63
XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video Last Class: Power Point Tutorial 1: Creating a Presentation Last Class: Power point Tutorial 2: Applying and Modifying Text and Graphic Objects Chapter 4 in Computers and Technology in a Changing Society: Computers and Security Agenda for Next Class Chapter 2 1

XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

Embed Size (px)

Citation preview

Page 1: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Agenda

• Video• Last Class: Power Point Tutorial 1: Creating a

Presentation• Last Class: Power point Tutorial 2: Applying and

Modifying Text and Graphic Objects• Chapter 4 in Computers and Technology in a

Changing Society: Computers and Security• Agenda for Next Class

Chapter 2 1

Page 2: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Last Class

• Power Point is a powerful presentation graphics program• Power Point can be used to create 35 mm slides, on-

screen slides, and color overheads• Slide Show view fills the screen and is used to present the

slide to an audience• Outline tab displays the titles and text of each the slides• The notes pane contains any notes that you might prepare

on each slide• Footers are useful for displaying date, time, slide numbers

and so on, on all slides• Power Point wizards help you to quickly develop effective

presentations

Chapter 2 2

Page 3: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 3

Computers and SecurityMicrosoft Windows Security Hole

Chapter 4

Page 4: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 4

Objectives

1. Explain why all computer users should be concerned about computer security.

2. Discuss security concerns related to unauthorized access, unauthorized use, and computer sabotage and suggest some possible safeguards for these concerns.

3. Name several types of dot cons and explain some precautions users can take.

4. List some risks associated wit hardware theft, damage, and system failure and understand ways to safeguard a PC against these risks.

Page 5: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 5

Objectives (cont’d)

5. Define software piracy and digital counterfeiting and explain how they may be prevented.

6. Understand some personal safety risks associated with Internet use and some precautions individuals can take.

7. Give some examples of computer crime legislation.

Page 6: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 6

Why Be Concerned About Computer Security?

• All computer users should be aware of security concerns such as computer viruses and hacking.

• Many computer security concerns today can be categorized as computer crimes.

• A computer crime (cybercrime) includes any illegal act involving a computer.

Page 7: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 7

Unauthorized Access and Use, and Computer Sabotage

• Unauthorized access – when an individual gains access to a computer or computer resource without permission.

• Unauthorized use – using a computer resource for unapproved activities.

• Organizations typically use codes of conduct to explain acceptable computer use to their authorized users.

Page 8: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 8

An Example of a Code of Conduct

Figure 4-1

Page 9: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 9

Hacking

• Hacking – the act of breaking into a remote computer system, often via the Internet or a wireless network.

• The person doing the hacking is called a hacker.

• The motivation to hack is often to steal information, sabotage a computer system, hijack a PC, or perform some other type of illegal act.

• Hacking is considered a very serious threat to our nation’s security.

Page 10: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 10

Interception of Communications

• Criminals can also gain access to data as it is being sent over the Internet.

• Intercepted data can be read, altered, or used for illegal purposes, such as credit card fraud or identity theft.

• Wireless (such as Wi-Fi) networks are inherently less secure than wired networks, so interception is easier.

Page 11: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 11

Computer Sabotage

• Computer sabotage – an act of malicious destruction to a computer or computer resource.

• Common types include:▪ Computer viruses and other types of malware.▪ Denial of service (DoS) attacks.▪ Data or program alteration.

Page 12: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 12

Computer Viruses

• Computer virus – a small software program installed without the permission or knowledge of the user that is designed to alter the way a computer operates.

• Viruses can be downloaded from the Internet or sent via e-mail.

• Most viruses are programmed to harm the PCs they infect, such as delete files or slow down the PC, or to gain control of the PC for illegal purposes.

Page 13: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 13

How a Computer Virus Might Spread

Figure 4-3

Page 14: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 14

Other Types of Malware

• Computer worm – similar to a virus but does not infect other files to replicate itself; it sends copies of itself instead.▪ Spread very rapidly.

• Trojan horse – masquerades as a legitimate program, but does its damage when the program is run.

• Common to use the term “virus” to refer to any type of malware.

Page 15: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 15

Denial of Service Attacks

• Attempts to flood a network or Web server with so many requests that it shuts down.

• Often uses multiple PCs, a distributed denial of service (DDos) attack; PCs are often zombies.

• Very expensive; often listed as the most expensive type of computer crime.

Page 16: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 16

How a Denial of Service Attack Might Work

Figure 4-4

Page 17: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 17

Data or Program Alteration

Figure 4-5

• Can change data or programs on a computer.

• Web site defacement is increasingly used to draw attention to a hacker or a specific cause.

Page 18: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 18

Protecting Against Unauthorized Access and Use, and Computer Sabotage

• Many security risks can be reduced or eliminated by controlling access to facilities and computer systems.▪ Identification systems – verify the person requesting

access is listed as an authorized user, but can’t tell if the person is really the individual he or she claims to be.

▪ Authentication systems – verify the person requesting access is who she or he claim to be.

• Access systems can use possessed knowledge, possessed objects, or biometrics.

Page 19: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 19

Possessed Knowledge Access Systems

• Possessed knowledge access system – requires the individual requesting access to provide information that only the authorized user is supposed to know.▪ Passwords, usernames, PINs

• It is important to select good passwords and change them frequently.

• One disadvantage is that the knowledge can be forgotten or used by an unauthorized individual.

Page 20: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 20

Password Strategies

Figure 4-6

Page 21: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 21

Possessed Object Access Systems

• Possessed object access systems – use physical objects for identification purposes.

• Common types of possessed objects:▪ Smart cards▪ Encoded badges▪ Magnetic cards

• One disadvantage is that the object can be lost or used by an unauthorized individual.

Figure 4-7

Page 22: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 22

Biometric Access Systems

• Biometric access systems use biometric readers to identify users by a particular unique biological characteristic.

• Are increasingly being used to control access to facilities, as well as computer systems.

• Very accurate and convenient.

Page 23: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 23

Biometric Access Systems

• Fingerprint scanners▪ Easy to use and inexpensive.▪ Requires contact with scanner.

Figure 4-8

Page 24: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 24

Biometric Access Systems

• Hand geometry readers▪ Easy to use.▪ Requires contact with scanner; fairly expensive.

Figure 4-8

Page 25: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 25

Biometric Access Systems

• Face readers▪ Requires no contact with scanner and can be used without the

person’s cooperation.▪ Lighting and disguises may affect the results; fairly expensive.

Figure 4-8

Page 26: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 26

Biometric Access Systems

• Iris scanners▪ Easy to use and requires no contact with scanner.▪ Lighting may affect results; expensive.

Figure 4-8

Page 27: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 27

Firewalls and Antivirus Software

• A firewall is a security system that acts as a protective boundary between a computer network and the outside world.

• Protects against unauthorized incoming and outgoing activities. Figure 4-8

Page 28: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 28

Firewalls and Antivirus Software

• Antivirus software should be installed to protect against becoming infected with a computer virus or other type of malware.

• Should scan all incoming e-mail messages and downloaded files, as well as the entire PC on an ongoing basis. Figure 4-10

Page 29: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 29

Firewalls and Antivirus Software

• Antivirus software should be updated regularly.

• Additional common sense tips can help prevent virus infections.

Figure 4-11

Page 30: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 30

E-Mail and File Encryption

• Encryption – a technique used to secure e-mail messages or other documents sent over the Internet.

• Encrypted files cannot be understood until they are decrypted.

• The two most common types of encryption are:▪ Private key encryption.▪ Public key encryption.

Page 31: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 31

E-Mail and File Encryption

Private key encryption (symmetric key encryption)• Uses a single key (password) to both encrypt and

decrypt the file.

• If used to send documents to others, both the sender and the recipient need to know the key.

• Often used by an individual to encrypt files stored on a hard drive.

Page 32: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 32

E-Mail and File Encryption

Public key encryption (asymmetric key encryption)• Uses two keys: One to encrypt the file and one to

decrypt the file.

• Keys are related and assigned to an individual.

• The recipient’s public key is not secret and is used by the sender to encrypt files sent to the recipient.

• The recipient’s private key is secret and is used by the recipient to decrypt files sent to that individual.

Page 33: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 33

An Example of Public Key Encryption

Figure 4-12

Page 34: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 34

E-Mail and File Encryption

• Web-based encrypted e-mail – encrypted e-mail is sent and retrieved via a secure server.▪ Don’t need to know keys, just the password to

your encrypted e-mail account.▪ Some servers require both the sender and

recipient to be subscribers.

• Various strengths of encryption, from weak 40-bit encryption to military-strength 2,048-bit encryption.

Page 35: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 35

Secure Web Servers

• Secure Web server – protected against unauthorized access and encrypts data going to and coming from the server.▪ All e-commerce

transactions should be performed on a secure server.

▪ Looks for a locked padlock and a URL that begins with https:

Figure 4-14

Page 36: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 36

Virtual Private Networks (VPNs)

• Virtual private network (VPN) – provides a continuous secure private tunnel from the user’s computer through the Internet to the business’s network.

• Use public infrastructure, so not cost prohibitive.

• Can provide a secure environment to a large geographical area.

Page 37: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 37

Wi-Fi Security

• Wi-Fi security standards include:▪ WEP (Wired Equivalent Privacy)▪ WPA (Wi-Fi Protected Access)▪ WPA2 (802.11i) is the newest standard.

• Important to enable security features, since most are switched off by default.

Page 38: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 38

Online Theft, Fraud, and Other Dot Cons

• Dot cons – A booming area of computer crime that involves online theft, fraud, scams, and related activities .

• Data or information theft includes:▪ Stolen customer or proprietary corporate data.▪ Stolen credit card numbers and other personal

data.▪ Monetary theft

Page 39: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 39

Online Theft, Fraud, and Other Dot Cons

• Identity theft – when someone obtains enough personal information about a person to be able to masquerade as the person for a variety of activities.

• Information used includes name, Social Security number, address, credit card offer forms, etc.

• Identity theft is growing and very expensive and inconvenient for the victim.

Page 40: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 40

How Identify Theft Works

Figure 4-14

Step 1: The thief obtainsinformation about an individual.

Step 2: The thief uses theinformation to make purchases,obtain credit cards, etc.

Step 3: The victim eventuallyfinds out.

Page 41: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 41

Other Dot Cons

• Online auction fraud – occurs when a buyer pays for merchandise that is never delivered, or is delivered but is not as represented.

• Internet offer scams – a wide range of scams offered through Web sites or unsolicited e-mails, such as:▪ Loan scams.▪ Work-at-home cons.▪ Pyramid schemes.▪ Bogus credit card offers.

Page 42: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 42

Other Dot Cons

• Spoofing or phishing – making it appear that an e-mail or a Web site originates from somewhere other than its actual source.▪ E-mails and Web sites

look legitimate, but all information sent goes to the thief.

▪ Information obtained is usually used for fraudulent activities.

Figure 4-15

Page 43: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 43

Protecting Against Online Theft, Fraud, and Other Dot Cons

• Protect your identifying information.

• Keep a close eye on bank statements, credit card bills, and your credit history.

• Before bidding on an auction idem, check out the feedback rating of the seller.

• Use a credit card or online payment service for online purchases.

Page 44: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 44

Protecting Against Online Theft, Fraud, and Other Dot Cons

• Never respond to e-mail requests for updated information or click on a link in an unsolicited e-mail message.

• Only submit sensitive information (like credit card numbers) via a secure Web server.

• Can also use digital signatures and digital certificates.

Page 45: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 45

Using Digital Signatures and Digital Certificates

• Digital signatures – used to verify the identity of the sender of a document.

• Digital certificates – a group of electronic data assigned to an individual or company to be used to:▪ Encrypt files.▪ Digitally sign files and e-mail messages.▪ Verify the identity of a person or secure Web site.

• Digital certificates are issued by Certificate Authorities.

Page 46: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 46

Example of Verifying a Digital Signature in an E-Mail Message

Figure 4-17

Page 47: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 47

Example of Viewing a Secure Web Page’s Digital Certificate

Figure 4-17

Page 48: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 48

Hardware Theft, Damage, and System Failure

• Hardware theft – occurs when hardware is stolen.

• Hardware damage▪ Can occur accidentally when hardware is dropped,

gotten wet, or exposed to static or a power surge.▪ Can occur intentionally, such as by a burglar,

vandal, or disgruntled employee.

• System failure – the complete malfunction of a computer system.

Page 49: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 49

Protecting Against Hardware Theft, Damage, and System Failure

• Door and computer equipment locks can secure against theft.▪ PCs can be secured with cable locks.▪ Portable PCs should not be left

unattended in cars, airports, hotels, and so forth.

• Expensive supplies and portable storage media should be locked up.

Figure 4-19

Page 50: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 50

Protecting Against Hardware Theft, Damage, and System Failure

• Data on portable PCs can be encrypted to secure it in case the PC is stolen.

• Some portable PCs and storage devices, such as USB flash memory drives and external hard drives, can be secured against unauthorized use with a biometric feature.

Figure 4-20

Page 51: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 51

Protecting Against Hardware Theft, Damage, and System Failure

• Surge suppressors – protect against damage due to power fluxuations.

• Uninterruptible power supplies (UPSs) – provide continuous power to a PC so it doesn’t shut off when the power goes off.

• Hardware should be protected against extreme temperatures, dust, static, and other things that might cause harm.

Figure 4-21

Page 52: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 52

Backups and Disaster Preparedness

• Creating a backup meansmaking a duplicate copy of important files so that when a problem occurs, those files can be restored from the backup copy.

• A disaster recovery plan spells out what the organization will do to prepare for and recover from a disruptive event.

Figure 4-22

Page 53: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 53

Software Piracy

• Software piracy – the unauthorized copying of a computer program.▪ Is illegal in the U.S. and

many other, but not all, countries.

▪ Is a widespread global problem.

• When using software, you must follow the terms of the end-user license agreement (EULA).

Figure 4-24

Page 54: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 54

Digital Counterfeiting

• Digital counterfeiting – the process of creating copies of currency and other printed resources using computers and other types of digital equipment.

• Has increased as the qualityof digital imaging equipmenthas improved.

• Is illegal in the U.S. and hasserious consequences.

Figure 4-25

Page 55: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 55

Protecting Against Software Piracy and Counterfeiting

• Education, holograms, and other antipiracy tools.

• New U.S. currency designs.

• Digital counterfeiting prevention and detection features are built into some digital imaging products, such as copiers and scanners.

• Digital watermarks can be used with electronic resources.

Page 56: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 56

Anticounterfeiting Measures Used with U.S. Currency

Figure 4-26

Page 57: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 57

Personal Safety Issues

• Cyberstalking – repeated threats or harassing behavior via e-mail or another Internet communications method.

• There is a variety of controversial and potentially objectionable material on the Internet, including pornography.▪ Child pornography is illegal.▪ PROTECT Act of 2003 prohibits virtual child

pornography.

Page 58: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 58

Protecting Against Cyberstalking and Other Personal Safety Issues

• Be cautious and discreet in online locations, such as chat rooms.▪ Don’t reveal personal information.▪ Use nonprovocative identifying names.▪ Don’t respond to any online harassment.

• Stay in close touch with children as they explore the Internet.▪ Children should not use PCs in their bedrooms.

Page 59: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 59

Computer Security Legislation

• Some computer-security-related federal laws include:▪ Identity Theft Penalty Act▪ Fair and Accurate Credit Transactions Act (FACTA)▪ Homeland Security Act▪ USA Patriot Act (USAPA)▪ Digital Millennium Copyright Act (DCMA)▪ Identity Theft and Assumption Deterrence Act▪ Computer Fraud and Abuse Act

Page 60: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 60

Summary

• Why Be Concerned About Computer Security?

• Unauthorized Access and Use, and Computer Sabotage

• Online Theft, Fraud, and Other Dot Cons

• Hardware Theft, Damage, and System Failure

Page 61: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Chapter 4 61

Summary (cont’d)

• Software Piracy and Digital Counterfeiting

• Personal Safety Issues

• Computer Security Legislation

Page 62: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Next Class

• Front Page Tutorial 1

Chapter 1 62

Page 63: XP Computers and Technology in a Changing Society, Second Edition Presentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD) Agenda Video

XP

Computers and Technology in a Changing Society, Second EditionPresentation by: Joseph H. Schuessler, B.B.A., M.B.A., M.S., Ph.D. (ABD)

Questions?

Chapter 1 63