Podcast
Questions and Answers
What should you do if an antivirus program flags an e-mail attachment as infected?
What should you do if an antivirus program flags an e-mail attachment as infected?
How does IP spoofing affect network security?
How does IP spoofing affect network security?
What is the primary function of a personal firewall utility?
What is the primary function of a personal firewall utility?
What is a key characteristic of a denial of service attack?
What is a key characteristic of a denial of service attack?
Signup and view all the answers
What is the purpose of installing antivirus software on all your computers?
What is the purpose of installing antivirus software on all your computers?
Signup and view all the answers
Which of the following describes a back door in software?
Which of the following describes a back door in software?
Signup and view all the answers
What is a common consequence of not using a personal firewall?
What is a common consequence of not using a personal firewall?
Signup and view all the answers
What is the function of a firewall?
What is the function of a firewall?
Signup and view all the answers
What is the primary function of intrusion detection software?
What is the primary function of intrusion detection software?
Signup and view all the answers
What is a biometric device used for?
What is a biometric device used for?
Signup and view all the answers
What does access control specifically define?
What does access control specifically define?
Signup and view all the answers
Which method can help enhance password security?
Which method can help enhance password security?
Signup and view all the answers
What is a possessed object in the context of computer security?
What is a possessed object in the context of computer security?
Signup and view all the answers
What describes hardware vandalism?
What describes hardware vandalism?
Signup and view all the answers
What is software theft?
What is software theft?
Signup and view all the answers
What does a single-user license agreement allow?
What does a single-user license agreement allow?
Signup and view all the answers
What is a computer security risk?
What is a computer security risk?
Signup and view all the answers
Which of the following describes a virus?
Which of the following describes a virus?
Signup and view all the answers
What is the main method through which a virus spreads via email messages?
What is the main method through which a virus spreads via email messages?
Signup and view all the answers
What is the primary effect of a Trojan horse on a computer system?
What is the primary effect of a Trojan horse on a computer system?
Signup and view all the answers
How do worms differ from viruses?
How do worms differ from viruses?
Signup and view all the answers
Which of the following is NOT a technique to safeguard against Internet and network attacks?
Which of the following is NOT a technique to safeguard against Internet and network attacks?
Signup and view all the answers
Which concept refers to the right of individuals to keep their information private and secure?
Which concept refers to the right of individuals to keep their information private and secure?
Signup and view all the answers
What is a potential health-related disorder connected to excessive computer use?
What is a potential health-related disorder connected to excessive computer use?
Signup and view all the answers
What is the primary function of a surge protector?
What is the primary function of a surge protector?
Signup and view all the answers
Which type of backup involves creating copies of all files in a computer?
Which type of backup involves creating copies of all files in a computer?
Signup and view all the answers
What is the recommended method to ensure the security of a wireless access point?
What is the recommended method to ensure the security of a wireless access point?
Signup and view all the answers
Which of the following best describes a backup?
Which of the following best describes a backup?
Signup and view all the answers
What can cause prolonged malfunction of a computer?
What can cause prolonged malfunction of a computer?
Signup and view all the answers
What do codes of conduct in IT primarily address?
What do codes of conduct in IT primarily address?
Signup and view all the answers
What is the effect of an undervoltage condition?
What is the effect of an undervoltage condition?
Signup and view all the answers
What rights are granted by intellectual property laws?
What rights are granted by intellectual property laws?
Signup and view all the answers
What is the primary purpose of a cookie?
What is the primary purpose of a cookie?
Signup and view all the answers
Which of the following best describes spyware?
Which of the following best describes spyware?
Signup and view all the answers
What is the main function of anti-spam programs?
What is the main function of anti-spam programs?
Signup and view all the answers
What is phishing primarily aimed at achieving?
What is phishing primarily aimed at achieving?
Signup and view all the answers
When might users choose to disable cookies?
When might users choose to disable cookies?
Signup and view all the answers
What does adware primarily do?
What does adware primarily do?
Signup and view all the answers
How can users effectively manage spam emails?
How can users effectively manage spam emails?
Signup and view all the answers
Which of the following describes content filtering?
Which of the following describes content filtering?
Signup and view all the answers
What is the main focus of computer forensics?
What is the main focus of computer forensics?
Signup and view all the answers
Which condition is commonly associated with excessive computer use?
Which condition is commonly associated with excessive computer use?
Signup and view all the answers
What does the Internet Content Rating Association (ICRA) provide?
What does the Internet Content Rating Association (ICRA) provide?
Signup and view all the answers
Which method helps prevent tendonitis or carpal tunnel syndrome?
Which method helps prevent tendonitis or carpal tunnel syndrome?
Signup and view all the answers
What is an important aspect of ergonomics?
What is an important aspect of ergonomics?
Signup and view all the answers
What is green computing primarily concerned with?
What is green computing primarily concerned with?
Signup and view all the answers
What common health issue involving vision is related to prolonged computer screen use?
What common health issue involving vision is related to prolonged computer screen use?
Signup and view all the answers
Which of the following is NOT a precaution to prevent computer-related injuries?
Which of the following is NOT a precaution to prevent computer-related injuries?
Signup and view all the answers
Study Notes
Introduction to Computing - Module 8
- Module 8 covers Computer Security, Ethics, and Privacy.
Objectives
- Explain computer security risks and types of cybercrime perpetrators.
- Describe various internet and network attacks, and ways to safeguard against them.
- Discuss techniques for preventing unauthorized computer access and use.
- Discuss preventing health-related disorders and injuries from computer use.
- Discuss issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.
Computer Security Risks
- Computer security risks are actions that cause loss or damage to the computer system.
Computer Viruses, Worms, and Trojan Horses
-
Virus: A potentially damaging computer program that can spread and damage files.
-
Worm: Copies itself repeatedly, using up resources, potentially shutting down a computer or network.
-
Trojan Horse: Hides within or looks legitimate but triggers harmful events or actions after initial execution.
-
Payload: Destructive event triggered when opening a file, running a program, or booting with an infected disk.
-
Viruses can spread through e-mail messages:
-
Unscrupulous programmers create a virus program, hiding it in a Word document, attaching the Word document to an e-mail.
-
Some users that open the attachment become infected.
-
Other users, who do not recognize the sender and open the e-mail message, are not infected.
-
The virus is then sent to thousands of users.
-
Preventing Macro Viruses:
-
Set macro security level in applications.
-
Macros are disabled by default, notifications will show when documents contain macros.
-
Macros act as a small program that automates common tasks.
-
Antivirus programs:
-
Identify and remove computer viruses.
-
Usually protect against worms and Trojan horses.
-
Virus Signature:
-
Specific pattern of virus code.
-
Also called virus definition.
-
Antivirus programs look for virus signatures.
How does an Antivirus Program Inoculate a Program File?
- Records program info (size, creation date).
- Detects if virus tampers with files.
- Keeps infected files in separate area of hard disk to prevent further damage.
- Attempts to remove detected viruses.
Tips for Preventing Virus, Worm, and Trojan Horse Infections
- Set macro security in programs, enabling or disabling macros as needed.
- Install antivirus programs on all computers.
- Never open e-mail attachments unless expecting from a trusted source.
- Check all downloaded programs for viruses, worms, and/or Trojan horses.
- Install a personal firewall.
- If an attachment is identified as infected, immediately delete it.
Denial of Service Attack and Back Door
- Denial of Service Attack: An assault disrupting computer access to internet services like the Web or e-mail.
- Back Door: A program or set of instructions in a program that bypasses security controls to access a computer resource.
Spoofing
- IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source.
- Perpetrators trick their victims to interact with a fake website.
Firewall
- Security system (hardware and/or software) that prevents unauthorized intrusions.
Personal Firewall Utility
- A program that protects a personal computer's data from unauthorized intrusions.
- Monitors transmissions to and from the computer.
- Informs the user of attempted intrusions.
Unauthorized Access and Use
- Intrusion Detection Software: Analyzes network traffic, assesses system vulnerabilities, and identifies suspicious behavior.
- Access Control: Defines who can access a computer and what actions they can take.
- Audit Trail Records: Documents access attempts.
- Disabling File and Printer Sharing: Prevents unauthorized access to your computer through the internet.
- Usernames: Unique combinations of characters identifying a user.
- Passwords: Private combinations of characters associated with the username, enabling computer access to resources.
- Password protection: Longer passwords provide greater security, increasing the time it takes to discover them (provided appropriate character combinations are used).
- Possessed Objects: Items a user must carry to access a computer or facility (e.g., ATM card, ID card).
- Biometric devices: Authenticate person's identity using personal characteristics like fingerprints, hand geometry, voice, signature, and iris.
Hardware Theft and Vandalism
- Hardware Theft: Stealing computer equipment.
- Hardware Vandalism: Defacing or destroying computer equipment.
- Methods to protect from theft: Cables and locking mechanisms.
- Security Methods: Passwords, possessed objects, biometrics for various devices (PDAs/phones).
Software Theft
- Software Theft: Stealing or illegally copying software, or intentionally erasing programs.
- Software Piracy: Illegal duplication of copyrighted software.
- License Agreements: Grants right to use software on a specific computer, prohibiting copying and selling.
Safeguarding Software Theft
- Product Activation: Allowing users to input product identification numbers online or by phone to receive unique installation ID numbers.
- Business Software Alliance (BSA): Promote the awareness of software piracy problems resulting from unauthorized copying without licensing.
Information Theft
- Encryption: Converting readable data (plaintext) into unreadable characters (ciphertext) to protect from theft.
- Encryption methods often use multiple methods.
- Encryption key: Formula for decryption (deciphering).
- Encrypting Files/Folders in Windows: Locate the file/folder, right-click, select Properties, navigate to the General tab and click Advanced, select Encrypt content to secure data.
Internet Security Risks
- Encryption: Web browsers use encryption to transmit data securely. Websites beginning with "https" typically use encryption to help secure connections.
- Digital Certificates: Confirm website legitimacy, ensuring secure connections.
- Certificate Authority (CA): Authorized individuals/companies that issue and verify digital certificates.
Secure Socket Layer (SSL)
- Encrypts data transferred between client systems (e.g., web browser) and the internet server.
- "https" in web addresses indicates secure connections.
System Failure
- System Failure: Prolonged malfunction of a computer, caused by factors like aging hardware, natural disasters, and electrical problems (e.g., power surges or outages).
- Surge protector: Protects computer equipment from electrical disturbances.
- Uninterruptible power supply (UPS): A surge protector that continues providing power during electrical power loss.
Backing Up
- Backup: Duplicates of files (programs/discs) to restore files after system failure/corrupted files. Includes full and selective backups, as well as multiple copies for redundancy (e.g., three generation backups).
Wireless Security
- Secure your Wireless Access Point (WAP) and do not broadcast the network name.
- Enable WPA (Wired Equivalent Privacy/Wi-Fi Protected Access)
Health Concerns of Computer Use
-
Computer Vision Syndrome (CVS): Eye and vision problems
-
Repetitive Strain Injury (RSI): Strain on tendons/muscles due to repeated motions
-
Carpal Tunnel Syndrome (CTS): Inflammation of the nerve that connects the forearm to the palm, resulting from repeated motions
-
Computer Addiction: When computer use dominates a person's entire social life.
-
Preventing RSI/CTS: Spread fingers apart, keeping wrists straight, gently push back fingers/thumb, and dangle arms loosely, then shake arms.
-
Easing Eyestrain: Taking frequent breaks (every 10-15 minutes) looking into the distance, blinking regularly, and positioning the display at eye level.
-
Ergonomics: Applied science focusing on comfort, efficiency, and safety in the workplace (e.g., proper posture, adjusting chair, desk).
-
Green Computing: Reducing electricity and environmental waste during computer use.
-
Use ENERGY STAR compliant devices and peripherals
-
Avoid turning the computer off/on multiple times during the day, and only shutting down when not in use.
-
Use paperless methods for communications
-
Recycle old computers, paper, toner cartridges.
-
Telecommute or walk to cut down on car emissions
Additional Information (Ethics and Society)
-
Computer Ethics: Moral guidelines for computer and information systems use (e.g., avoiding harm to other people and software theft). This includes consideration of unauthorized use of computer systems & networks, intellectual property rights, codes of conduct, accuracy of information, and information privacy.
-
IT Code of Conduct: Written guidelines for employee computer use.
-
Information Privacy: The right of individuals/companies to control personal information, including ways to protect it, such as the use of electronic profiles, cookies, controls against spam and phishing, content filtering systems, and computer forensics.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.