SYSTEM SECURITY, ICT ETHICAL ISSUES AND EMERGING
TECHNOLOGIES.

*Computer System Security.
*Privacy and ICT Ethical Issues.
*Emerging Technologies. ICT industry

What is a computer security risk?
 Action that causes loss of or damage to computer system Examples
 Information theft
 Soft ware theft
 System failure
 Computer viruses,worms and trogern horse
 Hard ware theft
 Unauthorized access and use of computer (hacking)

What are viruses, worms,and Trojan horses?
Virus is a potentially damaging computer program. It can spread and damage files
Worm copies itself repeatedly, using up resources and possibly shutting
down computer or network
Trojan horse hides within or looks like legitimate program until triggered but it does not
replicate itself on other computers
How can you protect your system from a macro virus?
 Set macro security level in applications that allow you to write macros
 At medium security level, warning displays that document contains macro
 Macros are instructions saved in an application, such as word processing or
spreadsheet program What is an antivirus program?
 Identifies and removes computer viruses
 Most also protect against worms and Trojan horses What is a virus signature?
Specific pattern of virus code
Also called virus definition
So the Antivirus programs look for virus signatures
What happens if an antivirus program identifies an infected file?
Attempts to remove any detected virus
 Quarantines infected files that it cannot remove
 Keeps file in separate area of hard disk What is a recovery disk?
 Removable disk that contains uninfected copy of key operating system commands that
enables computer to restart
 Also called rescue disk
 Once computer restarts, antivirus program can
attempt to repair damaged files
What are some tips for preventing virus, worm, and Trojan horse infections?
 Set the macro security in programs so you can enable or disable macros
 Install an antivirus program on all of your computers
 Never open an e-mail attachment unless you are expecting it and it is from a
trusted source
 If the antivirus program flags an e-mail attachment as infected, delete the
attachment immediately
 Check all downloaded programs for viruses, worms, or Trojan horses
 Install a personal firewall program
What is unauthorized access and how is it achieved?
 Use of a computer or network without permission
 Hackers typically break into computer by connecting to it and then logging in as
a legitimate user
 Hacker, or cracker, is someone who tries to access a computer or network
illegally
What is a firewall?
Security system consisting of hardware and/or software that prevents unauthorized network
access
How can companies protect against hackers?
 Intrusion detection software analyzes network traffic, assesses system
vulnerabilities, and identifies intrusions and suspicious behavior
 Access control defines who can access computer and what actions they can take
 Audit trail records access attempts What is a user name?
 Unique combination of characters that identifies user
Password is private combination of characters associated with the user name that allows access
to computer resources
How can you make your password more secure?
 Longer passwords provide greater security
What is a possessed object?
 Item that you must carry to gain access to computer or facility
 Often used with numeric password called personal identification number (PIN)
What is a biometric device?
 Authenticates person’s identity using personal characteristic
Fingerprint, hand geometry, voice, signature, and iris

What is a callback system?
User connects to computer only after the computer calls that user back at a previously
established telephone number
Some networks utilize callback systems as an access control method to authenticate
remote or mobile users
 Callback systems work best for users who regularly work at the same remote location,
such as at home or branch office
What are hardware theft and hardware vandalism?
 Hardware theft is act of stealing computer equipment
 Cables sometimes used to lock equipment
 Some notebook computers use passwords, possessed objects, and
biometrics as security methods
 For PDAs, you can password-protect the device
 Hardware vandalism is act of defacing or destroying computer equipment

What is software theft?
 Act of stealing or illegally copying software or intentionally erasing programs
Software piracy
is illegal duplication of copyrighted software

Whatis a license agreement?
 Right to use software
Single-user license agreement allows user to install software on one computer, make
backup copy, and sell software after removing from computer
What is product activation?
Product activation allows user to input product identification number online or by phone and
receive unique installation identification number

What is encryption?
-Safeguards against information theft
 Process of converting plaintext (readable data) into ciphertext (unreadable
characters)
 Encryption key (formula) often uses more than one method
 To read the data, the recipient must decrypt, or decipher, the data
What is a system failure?
-Prolonged malfunction of computer Can
cause loss of hardware, software, or data
Causes of system failure
 Caused by aging hardware, natural disasters, or electrical power disturbances
What is a surge protector?
 Protects computer and equipment from electrical power disturbances Eg
Uninterruptible power supply (UPS) is surge protector that provides power
during power loss

What is a backup?
Duplicate of file, program, or disk

What is adenial of service attack?

………………………………………………………………………
What is a certificate authority (CA)?
 Authorized person or company that issues and verifies digital certificates
 Users apply for digital certificate from CA
Pretty Good Privacy (PGP) is popular e-mail encryption program
 Freeware for personal, non-commercial use
 Digital signature is encrypted code attached to e-mail message to verify identity
of sender
What are computer ethics?
Moral guidelines that govern use of computers and information systems

What is a cookie?
Small file on your computer that contains data about you
It tells ;
– How regularly you visit a web site
– Your Interests and browsing habits

– User preferences
Danger
Some Web sites sell or trade information stored in your cookies How do cookies
work?
Step 1. When you type Web address of Web site in your browser window, browser program
searches your hard disk for a cookie associated with Web site. Step 2. If browser finds a
cookie, it sends information in cookie file to Web site.
Step 3. If Web site does not receive cookie information, and is expecting it, Web site creates
an identification number for you in its database and sends that number to your browser.
Browser in turn creates a cookie file based on that number and stores cookie file on your hard
disk. Web site now can update information in cookie files whenever you access the site.
What are spyware and spam?
Spyware is program placed on computer without user’s knowledge
Secretly collects information about user

Spam is unsolicited e-mailmessage sent to many recipients

How can you control spam?
E-mail filtering
Anti-spam program

What is content filtering?
Process of restricting access to certain material
Internet Content Rating Association (ICRA) provides rating system of
Web content
Web filtering software restricts access to specified sites

What are some health concerns of computer use?
-Computer vision syndrome (CVS)—eye and vision problems
-Carpal tunnel syndrome (CTS)—inflammation of nerve that connects
forearm to palm
-Repetitive strain injury (RSI)
-Tendonitis—inflammation of tendon due to repeated motion Computer
-addiction—when computer consumes entire social life
What precautions can prevent tendonitis or carpal tunnel syndrome?
-Take frequent breaks during computer session
-Use wrist rest
-Exercise hands and arms
-Minimize number of times you switch between mouse and keyboard How
can you ease eyestrain when working at the computer?

What is ergonomics?
Applied science devoted to comfort, efficiency, and safety in workplace

What is green computing?
Green computing is the environmentally responsible and eco-friendly use of computers and their resources.

3 thoughts on “System Security and Emerging Technology”

Leave a Reply

Your email address will not be published. Required fields are marked *