Document

advertisement
Presentation
Computer Crime
A type of crime in which a computer is the target or tool for an illegal
activity is called computer crime .
Computer Criminals.
Types of computer criminals.........
Hacker
Cracker
script Kiddie
Corporate spy
Unethical employee
Cyber Extortionist
Cyber Terrorist
Methods used by computer criminals
Bomb
Data diddling
Denial of service
Piggy backing
Salami Technique
Security:~
Is a system that is used to protect a computer system and data .
Protects from intentional Or accidental damage or access by unauthorized persons .
Controlling Access .
what you have?
what you know?
what you do?
what you are?
Disaster of security violation.
Loss of hardware.
Loss of processing ability
Loss of software
Loss of data
Data security
The protection of data is called data security. A data stood in computer can
be lost due to different reasons.it can be lost
accidentally or some one can damage it.
Data can be lost completely or partially some organization obtain data from
the users and store data online to provide fast services
. A credit card company may store data of its customers online.
. A bank may provide online services using online data storage
data storage for the records.
. A university may provide the facility of online results.
BACKUP OF DATA.
An additional copy of data or information stored on secondary storage
media is called the backup of data.
The common media for backup.
Zip Disk
Floppy Disk
Magnetic tape
CD-ROM.
Purpose of Backup
1.An important file can be deleted accidentally.
2.The user may overwrite a part or a whole of an existing file.
3.A mechanical failure in the computer may result in loss of data.
4.a virus may damage the data stored on the computer.
5.The computer system may be stolen by anybody.
TYPES OF BACKUP
1.Complete backup.
Backup of all data on the hard disk is called complete backup.
2.Incremental backup.
Incremental backup creates a copy of only the data that is newly created or
modified since the last backup.
MEDIA FOR DATA BACKUP.
Different type of media can be used for backup of data.
USB flash drive
zip disk
Magnetic tape
CD.
Computer Virus.
A computer virus is a program that may disturb the normal working of a computer
system. A file containing a virus is called infected files.
ACTIVATION OF VIRUS.
When the computer virus start working, it is called the activation of virus different
viruses are activated in different ways.
DAMAGE CAUSED BY VIRUS.
Computer virus cannot damage computer hrdware.it may cause many damages
to a computer system.
A virus can,
1.A computer virus can damage data or software on the computer.
2.it can delete some or all files on the computer system.
3.It can destroy all data by formatting hard drive.
4.It may display a political or false message every few times.
CAUSES OF COMPUTER VIRUS.
1.Infected flash drives
2.Email attachments
3.insecure websites
PROTECTION FROM VIRUS.
virus infect computer system if Antivirus is not installed. Latest Antivirus software
should be installed on computer to protect it from virus.
1.The latest anti-virus should be installed on the computer.
2.The antivirus software must be upgrade regularly.
3.The floppy disk should be scanned for virus before use.
4.Junk or unknown email should not be opened.
5.Unathorized or pirated software should not be installed on the computer.
6.An important way of protection against virus is the use of backup of data. The backup
is used if the virus deletes data or modifies it.
HACKING
An illegal access to a computer or a network is called HACKING.
HACKING involves compromising the security of networks. Breaking the
security of application software or creating malicious programs such as virus.
The most popular form of network hacking are denial of service (DOS) attacks
and mail bombs. DoS attacks are designed to attack a computer network to crash
it.
Privacy.
privacy means that an individual has the right to see the data collected about him.
He also has the right to submit an application to view that data at any time.
he also has the right to stop the processing of his data by an organization.
ENSURING PRIVACY.
-The organization is responsible for keeping the data updated.
-The organization should keep data for the specified period of time only. It cannot
keep it longer than necessary time period.
-The organization is responsible for all kinds of security of data.
Privacy Risks.
Data protection laws are defined to ensure data protection. many countries define
data protection legislation. Data protection legislation of all countries is based on
same principle. But there are many privacy risks yet.
1.public information availability
2.wireless communication
3.Government threat to privacy
4.workplace threat to privacy
Commercial Threats to Privacy.
-cookies
-global unique identifiers
-Location tracking
-Spyware
-Spam
Protection from Threat to Privacy.
- Industry self regulation
- Government Regulation passing
- consumer self protection
- Secure socket layer (SSL)
- Email filtering
- Anti Spyware
Copy right laws related related to computer & software use.
copyright laws cover software programs to protect them from privacy.
A copy right mean that original author or creator of the work retains ownership
of the work.
different laws related to computer and software use are as follow....
Copyright Act 1976
Computer Fraud & abuse Act 1984
1987 Computer security Act
Computer misuse act 1990
CAN-SPAM Act 2003
Spam.
Spam is an unsolicited email message or newsgroup posting. Spam is sent to a large
number of recipients are once,
It is also known as Junk mail . The average user receives more than 1000 spam email
messages each year. Spam is normally
used for following purposes.
. Selling a product or service
. promoting a business opportunity.
. Advertising offensive material etc.
The user can avoid spam messages with the following techniques.
Some email programs provide built-in settings to delete spam automatically.
Email filtering can be used to block spam emails. Email filtering is a service that block
emails messages from specified sources.
Anti- spam program can be used to remove spam before it reach inbox.
The disadvantage of using email filter and anti - spam programs is that these programs
something remove valid email
filter and anti-spam programs is that these programs sometimes remove valid
email messages also.
Antivirus.
Antivirus software is used to detect and remove viruses worms and adware etc.
Antivirus software contain information about
different known viruses. Antivirus software runs in the background all the time.
It alerts the computer user
when any virus is detected.
Examples
Some examples of antivirus software are as follows.
. Symantec Antivirus.
. McAfee
. AVG
. Kaspersky
. Bit Defender
. NOD32
Managing an Antivirus.
Antivirus software is very important for the safety of a computer system. It protects
the data and files stored
on the computer from different security threats. The latest antivirus program must
be installed on the computer.
The antivirus software should be managed properly to detect and remove viruses
worms and adware from the computer system. Many new viruses are created and
spread continuously. The antivirus software must be updated regularly in
order to protect the computer properly.
Virus Definitions / Updates.
A virus is also called virus signature. Virus definitions contain the information about
different security threats like
virus worm and adware .
Importance of virus Definitions / Updates.
Virus definitions / updates are very important to protect the computer from security
threats. The virus definition
must be updated regularly .
McAfee.
McAfee is an American organization that develops antivirus programs .
It developed an antivirus program called
McAfee Virus scan .
Site license.
Site license is a permission to use software on a fixed numbers of computers in an
organization. In a large organization, it is very expensive to purchase separate
copyright of software for every individual computer.
If the same software is to be used on many computers , an organization can purchase
single copy the software along with site license.
the software with the site license is normally installed in a network environment.
it is available to all computers connected to the network. Many users of that
organization can use the
same software. It is less expensive than purchasing license for all users individually.
Security on the Internet.
internet security is the practice of protecting and preserving private resources and
information on the internet. The information transmitted over the
internet has a high degree of security risk.
there is no central administrator on the internet. The data sent over the internet travels
on different computers.
every computer can read this data
the un authorized persons like hackers can excess personal data and misuse it.
Internet Security Risks.
1.unauthorized access
2.spoofing
3.Online predators
4.denial of service attack
5.Information theft
Protection from internet security risks.
1.FIREWALL
2.Encryption.
basic types of encryption...:
(1).secret key
(2).public key encryption
Protecting children on the internet.
.access privileges
.blocking software
.child monitoring
Ethics in Computing
Ethics are the rules to determine the right and wrong.
most ethical beliefs are learned in childhood and are derived from family,
society or religion.
ethics are different from laws.
a law is an external rule that causes punishment if it is violated.
ethics are internal principles that influence decisions.
1.the computer should not be used to harm others.
2.the user should not be used to abuse his power.
3.the copyrighted software should not be copied illegally.
1.digital divide
the gap between the people who have access to computers and the internet and
the people who do not have these facilities is called digital divide.
this Division allows people with computers and internet access to take advantage of
personal and economic opportunities. The world bank and other international bodies
have created initiatives to overcome the digital divide around the world.
2.workplace
important issues at workplace.
1.Healhty Computing
some serious health problems are occur if a user sits in front of computer in awkward
positions for a long period of time.
these problems include stress, eyestrain ,headache and back pain.
A. Physical Health/Ergonomics.
1.Eyestrain and headache
2.back and neck pain
3.Repetitive Strain Injury
4.Employee Monitoring
2.Envirnomental concerns
The Environmental protection Agency (EPA) has created Energy Star program to
discourage waste in microcomputer industry.
It resulted in the concept of Green PC.
system unit
Display
Manufacturing
3.personal Responsibilities
for protect environment
Conserve
Recycle
Educate
2.Significance of Ethics in computing
1.Professional Ethics
there are different types of computer professionals.
these professional are include the programmer, system analyst, administrator and
computer operator etc.
Well-known organization ASSOCIATION FOR COMPUTING MACHINERY (ACM) has
developed a code for ethics and professional conduct.
The code is divided into three sections
* General Principals
* Professional responsibilities
* Guidelines for organizational system
4.Intellectual Property
Intellectual property is unique and original works such as idea, inventions, writings and logos etc.
1. Categories of intellectual property rights
1.copyright
a copyright is a type of legal protection that is given to an intellectual property.
* digital contents
* digital images
* software
• Plagiarism
2. patent are designed to protect inventions the patent holder is granted exclusive rights
to the invention for twenty years
3. Trademark a trademark is a word, name, symbol or device that is use to distinguish one
company and its products from another. the business identity is typically
protected by trademark.
Download