Computer_safty_and_security

Learning Outcomes

  • Understand current cybersecurity threats, including:

    • Malware

    • Phishing

    • Ransomware

  • Comprehend concepts of:

    • Encryption

    • Authentication

    • Access control

    • Secure coding practices

  • Explore ethical and legal aspects of privacy, including data protection laws and regulations

Why Be Concerned About Computer Security?

  • Awareness of security concerns:

    • Theft of PC

    • Loss of important data

    • Pirated or counterfeit products

    • Privacy risks

Hardware Loss, Damage, and System Failure

Hardware Issues

  • Hardware loss: Stolen or misplaced devices

    • Theft:

      • Commonly targeted for hardware value or contained information

  • Hardware damage: Can occur accidentally or intentionally

  • System failure:

    • Total malfunction due to hardware/software issues, natural disasters, or attacks

Protecting Against Hardware Loss, Damage, and System Failure

  • Security Measures:

    • Use locks for computers and doors

    • Employ cable locks

    • Utilize encryption for data protection

  • Tracking Software:

    • Software to find lost/stolen PCs

    • Kill switch: Deletes sensitive data remotely

  • Power Protection:

    • Surge suppressors for electrical protection

    • UPS for continuous power supply

  • Backup Plans:

    • Use continuous data protection (CDP) and secure backup

Software Piracy and Digital Counterfeiting

Software Piracy

  • Definition: Unauthorized software copying

  • Common scenarios:

    • Illegal copies shared among individuals

    • Businesses exceeding EULA by installing on multiple machines

    • Unauthorized software on sold PCs

Digital Counterfeiting

  • Making Unlicensed copies of currencies and collectibles using scanning or printing

Protection Against Software Piracy and Digital Counterfeiting

  • Methods:

    • Education on piracy

    • Strengthened anti-piracy laws

    • Use of holograms for authenticity

  • Physical and Digital Protections:

    • New currency designs, microprinting, and digital watermarks

Why Be Concerned About Information Privacy?

  • Privacy: Freedom from unauthorized intrusion

  • Information privacy: Control over personal data collection and use

Databases, Electronic Profiling, Spam, and Marketing Activities

Electronic Profiling

  • Collection of in-depth information using electronic means

Spam

  • Definition: Unsolicited bulk emails

  • Examples:

    • Health products, fraudulent offers, instant messaging spam

Protecting the Privacy of Personal Information

  • Email Safeguards:

    • Use throw-away email addresses

  • Data Disposal:

    • Properly wipe sensitive data

    • Shred data storage media

Electronic Surveillance and Monitoring

  • Computer Monitoring Software:

    • Used to track computer usage

  • Video Surveillance:

    • Monitor interactions in various settings

Network and Internet Security

Cybercrime Awareness

  • Includes:

    • Network breaches

    • Financial theft

    • Data manipulation

    • Sabotage activities

Unauthorized Access & Use

  • Unauthorized Access: User gains access without permission

  • Unauthorized Use: Utilization outside authorized scope

Computer Sabotage

  • Types of Sabotage:

    • Computer viruses (harmful)

    • Worms (self-replicating)

    • Trojan horses (disguised harmful software)

    • Ransomware (gatekeeping access for payment)

    • Denial of service (flooding a server)

Protecting Against Unauthorized Access and Computer Sabotage

  • Access Control Systems:

    • Knowledge, object, and biometric systems for restricted access

  • Firewalls:

    • Prevention of unauthorized network access

Encryption

  • Types:

    • Private key encryption: Single key for scrambling

    • Public key encryption: Two keys for secure communication

Ethical and Legal Implications of Information Systems

Definition of Ethics

  • Standards of moral conduct; ethics guides behavior

Information Systems Ethics

  • Protect individuals using responsible information system practices

Codes of Ethics

  • Documents outlining acceptable behaviors for professionals

Acceptable Use Policies

  • Restrictions on how networks and systems can be used

  • Examples of prohibitions:

    • Borrowing IDs and passwords

    • Unsolicited emailing

Intellectual Property

  • Definition: Protection of creator works, ideas, and inventions

Copyright

  • Protection of creative works, giving authors control over their work

Ethical Use of Copyrighted Material

  • Importance of proper crediting to avoid plagiarism

  • Online plagiarism detection tools available

Creative Commons

  • Legal tools allowing authors to control their work while ensuring accessibility

Patent and Trademark

  • Patent: Protection of inventions and processes

  • Trademark: Protects identifiers of goods and services

Importance of Trademarks

  • Protection against cybersquatting and typosquatting

  • Trademarks serve to protect consumers and assure quality

robot