Ch 9 - The Personal and Social Impact of Computers
Computer Waste: inappropriate use of computer technology and resources
* Computer related mistakes: errors, failures, and other computer problems that make computer output incorrect or not usefulCauses of computer waste: Improper management of information systems and resources
* Discarding of old software/computer systems when they still have value
* Building and maintaining complex systems that are not used to their fullest extent
* Using corporate time/technology for personal use
* Spam
\
- Preventing computer release waste and mistakes:
* Establishing policies and procedures (for proper waste disposal)
* Implementing policies and procedures
* Monitoring policies and procedures
* Reviewing policies and procedures
\
- Computer Crime: often defies detection, is the theft of intellectual property. Criminals require two tools to be able to commit computer crimes:
1. Knowing how to access computer systems
2. Manipulating the system to produce desired result
\
- Examples:
* Social engineering
* Dumpster diving
* Counterfeit and banking fraud using legitimate desktop publishing programs
\
Cyberterrorist: someone who intimated or coerces a government or organisation to advance their political or social objectives by launching computer based attacks against computers or networks
* The goal is to gather all information stored in themIdentity Theft: imposter obtains key pieces of personal identification information to impersonate someone else
\
- Illegal access and use of information:
* Hacker: learns about and uses computer systems
* Criminal hacker (cracker): gains unauthorised use or illegal access to computer systems
* Script bunnies: automate the job of crackers
* Insider: employee who compromises corporate systems
* Malware: software programs that destroy or damage processing
* Virus: computer program file capable of attaching to disks or other files and replicating itself repeatedly
* without the owner’s permission
\
- Worm: parasitic computer program that can create copies of itself on infected computer or send copies to other computers via a network
* Trojan horse: malicious program that disguises itself as a useful application and purposefully does something the user does not expect
* Logic bomb: type of trojan horse that executes when specific conditions occur
* Triggers for logic bombs include a change in a file by a particular series of keystrokes or at a specific time or date
\
- Avoiding viruses and worms:
* Installing antivirus software on your device
* Update antivirus software regularly
* Backup files regularly
* Do not open suspicious files or links
\
- Antivirus program: software that runs in the background to protect your computer from dangers lurking on the internet and other possible sources of infected files
* Tips:
* Run and update antivirus software
* Scan all CD’s before using them
* Only install softwares from well-known websites
* Take immediate action if a virus is detected
\
Software Piracy: act of illegally duplicating software
Internet software piracy: illegally downloading software from the internet
* Most rapidly expanding type of software piracy
* Most difficult to combat
* Can be served penalties
* Examples: pirate Websites, auction sites that offer counterfeit software, peer-to-peer networksPhishing: gaining access to personal information by redirecting user to fake site
\
- Crime prevention by corporations:
* Public key infrastructure (PKI): enables users of an unsecured public network such as the internet to securely and privately exchange data
* Uses public and private cryptographic key pair that is obtained and shared through a trusted authority
* Biometrics: measurement of one of a person's traits, whether physical or behavioural
\
- Using intrusion detection software:
* Intrusion detection system (IDS): software that monitors system and network resources and notifies network security personnel when it senses a possible intrusion
* Intrusion activities: failed login attempts, suspicious behaviour
* Can provide false alarms
* Email or voice message alerts may be missed
* Managed security service provider (MSSP): organisational that monitors, managers, and maintains network security for both hardware and software
* Sifts through alarms and alerts from all monitoring systems
* May provide scanning, blocking, and filtering capabilities
\
- Platform for privacy preferences (P3P): Screening technology that shields users from websites that do not provide the level of privacy protection they desire
- Ergonomics: science of designing machines, products, and systems to maximise the safety, comfort, and efficiency of the people who use them
- Code of ethics: states the principles and core values that are essential to a set of people and thus governs their behaviour
\