Sunday, April 17, 2011

Tutorial 4: Computer Security, Ethics, and Privacy

Computer Security, Ethics and Privacy



A security risks is any event or action that results in a loss of data or damage to a computers hardware or software. There are a few different types of security risks when discussing computers.
  1. Internet and network attacks. Example: Viruses and worms
  2. Unathorized access and use
  3. Harware theft. Example: Stolen computer
  4. Software theft. Example: Piracy
  5. Information theft. Example: Stolen Identity
  6. Systen Failure: Example: Lightning striking computer
  7. Wireless security. Example: wi-fi tapping
When information travels over a network, it is at a greater risk than if it were local information because there are more ways to intercept the information. A virus is a program that alters the computer and damages it files. It requires human interaction to be spread. A worm copies itself and takes up space on your computer, doesn't require humans to speread it. A Trojan Horse is software that hides behind something that seems hardless, doesn't spread.

How to avoid getting attacks:
  1. Use a firewall
  2. Keep anti virus software up to date
  3. STay alert and watch news
Unauthorized Access and Use
The use of a computer or network without permission. Such as using a University email address to send spam. It is important to protect your user name and password to ensure no one uses it unauthorized.

Software theft: Piracy
Where software is stolen from manufacturers. It is the unauhorized and illegal duplication of copyrighted software.
Use EULA (end user license agreement)  you have to accept before you install. Using registration keys can help prevent this.
Hurts consumers and developers: Risk viruses, increases cost, could go to jail or pay fine.
Piracy in the news:
(insert news article)

Information Theft:
Stealing personal information.
Phishing:
spoofing: Alters heading of emails to make it look like it comes from somewhere else
pharming: Installing malicious code on a software to redirect users to a fake website.

Again: Keep personal information such as gatorlink and password confidential, to ensure only you have access.

wireless security:


Computer Ethics
Ethical issues about computers and information privacy



Computer forensics
=]
how to catch unauthorized disclosure of information.
industrial espionage
fraud and data recovery

No comments:

Post a Comment