Computer_safty_and_security
Learning Outcomes
Understand current cybersecurity threats, including:
Malware
Phishing
Ransomware
Comprehend concepts of:
Encryption
Authentication
Access control
Secure coding practices
Explore ethical and legal aspects of privacy, including data protection laws and regulations
Why Be Concerned About Computer Security?
Awareness of security concerns:
Theft of PC
Loss of important data
Pirated or counterfeit products
Privacy risks
Hardware Loss, Damage, and System Failure
Hardware Issues
Hardware loss: Stolen or misplaced devices
Theft:
Commonly targeted for hardware value or contained information
Hardware damage: Can occur accidentally or intentionally
System failure:
Total malfunction due to hardware/software issues, natural disasters, or attacks
Protecting Against Hardware Loss, Damage, and System Failure
Security Measures:
Use locks for computers and doors
Employ cable locks
Utilize encryption for data protection
Tracking Software:
Software to find lost/stolen PCs
Kill switch: Deletes sensitive data remotely
Power Protection:
Surge suppressors for electrical protection
UPS for continuous power supply
Backup Plans:
Use continuous data protection (CDP) and secure backup
Software Piracy and Digital Counterfeiting
Software Piracy
Definition: Unauthorized software copying
Common scenarios:
Illegal copies shared among individuals
Businesses exceeding EULA by installing on multiple machines
Unauthorized software on sold PCs
Digital Counterfeiting
Making Unlicensed copies of currencies and collectibles using scanning or printing
Protection Against Software Piracy and Digital Counterfeiting
Methods:
Education on piracy
Strengthened anti-piracy laws
Use of holograms for authenticity
Physical and Digital Protections:
New currency designs, microprinting, and digital watermarks
Why Be Concerned About Information Privacy?
Privacy: Freedom from unauthorized intrusion
Information privacy: Control over personal data collection and use
Databases, Electronic Profiling, Spam, and Marketing Activities
Electronic Profiling
Collection of in-depth information using electronic means
Spam
Definition: Unsolicited bulk emails
Examples:
Health products, fraudulent offers, instant messaging spam
Protecting the Privacy of Personal Information
Email Safeguards:
Use throw-away email addresses
Data Disposal:
Properly wipe sensitive data
Shred data storage media
Electronic Surveillance and Monitoring
Computer Monitoring Software:
Used to track computer usage
Video Surveillance:
Monitor interactions in various settings
Network and Internet Security
Cybercrime Awareness
Includes:
Network breaches
Financial theft
Data manipulation
Sabotage activities
Unauthorized Access & Use
Unauthorized Access: User gains access without permission
Unauthorized Use: Utilization outside authorized scope
Computer Sabotage
Types of Sabotage:
Computer viruses (harmful)
Worms (self-replicating)
Trojan horses (disguised harmful software)
Ransomware (gatekeeping access for payment)
Denial of service (flooding a server)
Protecting Against Unauthorized Access and Computer Sabotage
Access Control Systems:
Knowledge, object, and biometric systems for restricted access
Firewalls:
Prevention of unauthorized network access
Encryption
Types:
Private key encryption: Single key for scrambling
Public key encryption: Two keys for secure communication
Ethical and Legal Implications of Information Systems
Definition of Ethics
Standards of moral conduct; ethics guides behavior
Information Systems Ethics
Protect individuals using responsible information system practices
Codes of Ethics
Documents outlining acceptable behaviors for professionals
Acceptable Use Policies
Restrictions on how networks and systems can be used
Examples of prohibitions:
Borrowing IDs and passwords
Unsolicited emailing
Intellectual Property
Definition: Protection of creator works, ideas, and inventions
Copyright
Protection of creative works, giving authors control over their work
Ethical Use of Copyrighted Material
Importance of proper crediting to avoid plagiarism
Online plagiarism detection tools available
Creative Commons
Legal tools allowing authors to control their work while ensuring accessibility
Patent and Trademark
Patent: Protection of inventions and processes
Trademark: Protects identifiers of goods and services
Importance of Trademarks
Protection against cybersquatting and typosquatting
Trademarks serve to protect consumers and assure quality