Podcast
Questions and Answers
What should you do if an antivirus program flags an e-mail attachment as infected?
What should you do if an antivirus program flags an e-mail attachment as infected?
- Delete the attachment immediately (correct)
- Open the attachment to assess the issue
- Ignore the alert from the antivirus program
- Forward the attachment to someone else
How does IP spoofing affect network security?
How does IP spoofing affect network security?
- It allows an intruder to masquerade as a trusted source (correct)
- It blocks unauthorized access from external IP addresses
- It strengthens network security by verifying user identity
- It ensures that all transmissions are encrypted
What is the primary function of a personal firewall utility?
What is the primary function of a personal firewall utility?
- To store personal data securely
- To protect the computer from unauthorized intrusions (correct)
- To provide internet access at higher speeds
- To manage user passwords effectively
What is a key characteristic of a denial of service attack?
What is a key characteristic of a denial of service attack?
What is the purpose of installing antivirus software on all your computers?
What is the purpose of installing antivirus software on all your computers?
Which of the following describes a back door in software?
Which of the following describes a back door in software?
What is a common consequence of not using a personal firewall?
What is a common consequence of not using a personal firewall?
What is the function of a firewall?
What is the function of a firewall?
What is the primary function of intrusion detection software?
What is the primary function of intrusion detection software?
What is a biometric device used for?
What is a biometric device used for?
What does access control specifically define?
What does access control specifically define?
Which method can help enhance password security?
Which method can help enhance password security?
What is a possessed object in the context of computer security?
What is a possessed object in the context of computer security?
What describes hardware vandalism?
What describes hardware vandalism?
What is software theft?
What is software theft?
What does a single-user license agreement allow?
What does a single-user license agreement allow?
What is a computer security risk?
What is a computer security risk?
Which of the following describes a virus?
Which of the following describes a virus?
What is the main method through which a virus spreads via email messages?
What is the main method through which a virus spreads via email messages?
What is the primary effect of a Trojan horse on a computer system?
What is the primary effect of a Trojan horse on a computer system?
How do worms differ from viruses?
How do worms differ from viruses?
Which of the following is NOT a technique to safeguard against Internet and network attacks?
Which of the following is NOT a technique to safeguard against Internet and network attacks?
Which concept refers to the right of individuals to keep their information private and secure?
Which concept refers to the right of individuals to keep their information private and secure?
What is a potential health-related disorder connected to excessive computer use?
What is a potential health-related disorder connected to excessive computer use?
What is the primary function of a surge protector?
What is the primary function of a surge protector?
Which type of backup involves creating copies of all files in a computer?
Which type of backup involves creating copies of all files in a computer?
What is the recommended method to ensure the security of a wireless access point?
What is the recommended method to ensure the security of a wireless access point?
Which of the following best describes a backup?
Which of the following best describes a backup?
What can cause prolonged malfunction of a computer?
What can cause prolonged malfunction of a computer?
What do codes of conduct in IT primarily address?
What do codes of conduct in IT primarily address?
What is the effect of an undervoltage condition?
What is the effect of an undervoltage condition?
What rights are granted by intellectual property laws?
What rights are granted by intellectual property laws?
What is the primary purpose of a cookie?
What is the primary purpose of a cookie?
Which of the following best describes spyware?
Which of the following best describes spyware?
What is the main function of anti-spam programs?
What is the main function of anti-spam programs?
What is phishing primarily aimed at achieving?
What is phishing primarily aimed at achieving?
When might users choose to disable cookies?
When might users choose to disable cookies?
What does adware primarily do?
What does adware primarily do?
How can users effectively manage spam emails?
How can users effectively manage spam emails?
Which of the following describes content filtering?
Which of the following describes content filtering?
What is the main focus of computer forensics?
What is the main focus of computer forensics?
Which condition is commonly associated with excessive computer use?
Which condition is commonly associated with excessive computer use?
What does the Internet Content Rating Association (ICRA) provide?
What does the Internet Content Rating Association (ICRA) provide?
Which method helps prevent tendonitis or carpal tunnel syndrome?
Which method helps prevent tendonitis or carpal tunnel syndrome?
What is an important aspect of ergonomics?
What is an important aspect of ergonomics?
What is green computing primarily concerned with?
What is green computing primarily concerned with?
What common health issue involving vision is related to prolonged computer screen use?
What common health issue involving vision is related to prolonged computer screen use?
Which of the following is NOT a precaution to prevent computer-related injuries?
Which of the following is NOT a precaution to prevent computer-related injuries?
Flashcards
Computer Security Risk
Computer Security Risk
Any action causing loss or damage to a computer system.
Virus
Virus
A program that can potentially damage files and spread to networks.
Worm
Worm
A program that copies itself repeatedly, using up computer resources and possibly shutting down the computer.
Trojan Horse
Trojan Horse
Signup and view all the flashcards
Virus Email Spreading
Virus Email Spreading
Signup and view all the flashcards
Email Virus Step 1
Email Virus Step 1
Signup and view all the flashcards
Email Virus Step 2
Email Virus Step 2
Signup and view all the flashcards
Email Virus Step 3
Email Virus Step 3
Signup and view all the flashcards
Email Attachment Safety
Email Attachment Safety
Signup and view all the flashcards
Denial of Service Attack
Denial of Service Attack
Signup and view all the flashcards
Back Door (Hacking)
Back Door (Hacking)
Signup and view all the flashcards
Spoofing
Spoofing
Signup and view all the flashcards
Firewall
Firewall
Signup and view all the flashcards
Personal Firewall
Personal Firewall
Signup and view all the flashcards
Antivirus Software
Antivirus Software
Signup and view all the flashcards
Computer Security in Programs
Computer Security in Programs
Signup and view all the flashcards
Intrusion Detection Software
Intrusion Detection Software
Signup and view all the flashcards
Access Control
Access Control
Signup and view all the flashcards
Audit Trail
Audit Trail
Signup and view all the flashcards
User Name
User Name
Signup and view all the flashcards
Password
Password
Signup and view all the flashcards
Possessed Object
Possessed Object
Signup and view all the flashcards
Biometric Device
Biometric Device
Signup and view all the flashcards
Software Theft
Software Theft
Signup and view all the flashcards
Computer Security Risk
Computer Security Risk
Signup and view all the flashcards
Power Disturbances
Power Disturbances
Signup and view all the flashcards
Surge Protector
Surge Protector
Signup and view all the flashcards
Backup
Backup
Signup and view all the flashcards
Wireless Security
Wireless Security
Signup and view all the flashcards
Computer Ethics
Computer Ethics
Signup and view all the flashcards
IT Code of Conduct
IT Code of Conduct
Signup and view all the flashcards
Uninterruptible Power Supply (UPS)
Uninterruptible Power Supply (UPS)
Signup and view all the flashcards
Cookies
Cookies
Signup and view all the flashcards
Web Merchants
Web Merchants
Signup and view all the flashcards
Spyware
Spyware
Signup and view all the flashcards
Spam
Spam
Signup and view all the flashcards
Phishing
Phishing
Signup and view all the flashcards
Content Filtering
Content Filtering
Signup and view all the flashcards
E-mail Filtering
E-mail Filtering
Signup and view all the flashcards
Anti-spam programs
Anti-spam programs
Signup and view all the flashcards
Internet Content Rating
Internet Content Rating
Signup and view all the flashcards
Computer Forensics
Computer Forensics
Signup and view all the flashcards
Computer Vision Syndrome
Computer Vision Syndrome
Signup and view all the flashcards
Ergonomics
Ergonomics
Signup and view all the flashcards
Carpal Tunnel Syndrome
Carpal Tunnel Syndrome
Signup and view all the flashcards
Green Computing
Green Computing
Signup and view all the flashcards
Web Filtering Software
Web Filtering Software
Signup and view all the flashcards
Health Concerns of Computer Use
Health Concerns of Computer Use
Signup and view all the flashcards
Study Notes
Introduction to Computing - Module 8
- Module 8 covers Computer Security, Ethics, and Privacy.
Objectives
- Explain computer security risks and types of cybercrime perpetrators.
- Describe various internet and network attacks, and ways to safeguard against them.
- Discuss techniques for preventing unauthorized computer access and use.
- Discuss preventing health-related disorders and injuries from computer use.
- Discuss issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.
Computer Security Risks
- Computer security risks are actions that cause loss or damage to the computer system.
Computer Viruses, Worms, and Trojan Horses
-
Virus: A potentially damaging computer program that can spread and damage files.
-
Worm: Copies itself repeatedly, using up resources, potentially shutting down a computer or network.
-
Trojan Horse: Hides within or looks legitimate but triggers harmful events or actions after initial execution.
-
Payload: Destructive event triggered when opening a file, running a program, or booting with an infected disk.
-
Viruses can spread through e-mail messages:
-
Unscrupulous programmers create a virus program, hiding it in a Word document, attaching the Word document to an e-mail.
-
Some users that open the attachment become infected.
-
Other users, who do not recognize the sender and open the e-mail message, are not infected.
-
The virus is then sent to thousands of users.
-
Preventing Macro Viruses:
-
Set macro security level in applications.
-
Macros are disabled by default, notifications will show when documents contain macros.
-
Macros act as a small program that automates common tasks.
-
Antivirus programs:
-
Identify and remove computer viruses.
-
Usually protect against worms and Trojan horses.
-
Virus Signature:
-
Specific pattern of virus code.
-
Also called virus definition.
-
Antivirus programs look for virus signatures.
How does an Antivirus Program Inoculate a Program File?
- Records program info (size, creation date).
- Detects if virus tampers with files.
- Keeps infected files in separate area of hard disk to prevent further damage.
- Attempts to remove detected viruses.
Tips for Preventing Virus, Worm, and Trojan Horse Infections
- Set macro security in programs, enabling or disabling macros as needed.
- Install antivirus programs on all computers.
- Never open e-mail attachments unless expecting from a trusted source.
- Check all downloaded programs for viruses, worms, and/or Trojan horses.
- Install a personal firewall.
- If an attachment is identified as infected, immediately delete it.
Denial of Service Attack and Back Door
- Denial of Service Attack: An assault disrupting computer access to internet services like the Web or e-mail.
- Back Door: A program or set of instructions in a program that bypasses security controls to access a computer resource.
Spoofing
- IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source.
- Perpetrators trick their victims to interact with a fake website.
Firewall
- Security system (hardware and/or software) that prevents unauthorized intrusions.
Personal Firewall Utility
- A program that protects a personal computer's data from unauthorized intrusions.
- Monitors transmissions to and from the computer.
- Informs the user of attempted intrusions.
Unauthorized Access and Use
- Intrusion Detection Software: Analyzes network traffic, assesses system vulnerabilities, and identifies suspicious behavior.
- Access Control: Defines who can access a computer and what actions they can take.
- Audit Trail Records: Documents access attempts.
- Disabling File and Printer Sharing: Prevents unauthorized access to your computer through the internet.
- Usernames: Unique combinations of characters identifying a user.
- Passwords: Private combinations of characters associated with the username, enabling computer access to resources.
- Password protection: Longer passwords provide greater security, increasing the time it takes to discover them (provided appropriate character combinations are used).
- Possessed Objects: Items a user must carry to access a computer or facility (e.g., ATM card, ID card).
- Biometric devices: Authenticate person's identity using personal characteristics like fingerprints, hand geometry, voice, signature, and iris.
Hardware Theft and Vandalism
- Hardware Theft: Stealing computer equipment.
- Hardware Vandalism: Defacing or destroying computer equipment.
- Methods to protect from theft: Cables and locking mechanisms.
- Security Methods: Passwords, possessed objects, biometrics for various devices (PDAs/phones).
Software Theft
- Software Theft: Stealing or illegally copying software, or intentionally erasing programs.
- Software Piracy: Illegal duplication of copyrighted software.
- License Agreements: Grants right to use software on a specific computer, prohibiting copying and selling.
Safeguarding Software Theft
- Product Activation: Allowing users to input product identification numbers online or by phone to receive unique installation ID numbers.
- Business Software Alliance (BSA): Promote the awareness of software piracy problems resulting from unauthorized copying without licensing.
Information Theft
- Encryption: Converting readable data (plaintext) into unreadable characters (ciphertext) to protect from theft.
- Encryption methods often use multiple methods.
- Encryption key: Formula for decryption (deciphering).
- Encrypting Files/Folders in Windows: Locate the file/folder, right-click, select Properties, navigate to the General tab and click Advanced, select Encrypt content to secure data.
Internet Security Risks
- Encryption: Web browsers use encryption to transmit data securely. Websites beginning with "https" typically use encryption to help secure connections.
- Digital Certificates: Confirm website legitimacy, ensuring secure connections.
- Certificate Authority (CA): Authorized individuals/companies that issue and verify digital certificates.
Secure Socket Layer (SSL)
- Encrypts data transferred between client systems (e.g., web browser) and the internet server.
- "https" in web addresses indicates secure connections.
System Failure
- System Failure: Prolonged malfunction of a computer, caused by factors like aging hardware, natural disasters, and electrical problems (e.g., power surges or outages).
- Surge protector: Protects computer equipment from electrical disturbances.
- Uninterruptible power supply (UPS): A surge protector that continues providing power during electrical power loss.
Backing Up
- Backup: Duplicates of files (programs/discs) to restore files after system failure/corrupted files. Includes full and selective backups, as well as multiple copies for redundancy (e.g., three generation backups).
Wireless Security
- Secure your Wireless Access Point (WAP) and do not broadcast the network name.
- Enable WPA (Wired Equivalent Privacy/Wi-Fi Protected Access)
Health Concerns of Computer Use
-
Computer Vision Syndrome (CVS): Eye and vision problems
-
Repetitive Strain Injury (RSI): Strain on tendons/muscles due to repeated motions
-
Carpal Tunnel Syndrome (CTS): Inflammation of the nerve that connects the forearm to the palm, resulting from repeated motions
-
Computer Addiction: When computer use dominates a person's entire social life.
-
Preventing RSI/CTS: Spread fingers apart, keeping wrists straight, gently push back fingers/thumb, and dangle arms loosely, then shake arms.
-
Easing Eyestrain: Taking frequent breaks (every 10-15 minutes) looking into the distance, blinking regularly, and positioning the display at eye level.
-
Ergonomics: Applied science focusing on comfort, efficiency, and safety in the workplace (e.g., proper posture, adjusting chair, desk).
-
Green Computing: Reducing electricity and environmental waste during computer use.
-
Use ENERGY STAR compliant devices and peripherals
-
Avoid turning the computer off/on multiple times during the day, and only shutting down when not in use.
-
Use paperless methods for communications
-
Recycle old computers, paper, toner cartridges.
-
Telecommute or walk to cut down on car emissions
Additional Information (Ethics and Society)
-
Computer Ethics: Moral guidelines for computer and information systems use (e.g., avoiding harm to other people and software theft). This includes consideration of unauthorized use of computer systems & networks, intellectual property rights, codes of conduct, accuracy of information, and information privacy.
-
IT Code of Conduct: Written guidelines for employee computer use.
-
Information Privacy: The right of individuals/companies to control personal information, including ways to protect it, such as the use of electronic profiles, cookies, controls against spam and phishing, content filtering systems, and computer forensics.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.