Techniques to prevent unauthorized computer access and use
Implementing safeguards
Safeguards against hardware theft and vandalism
Identifying and implementing security measures
Ways to protect against software theft and information theft
Implementing security protocols
Devices available to protect computers from system failure
Discussing types of protective devices
Risks and safeguards associated with wireless communications
Identifying risks and implementing protective measures
Preventing health-related disorders and injuries due to computer use
Discussing preventive techniques
Issues surrounding information privacy
Discussing privacy concerns
A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
A cybercrime is an online or Internet-based illegal act
Types of computer security risks
Hackers
Crackers
Script Kiddies
Corporate Spies
Unethical Employees
Cyberextortionists
Cyberterrorists
Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises
Symptoms of an infected computer
Operating system runs much slower than usual
Available memory is less than expected
Files become corrupted
Screen displays unusual message or image
Music or unusual sound plays randomly
Existing programs and files disappear
Programs or files do not work properly
Unknown programs or files mysteriously appear
System properties change
Operating system does not start up
Operating system shuts down unexpectedly
A botnet is a group of compromised computers connected to a network
A denial of service attack (DoS attack) disrupts computer access to Internet services
A back door is a program or set of instructions in a program that allows users to bypass security controls
Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate
A firewall is hardware and/or software that protects a network’s resources from intrusion
Intrusion detection software
Firewall
Hardware and/or software that protects a network’s resources from intrusion
Intrusion detection software
1. Analyzes all network traffic
2. Assesses system vulnerabilities
3. Identifies any unauthorized intrusions
4. Notifies network administrators of suspicious behavior patterns or security breaches
Unauthorized access is the use of a computer or network without permission
Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
Access controls
Define who can access a computer, when they can access it, and what actions they can take
Include two-phase processes called identification and authentication
Involve user name, password, and CAPTCHA
Possessed object
Any item that you must carry to gain access to a computer or computer facility
Often used in combination with a personal identification number (PIN)
Biometric device
Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Digital forensics
1. The discovery, collection, and analysis of evidence found on computers and networks
2. Used in areas such as law enforcement, criminal prosecutors, military intelligence, insurance agencies, and information security departments
Hardware theft
Hardware theft is the act of stealing computer equipment
Hardware vandalism is the act of defacing or destroying computer equipment
Software theft
1. Occurs when someone steals software media
2. Intentionally erases programs
3. Illegally copies a program
4. Illegally registers and/or activates a program
Software theft conditions
Permitted actions: Install the software on one computer, make one copy of the software, remove the software from your computer before giving it away or selling it
Not permitted actions: Install the software on a network, give copies to friends or colleagues while continuing to use the software, export the software, rent or lease the software
Copying, loaning, borrowing, renting, or distributing software can be a violation of copyright law
Some software requires product activation to function fully
Information theft
1. Occurs when someone steals personal or confidential information
2. Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access
Encryption
Converting readable data into unreadable characters to prevent unauthorized access
A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender
A digital certificate is a notice that guarantees a user or a Web site is legitimate
Factors that can lead to system failure
Aging hardware
Natural disasters
Electrical power problems
Errors in computer programs
Ways to protect from system failures caused by electrical power variations
1. Surge protectors
2. Uninterruptible power supplies (UPS)
A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed
Offsite backups
Stored in a location separate from the computer site