoted to comfort, efficiency, and safety in workplace
What is green computing?
Green computing is the environmentally responsible and eco-friendly use of computers and their resources.
welcome
i picked a lot i appreciate
welcome we hope to simplify work