Upload
chrispaul8676
View
3.423
Download
0
Tags:
Embed Size (px)
Citation preview
UNAUTHORIZED ACCESS AND
USE
UNAUTHORIZED ACCESS
- use of a computer or network without permission.
- by connecting to it and then logging in as a legitimate user.
- do not cause damages.- merely access the data, valuable
information or programs in the computer.
UNAUTHORIZED USE
- Use of a computer or its data for unapproved or illegal
activities.- Ex: gaining access to a bank computer and performing an
unauthorized bank transfer etc.
SAFEGUARDS AGAINST UNAUTHORIZED
ACCESS AND USE
1. Have a written acceptable use policy (AUP) that outlines
the computer activities for which the computer and the network may and may not be
used.2. The use of firewall
3. Access Controls4. Intrusion detection software
USER NAMES AND PASSWORD
USERNAME/ user ID
- A unique combination of characters such as letters of
the alphabets or numbers that identifies one specific user.
PASSWORD
- A private combination of characters associated with the users name that allow
access to certain computer resources.- Some organization use passphrases to
authenticates.- A passphrase is a private combination often containing mix capitalization and
punctuation.
- Some website uses CAPTHCHA to further protect a users password
- CAPTHCHA stands for Completely Automated Public Turing test to tell
Computers and Humans Apart- It displays a series of distorted
characters and requires the user to enter characters correctly to use
website…
POSSESSED OBJECTS
- Possessed object is any item that you must carry to gain access to a computer or a
computer facility- Examples: badges, cards,
smartcards and keys- ATM card is a possessed object
- Used in combination with personal identification
numbers(PIN)
BIOMETRIC DEVICES
- Authenticates a persons identity by translating a personal characteristic,
such as a fingerprints, into a digital code stored in the
computer verifying a physical or behavioral
characteristic
Hand geometry systems
Fingerprint readers
Voice verification system
Face recognition system
Signature verification system
Iris recognition systems
Retinal scanners
DIGITAL FORENSICS
- Known as computer forensics, network forensics, or cyberforensics
- involves the examination of computer media, programs, data and log files on computers, servers, and
networks.- Areas that uses it include law
enforcement, criminal prosecutors, military intelligence, insurance
agencies, and security departments in the private sector.
HEALTH CONCERNS OF COMPUTER USE
COMPUTERS AND HEALTH RISKS
-A repetitive strain injury (RSI) is an injury or disorder of the
muscles, nerves, tendons, ligaments and joints.
- Tendonitis is inflammation of a tendon due to repeated motion
or stress on that tendon.
-Carpal tunnel syndrome (CTS) is inflammation of the nerve that connects the forearm to
the palm of the wrist.
- Computer vision syndrome (CVS) include sore, tired,
burning, itching, or dry eyes; blurred or double vision;
distance blurred vision after prolonged staring at a display
device; headache or sore neck.
ERGONOMICS AND WORKPLACE DESIGN
ERGONOMICS
- An applied science devoted to incorporating comfort, efficiency,
and safety into the design of items in the workplace.
- help users to work comfortably and efficiently and helps to
protect their health.
COMPUTER ADDICTIONS
SYMPTOMS OF COMPUTER ADDICTION
- craves computer time.- overjoyed when at computer.
- unable to stop computer activity.
- irritable when not at the computer.
- neglects family and friends.- problems at work or school.