Computer in Everyday Life Chapter 11
Computer in Everyday Life Chapter 11
by suparat konsiripawat
1. Internet and Network Attacks
1.1. Computer Virus
1.2. Worm
1.3. Trojan Horse
1.4. Rootkit
1.5. firewall
1.6. botnet
1.7. denial of service attack
1.8. back door
1.9. Spoofing
2. Computer Security Risks
2.1. Internet and network attacks
2.2. Unauthorized access and use
2.3. hardware theft
2.4. system failure
2.5. information theft
2.6. software theft
3. Unauthorized Access and Use
3.1. use of a computer or network without permission
3.2. use of a computer or its data for unapproved or possibly illegal activities
4. Hardware Theft and Vandalism
4.1. Physical access controls
4.2. Alarm systems
4.3. Cables to lock equipment
4.4. Real time location system
4.5. Passwords, possessed objects, and biometrics
5. Software Theft
5.1. Steals software media
5.2. Intentionally erases programs
5.3. Illegally copies a program
5.4. Illegally registers and/or activates a program
6. System Failure
6.1. System Failure
6.2. variety of factors
6.3. surge protectors and uninterruptable power supplies (UPS)
7. Information Theft
7.1. digital signature
7.2. Web browsers and Web sites use encryption techniques
7.3. Encryption
7.4. Popular security techniques include
7.4.1. Digital Certificates
7.4.2. Transport Layer Security (TLS)
7.4.3. Secure HTTP
7.4.4. VPN
8. Backing Up – The Ultimate Safeguard
8.1. backup
8.2. Offsite backups
8.3. Two categories of backups
8.3.1. Full backup
8.3.2. Selective backup
8.4. Three-generation backup policy
8.4.1. Grandparent
8.4.2. Parent
8.4.3. Child
9. Wireless Security
9.1. Wireless access poses additional security risks
9.2. War driving allows individuals to detect wireless networks while driving a vehicle through the area
9.3. In additional to using firewalls, some safeguards improve security of wireless networks
9.3.1. A wireless access point should not broadcast an SSID
9.3.2. Change the default SSID
9.3.3. Configure a WAP so that only certain devices can access it
9.3.4. Use WPA or WPA2 security standards
10. Health Concerns of Computer Use
10.1. The widespread use of computers has led to health concerns
10.2. Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
10.3. Computer addiction occurs when the computer consumes someone’s entire social life
10.4. Symptoms of users include
10.4.1. Craves computer time
10.4.2. Overjoy when at the computer
10.4.3. Unable to stop computer activity
10.4.4. Irritable when not at the computer
10.4.5. Neglects family and friends
10.4.6. Problems at work or school
11. Ethics and Society
11.1. Computer ethics are the moral guidelines that govern the use of computers and information systems
11.2. Information accuracy is a concern
11.3. Intellectual property rights
11.4. IT code of conduct
11.5. Green computing involves reducing the electricity and environmental waste while using a computer
11.6. Information privacy
11.7. Huge databases store data online
11.8. It is important to safeguard your information
11.9. A cookie is a small text file that a Web server stores on your computer
11.10. Web sites use cookies for a variety of reasons
11.10.1. Allow for personalization
11.10.2. Store users’ passwords
11.10.3. Assist with online shopping
11.10.4. Track how often users visit a site
11.10.5. Target advertisements
11.11. Spam
11.12. E-mail filtering
11.13. Anti-spam programs
11.14. Phishing
11.15. Pharming
11.16. Social engineering
11.17. Employee monitoring
11.18. Content filtering
11.19. Internet Content Rating Association (ICRA)
11.20. Web filtering software