chp9

Cards (93)

  • Discuss cybercrimes including
    1. Creation of malicious programs such as viruses, worms, Trojan horse, and zombies
    2. Denial of service attacks
    3. Internet scams
    4. Identity theft
    5. Cyberbullying
    6. Rogue Wi-Fi hotspots
    7. Data manipulation
  • Detail ways to protect computer security including
    1. Restricting access
    2. Encrypting data
    3. Anticipating disasters
    4. Preventing data loss
  • Discuss the primary privacy issues
    • Accuracy
    • Property
    • Access
  • Describe the impact of
    1. Large databases
    2. Private networks
    3. The Internet
    4. The Web
  • Online identity
    Major laws on privacy
  • Discuss computer ethics including
    1. Copyright law
    2. Software piracy
    3. Digital rights management
    4. The Digital Millennium Copyright Act
    5. Plagiarism and ways to identify plagiarism
  • Ergonomic concept

    Related health concerns
  • The ubiquitous use of computers and technology prompts some very important questions about the use of personal data and our right to privacy
  • Most significant concerns
    • Security
    • Privacy
    • Ethics
    • Ergonomics
  • Technology has had a very positive impact on people, but some of the impact could be negative
  • Digital security risk
    Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
  • Hacker
    Gains unauthorized access with malicious intent
  • Not all hackers are illegal
  • Computer crime
    Any illegal act involving the use of a computer or related devices
  • Cybercrime
    An online or Internet-based illegal act
  • Cybercrime/Computer Crime effects over 400 million people annually and costs over $400 billion each year
  • Forms of Computer Crime
    • Malicious Programs (Malware)
    • Denial of Service (DoS) attacks
    • Rogue Wi-Fi hotspots
    • Data manipulation
    • Internet Scams
    • Identity Theft
    • Cyber-bullying
    • Phishing
  • Malicious Programs or Malware
    Designed by crackers, computer criminals, to damage or disrupt a computer system
  • 3 most common malicious programs
    • Viruses
    • Worms
    • Trojan horse
  • Zombies
    Computers infected by a virus, worm, or Trojan Horse
  • Denial of Service (DoS) attack

    Attempts to slow down or stop a computer system or network by flooding it with requests for information or data
  • Rogue Wi-Fi hotspots
    Imitate free Wi-Fi networks and capture any and all information sent by the users to legitimate sites including usernames and passwords
  • Data manipulation
    Finding entry into someone's computer network and leaving a prankster's message
  • Internet Scam
    A fraudulent or deceptive act or operation to trick someone into providing personal information or spending money for little or no return
  • Identity Theft
    Illegal assumption of someone's identity for purpose of economic gain
  • Cyber-bullying
    Use of the Internet, cell phones, or other devices to send or post content intended to harm
  • Phishing
    Attempts to trick Internet users into thinking a fake but official-looking website is legitimate
  • Types of Internet Scams
    • Phishing
    • Advance fee fraud
    • Auction fraud
    • Work-at-home scams
    • Pyramid schemes
    • Ponzi schemes
  • Software theft
    Occurs when someone steals software media, intentionally erases programs, illegally registers and/or activates a program, or illegally copies a program
  • License agreement
    The right to use software
  • Information theft
    Occurs when someone steals personal or confidential information
  • Encryption
    A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
  • Digital signature
    An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the message sender
  • Digital certificate
    A notice that guarantees a user or a website is legitimate
  • Secure site

    A website that uses encryption techniques to secure its data
  • Hardware theft
    The act of stealing digital equipment
  • Hardware vandalism
    The act of defacing or destroying digital equipment
  • Principle measures to ensure computer security
    • Restricting access
    • Encrypting data
    • Anticipating disasters
    • Physical security
    • Data security
    • Disaster recovery plan
    • Preventing data loss
  • Biometric scanning methods
    • Fingerprint scanners
    • Iris (eye) scanners
    • Face recognition system
    • Hand geometry system
    • Voice verification system
    • Signature verification system
  • Passphrase
    A private combination of words, often containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources