Lecture Introduction to Computers: Chapter 14A - Peter Norton's

The first step to good computer security is awareness. You should understand a ll the dangers that specifically threaten your computer system. You need to know how each threat can affect you and prioritize them accordingly. This lesson introduces you to some of the most common threats to your privacy, data, and hardware. The following lesson shows you how to protect yourself and your system. | McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 14A Understanding the Need for Security Measures Basic Security Concepts Threats Anything that can harm a computer Vulnerabilities are weaknesses in security Security attempts to neutralize threats 14A- Basic Security Concepts Degrees of harm Level of potential damage Include all parts of system Potential data loss Loss of privacy Inability to use hardware Inability to use software 14A- Basic Security Concepts Countermeasures Steps taken to block a threat Protect the data from theft Protect the system from theft 14A- Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security. Threats To Users Identity Theft Impersonation by private information Thief can ‘become’ the victim Reported incidents rising Methods of stealing information Shoulder surfing Snagging Dumpster diving Social engineering High-tech methods 14A- Teaching tip The move Hackers includes scenes demonstrating most of these crimes in action. Threats To Users Loss of privacy Personal information is stored electronically Purchases are stored in a database Data is sold to other companies Public records on the Internet Internet use is monitored and logged None of these techniques are illegal 14A- Threats to Users Cookies Files delivered from a web site Originally improved a site’s function Cookies now track history and passwords Browsers include cookie blocking tools 14A- Teaching tip Cookies are named after the ‘magic cookie’. Threats to Users Spyware Software downloaded to a computer Designed to record personal information Typically undesired software Hides from users Several programs exist to eliminate 14A- Threats to Users Web bugs Small programs embedded in gif images Gets around cookie blocking . | McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 14A Understanding the Need for Security Measures Basic Security Concepts Threats Anything that can harm a computer Vulnerabilities are weaknesses in security Security attempts to neutralize threats 14A- Basic Security Concepts Degrees of harm Level of potential damage Include all parts of system Potential data loss Loss of privacy Inability to use hardware Inability to use software 14A- Basic Security Concepts Countermeasures Steps taken to block a threat Protect the data from theft Protect the system from theft 14A- Teaching tip It is important to note that no countermeasure is 100% effective all of the time. For proof, discuss an instance of a locked car being stolen. A truly dedicated attacker will eventually break through any security. Threats To Users Identity Theft Impersonation by private information Thief can ‘become’ the victim Reported incidents .

Không thể tạo bản xem trước, hãy bấm tải xuống
TỪ KHÓA LIÊN QUAN
TÀI LIỆU MỚI ĐĂNG
232    5    1    13-06-2024
106    5    1    13-06-2024
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.