30
UNAUTHORIZED ACCESS AND USE

Unauthorized access and use

Embed Size (px)

Citation preview

Page 1: Unauthorized access and use

UNAUTHORIZED ACCESS AND

USE

Page 2: Unauthorized access and use

UNAUTHORIZED ACCESS

- use of a computer or network without permission.

- by connecting to it and then logging in as a legitimate user.

- do not cause damages.- merely access the data, valuable

information or programs in the computer.

Page 3: Unauthorized access and use

UNAUTHORIZED USE

- Use of a computer or its data for unapproved or illegal

activities.- Ex: gaining access to a bank computer and performing an

unauthorized bank transfer etc.

Page 4: Unauthorized access and use

SAFEGUARDS AGAINST UNAUTHORIZED

ACCESS AND USE

Page 5: Unauthorized access and use

1. Have a written acceptable use policy (AUP) that outlines

the computer activities for which the computer and the network may and may not be

used.2. The use of firewall

3. Access Controls4. Intrusion detection software

Page 6: Unauthorized access and use

USER NAMES AND PASSWORD

Page 7: Unauthorized access and use

USERNAME/ user ID

- A unique combination of characters such as letters of

the alphabets or numbers that identifies one specific user.

Page 8: Unauthorized access and use

PASSWORD

- A private combination of characters associated with the users name that allow

access to certain computer resources.- Some organization use passphrases to

authenticates.- A passphrase is a private combination often containing mix capitalization and

punctuation.

Page 9: Unauthorized access and use
Page 10: Unauthorized access and use

- Some website uses CAPTHCHA to further protect a users password

- CAPTHCHA stands for Completely Automated Public Turing test to tell

Computers and Humans Apart- It displays a series of distorted

characters and requires the user to enter characters correctly to use

website…

Page 11: Unauthorized access and use
Page 12: Unauthorized access and use

POSSESSED OBJECTS

Page 13: Unauthorized access and use

- Possessed object is any item that you must carry to gain access to a computer or a

computer facility- Examples: badges, cards,

smartcards and keys- ATM card is a possessed object

- Used in combination with personal identification

numbers(PIN)

Page 14: Unauthorized access and use

BIOMETRIC DEVICES

Page 15: Unauthorized access and use

- Authenticates a persons identity by translating a personal characteristic,

such as a fingerprints, into a digital code stored in the

computer verifying a physical or behavioral

characteristic

Page 16: Unauthorized access and use

Hand geometry systems

Fingerprint readers

Page 17: Unauthorized access and use

Voice verification system

Face recognition system

Page 18: Unauthorized access and use

Signature verification system

Iris recognition systems

Page 19: Unauthorized access and use

Retinal scanners

Page 20: Unauthorized access and use

DIGITAL FORENSICS

Page 21: Unauthorized access and use

- Known as computer forensics, network forensics, or cyberforensics

- involves the examination of computer media, programs, data and log files on computers, servers, and

networks.- Areas that uses it include law

enforcement, criminal prosecutors, military intelligence, insurance

agencies, and security departments in the private sector.

Page 22: Unauthorized access and use

HEALTH CONCERNS OF COMPUTER USE

Page 23: Unauthorized access and use

COMPUTERS AND HEALTH RISKS

Page 24: Unauthorized access and use

-A repetitive strain injury (RSI) is an injury or disorder of the

muscles, nerves, tendons, ligaments and joints.

- Tendonitis is inflammation of a tendon due to repeated motion

or stress on that tendon.

Page 25: Unauthorized access and use

-Carpal tunnel syndrome (CTS) is inflammation of the nerve that connects the forearm to

the palm of the wrist.

- Computer vision syndrome (CVS) include sore, tired,

burning, itching, or dry eyes; blurred or double vision;

distance blurred vision after prolonged staring at a display

device; headache or sore neck.

Page 26: Unauthorized access and use

ERGONOMICS AND WORKPLACE DESIGN

Page 27: Unauthorized access and use

ERGONOMICS

- An applied science devoted to incorporating comfort, efficiency,

and safety into the design of items in the workplace.

- help users to work comfortably and efficiently and helps to

protect their health.

Page 28: Unauthorized access and use

COMPUTER ADDICTIONS

Page 29: Unauthorized access and use

SYMPTOMS OF COMPUTER ADDICTION

- craves computer time.- overjoyed when at computer.

- unable to stop computer activity.

- irritable when not at the computer.

- neglects family and friends.- problems at work or school.

Page 30: Unauthorized access and use