Computer Security and Safety,Ethics,and Privacy
by กมลชนก จารุณ
1. Computer Security Risks
1.1. Hackers
1.2. Crackers
1.3. Script Kiddidies
1.4. Corporate Spies
1.5. Cyberextortionists
1.6. Cyberterrorists
2. Unauthorized access and use
2.1. law enforcement
2.2. Criminal prosecutors
2.3. Military intelligence
2.4. insurance agencies
2.5. Iformation security departments
3. Software theft
3.1. intentionally erases programs
3.2. steals software media
3.3. illegally copies a program
4. Hardware theft and vandalism
5. System Failure
6. backing up - the ulitimate safeguaed
7. Health concerns of computer use
8. Objectives Overview
8.1. Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators
8.1.1. New node
8.2. Describe various types of internet and network attacks, and identify ways to safeguard against these these attacks
8.3. Discuss techniques to prevent unauthorized computer access and use
8.4. Identify safeguards against hardware theft and vandalism
8.5. Explain the ways software manufacturers protect against hardware theft and vandalism
8.6. Discuss how encryption works, and explain why it is necessary
8.7. Discuss the types of devices available that protect computers from system failure
8.8. Explain the options available for backing up computer resources
8.9. Identify risks and safeguards associated with wireless communications
8.10. Discuss issues surrounding information privacy
9. Internet and network attacks
9.1. information transmitted over networks has a higher degree of security risk than information kept on an organization's premises
9.2. an online security service is a web site that evaluates your computer to check for internet and e-mail vulnerabilities
9.3. an infected computer has one or more of the following symptoms
9.4. a botnet is a group of compromised computers connected to a network
9.5. a back door is a program or set of instructions in a program that allow users to bypass security controls
9.6. a firewall is hardware and/or software that protects resources from intrusion
10. informaion theft
11. wireless security
12. Ethics and society
13. Summary