1. Creation of malicious programs such as viruses, worms, Trojan horse, and zombies
2. Denial of service attacks
3. Internet scams
4. Identity theft
5. Cyberbullying
6. Rogue Wi-Fi hotspots
7. Data manipulation
Detail ways to protect computer security including
1. Restricting access
2. Encrypting data
3. Anticipating disasters
4. Preventing data loss
Discuss the primary privacy issues
Accuracy
Property
Access
Describe the impact of
1. Large databases
2. Private networks
3. The Internet
4. The Web
Online identity
Major laws on privacy
Discuss computer ethics including
1. Copyright law
2. Software piracy
3. Digital rights management
4. The Digital Millennium Copyright Act
5. Plagiarism and ways to identify plagiarism
Ergonomic concept
Related health concerns
The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy
Most significant concerns
Security
Privacy
Ethics
Ergonomics
Technology has had a very positive impact on people, but some of the impact could be negative
Digital security risk
Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
Hacker
Gains unauthorized access with malicious intent
Not all hackers are illegal
Computer crime
Any illegal act involving the use of a computer or related devices
Cybercrime
An online or Internet-based illegal act
Cybercrime/Computer Crime effects over 400 million people annually and costs over $400 billion each year
Forms of Computer Crime
Malicious Programs (Malware)
Denial of Service (DoS) attacks
Rogue Wi-Fi hotspots
Data manipulation
Internet Scams
Identity Theft
Cyber-bullying
Phishing
Malicious Programs or Malware
Designed by crackers, computer criminals, to damage or disrupt a computer system
3 most common malicious programs
Viruses
Worms
Trojan horse
Zombies
Computers infected by a virus, worm, or Trojan Horse
Denial of Service (DoS) attack
Attempts to slow down or stop a computer system or network by flooding it with requests for information or data
Rogue Wi-Fi hotspots
Imitate free Wi-Fi networks and capture any and all information sent by the users to legitimate sites including usernames and passwords
Data manipulation
Finding entry into someone's computer network and leaving a prankster's message
Internet Scam
A fraudulent or deceptive act or operation to trick someone into providing personal information or spending money for little or no return
Identity Theft
Illegal assumption of someone's identity for purpose of economic gain
Cyber-bullying
Use of the Internet, cell phones, or other devices to send or post content intended to harm
Phishing
Attempts to trick Internet users into thinking a fake but official-looking website is legitimate
Types of Internet Scams
Phishing
Advance fee fraud
Auction fraud
Work-at-home scams
Pyramid schemes
Ponzi schemes
Software theft
Occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program
License agreement
The right to use software
Information theft
Occurs when someone steals personal or confidential information
Encryption
A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Digital signature
An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
Digital certificate
A notice that guarantees a user or a website is legitimate
Secure site
A website that uses encryption techniques to secure its data
Hardware theft
The act of stealing digital equipment
Hardware vandalism
The act of defacing or destroying digital equipment
Principle measures to ensure computer security
Restricting access
Encrypting data
Anticipating disasters
Physical security
Data security
Disaster recovery plan
Preventing data loss
Biometric scanning methods
Fingerprint scanners
Iris (eye) scanners
Face recognition system
Hand geometry system
Voice verification system
Signature verification system
Passphrase
A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources