SlideShare a Scribd company logo
Lecture 10
COMPUTER SECURITY AND
SAFETY,ETHICS AND PRIVACY
Computer Security Risks
 A computer security risk is any event or action that could cause a loss
of or damage to computer hardware, software, data, information, or
processing capability.
 A cybercrime is an online or Internet-based illegal act.
Hackers Crackers
Script
Kiddies
Computer Security Risks
Internet and Network Attacks
Information transmitted over networks has a higher
degree of security risk than information kept on an
organization’s premises
An online security service is a Web site that
evaluates your computer to check for Internet and
e-mail vulnerabilities
Internet and Network Attacks
Internet and Network Attacks
 An infected computer has one or more of the following symptoms:
Internet and Network Attacks
Internet and Network Attacks
 A botnet is a group of compromised computers connected to
a network.
 A compromised computer is known as a zombie.
 A denial of service attack (DoS attack) disrupts computer
access to Internet services
 Distributed DoS (DDoS)
 A back door is a program or set of instructions in a program
that allow users to bypass security controls
 Spoofing is a technique intruders use to make their network or
Internet transmission appear legitimate
Internet and Network Attacks
A firewall is hardware and/or software that protects a
network’s resources from intrusion
Unauthorized Access and Uses
Unauthorized Access and Use
 Organizations take several measures to
help prevent unauthorized access and use
Acceptable use policy
Disable file and printer sharing
Firewalls
Intrusion detection software
Unauthorized Access and Use
 Access controls define who can
access a computer, when they can
access it, and what actions they
can take
 Two-phase processes called
identification and authentication
 User name
 Password
 Passphrase
 CAPTCHA
Unauthorized Access and Use
Unauthorized Access and Use
 Digital forensics is the discovery, collection, and analysis of
evidence found on computers and networks.
 Many areas use digital forensics.
Hardware Theft and Vandalism
Hardware theft is the
act of stealing
computer
equipment
Hardware vandalism
is the act of defacing
or destroying
computer
equipment
Hardware Theft and Vandalism
 To help reduce the of chances of theft, companies and schools use variety
of security measures.
Software Theft
Software theft occurs when someone:
Software Theft
 A single-user license agreement typically contains the following conditions:
Information Theft
Information theft occurs when someone steals
personal or confidential information
Encryption is a process of converting readable data
into unreadable characters to prevent
unauthorized access
Information Theft
Information Theft
A digital signature is an encrypted code that a person,
Web site, or organization attaches to an electronic
message to verify the identity of the sender
Often used to ensure that an impostor is not
participating in an Internet transaction
Web browsers and Web sites use encryption
techniques.
System Failure
 A system failure is the prolonged malfunction of a
computer
 A variety of factors can lead to system failure, including:
Aging hardware
Natural disasters
Electrical power problems
Noise, under-voltages, and over-voltages
Errors in computer programs
Backing Up – The Ultimate Safeguard
 A backup is a duplicate of a file, program, or disk that can
be used if the original is lost, damaged, or destroyed.
To back up a file means to make a copy of it
 Offsite backups are stored in a location separate from the
computer site.
Wireless Security
Wireless access poses additional security risks
About 80 percent of wireless networks have no security
protection
War driving allows individuals to detect wireless
networks while driving a vehicle through the area
Health Concerns of Computer Use
 The widespread use of
computers has led to health
concerns
Repetitive strain injury
(RSI)
Computer vision
syndrome (CVS)
Health Concerns of Computer Use
Computer addiction occurs when the computer consumes
someone’s entire social life
Symptoms of users include:
Craves
computer time
Overjoyed
when at the
computer
Unable to stop
computer
activity
Irritable when
not at the
computer
Neglects
family and
friends
Problems at
work or school
Ethics and Society
Computer ethics are the moral guidelines that
govern the use of computers and information
systems
Information accuracy is a concern
Not all information on the Web is correct
Ethics and Society
Intellectual property rights are the rights to
which creators are entitled for their work
• A copyright protects any tangible form of expression
An IT code of conduct is a written
guideline that helps determine whether a
specific computer action is ethical or
unethical
Ethics and Society
 Green computing involves reducing the electricity and environmental
waste while using a computer.
Ethics and Society
Information privacy refers to the right of
individuals and companies to deny or restrict the
collection and use of information about them
Huge databases store data online
It is important to safeguard your information
Ethics and Society
 A cookie is a small text file that a Web server stores on your
computer
 Web sites use cookies for a variety of reasons:
Ethics and Society
 Spam is an unsolicited e-mail
message or newsgroup
posting
 E-mail filtering blocks
e-mail messages from
designated sources
 Anti-spam programs attempt
to remove spam before it
reaches your inbox
Ethics and Society
Phishing is a scam in which a
perpetrator sends an official
looking e-mail message that
attempts to obtain your
personal and financial
information
Pharming is a scam where a
perpetrator attempts to obtain
your personal and financial
information via spoofing
Ethics and Society
Ethics and Society
Content filtering is the process
of restricting access to certain
material on the Web
Many businesses use content
filtering
Internet Content Rating
Association (ICRA)
Web filtering software restricts
access to specified Web sites
Summary

More Related Content

PPT
dataprivacyactof2012r-180802030546sada.ppt
PPTX
Chapter 5 - Digital Security, Ethics, Privacy.pptx
PPTX
Chapter 9 security privacy csc
PDF
14 - Computer Security.pdf
PPT
Security & ethical challenges
PPTX
Week 12
PPTX
Computer Security risks Shelly
PPTX
Computer Ethics and History Of computer .pptx
dataprivacyactof2012r-180802030546sada.ppt
Chapter 5 - Digital Security, Ethics, Privacy.pptx
Chapter 9 security privacy csc
14 - Computer Security.pdf
Security & ethical challenges
Week 12
Computer Security risks Shelly
Computer Ethics and History Of computer .pptx

Similar to Lecture 10.pptx For dpt computer security (20)

PPTX
Lecture 6 Cybersecurity-Basics and .pptx
PDF
Sec0001 .pdf
PPTX
Network Security Basics in networking to learn
PPT
MIS part 4_CH 11.ppt
PPTX
Security issues ethics in education chapter 8
PPTX
Ethics,security and privacy control
PPTX
Computer Security and their social effect and their usage.
PPTX
Module 8 security and ethical challenges
 
PPTX
Computer security and
PPTX
Chapter-10-Information Security and Cyber Crime.pptx
PPTX
Cyber security
PPTX
Chapter8
PDF
IS L07 - Security, Ethics and Privacy
PPTX
BCE L-3omputer security Basics.pptx
PPTX
c13 Security and Ethics(1)(1)(1).pptsasdax
PPT
Sahilmod 120315100301-phpapp01
PPTX
IT-Presentation.pptx
PDF
Lecture5
PPT
SHAILENDRA.ppt
PPTX
chapter 5.pptxggggggggggggggggggggggggggg
Lecture 6 Cybersecurity-Basics and .pptx
Sec0001 .pdf
Network Security Basics in networking to learn
MIS part 4_CH 11.ppt
Security issues ethics in education chapter 8
Ethics,security and privacy control
Computer Security and their social effect and their usage.
Module 8 security and ethical challenges
 
Computer security and
Chapter-10-Information Security and Cyber Crime.pptx
Cyber security
Chapter8
IS L07 - Security, Ethics and Privacy
BCE L-3omputer security Basics.pptx
c13 Security and Ethics(1)(1)(1).pptsasdax
Sahilmod 120315100301-phpapp01
IT-Presentation.pptx
Lecture5
SHAILENDRA.ppt
chapter 5.pptxggggggggggggggggggggggggggg
Ad

More from adilkhan55485453 (9)

PPTX
ex physiology terminals(1). presentation
PPTX
2. Physiology of cardiac muscles.presentation
PPTX
Coronary Circulation_Physiology circulation
PPTX
software and its types computer presentation
PPTX
ADJECTIVE.pptx english gramme presentation
PPTX
Hardware and Software by Slidesgo.pptx Computer
PPTX
shortcut.pptx Computer presentation about
PPTX
Anemia-guyton.pptx snells clanical anatomy
PPTX
Noun n.pptx English grammer noun and its types
ex physiology terminals(1). presentation
2. Physiology of cardiac muscles.presentation
Coronary Circulation_Physiology circulation
software and its types computer presentation
ADJECTIVE.pptx english gramme presentation
Hardware and Software by Slidesgo.pptx Computer
shortcut.pptx Computer presentation about
Anemia-guyton.pptx snells clanical anatomy
Noun n.pptx English grammer noun and its types
Ad

Recently uploaded (20)

PDF
Basic Mud Logging Guide for educational purpose
PDF
01-Introduction-to-Information-Management.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Pre independence Education in Inndia.pdf
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
Sports Quiz easy sports quiz sports quiz
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
RMMM.pdf make it easy to upload and study
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Cell Types and Its function , kingdom of life
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
master seminar digital applications in india
Basic Mud Logging Guide for educational purpose
01-Introduction-to-Information-Management.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Pre independence Education in Inndia.pdf
Anesthesia in Laparoscopic Surgery in India
Sports Quiz easy sports quiz sports quiz
STATICS OF THE RIGID BODIES Hibbelers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
RMMM.pdf make it easy to upload and study
Pharma ospi slides which help in ospi learning
Cell Types and Its function , kingdom of life
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Cell Structure & Organelles in detailed.
Microbial diseases, their pathogenesis and prophylaxis
PPH.pptx obstetrics and gynecology in nursing
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Module 4: Burden of Disease Tutorial Slides S2 2025
VCE English Exam - Section C Student Revision Booklet
master seminar digital applications in india

Lecture 10.pptx For dpt computer security

  • 1. Lecture 10 COMPUTER SECURITY AND SAFETY,ETHICS AND PRIVACY
  • 2. Computer Security Risks  A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.  A cybercrime is an online or Internet-based illegal act. Hackers Crackers Script Kiddies
  • 4. Internet and Network Attacks Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities
  • 6. Internet and Network Attacks  An infected computer has one or more of the following symptoms:
  • 8. Internet and Network Attacks  A botnet is a group of compromised computers connected to a network.  A compromised computer is known as a zombie.  A denial of service attack (DoS attack) disrupts computer access to Internet services  Distributed DoS (DDoS)  A back door is a program or set of instructions in a program that allow users to bypass security controls  Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
  • 9. Internet and Network Attacks A firewall is hardware and/or software that protects a network’s resources from intrusion
  • 11. Unauthorized Access and Use  Organizations take several measures to help prevent unauthorized access and use Acceptable use policy Disable file and printer sharing Firewalls Intrusion detection software
  • 12. Unauthorized Access and Use  Access controls define who can access a computer, when they can access it, and what actions they can take  Two-phase processes called identification and authentication  User name  Password  Passphrase  CAPTCHA
  • 14. Unauthorized Access and Use  Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.  Many areas use digital forensics.
  • 15. Hardware Theft and Vandalism Hardware theft is the act of stealing computer equipment Hardware vandalism is the act of defacing or destroying computer equipment
  • 16. Hardware Theft and Vandalism  To help reduce the of chances of theft, companies and schools use variety of security measures.
  • 17. Software Theft Software theft occurs when someone:
  • 18. Software Theft  A single-user license agreement typically contains the following conditions:
  • 19. Information Theft Information theft occurs when someone steals personal or confidential information Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access
  • 21. Information Theft A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender Often used to ensure that an impostor is not participating in an Internet transaction Web browsers and Web sites use encryption techniques.
  • 22. System Failure  A system failure is the prolonged malfunction of a computer  A variety of factors can lead to system failure, including: Aging hardware Natural disasters Electrical power problems Noise, under-voltages, and over-voltages Errors in computer programs
  • 23. Backing Up – The Ultimate Safeguard  A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. To back up a file means to make a copy of it  Offsite backups are stored in a location separate from the computer site.
  • 24. Wireless Security Wireless access poses additional security risks About 80 percent of wireless networks have no security protection War driving allows individuals to detect wireless networks while driving a vehicle through the area
  • 25. Health Concerns of Computer Use  The widespread use of computers has led to health concerns Repetitive strain injury (RSI) Computer vision syndrome (CVS)
  • 26. Health Concerns of Computer Use Computer addiction occurs when the computer consumes someone’s entire social life Symptoms of users include: Craves computer time Overjoyed when at the computer Unable to stop computer activity Irritable when not at the computer Neglects family and friends Problems at work or school
  • 27. Ethics and Society Computer ethics are the moral guidelines that govern the use of computers and information systems Information accuracy is a concern Not all information on the Web is correct
  • 28. Ethics and Society Intellectual property rights are the rights to which creators are entitled for their work • A copyright protects any tangible form of expression An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical
  • 29. Ethics and Society  Green computing involves reducing the electricity and environmental waste while using a computer.
  • 30. Ethics and Society Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them Huge databases store data online It is important to safeguard your information
  • 31. Ethics and Society  A cookie is a small text file that a Web server stores on your computer  Web sites use cookies for a variety of reasons:
  • 32. Ethics and Society  Spam is an unsolicited e-mail message or newsgroup posting  E-mail filtering blocks e-mail messages from designated sources  Anti-spam programs attempt to remove spam before it reaches your inbox
  • 33. Ethics and Society Phishing is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information Pharming is a scam where a perpetrator attempts to obtain your personal and financial information via spoofing
  • 35. Ethics and Society Content filtering is the process of restricting access to certain material on the Web Many businesses use content filtering Internet Content Rating Association (ICRA) Web filtering software restricts access to specified Web sites

Editor's Notes

  • #2: Hackers: A hacker is an individual who uses computer, networking or other skills to overcome a technical problem.  Crackers: A cracker is one who breaks into or otherwise violates the system integrity of remote machines with malicious intent. Having gained unauthorized access, crackers destroy vital data, deny legitimate users service, or cause problems for their targets.